dsconfigad(8) BSD System Manager's Manual dsconfigad(8)
NAME
dsconfigad -- retrieves/changes configuration for Directory Services Active Directory Plugin.
SYNOPSIS
dsconfigad -h dsconfigad -show [-lu username] [-lp password] dsconfigad [-f] [-a computerid] -domain fqdn -u username [-p password] [-lu username] [-lp password] [-ou dn] [-status] dsconfigad -r -u username [-p password] [-lu username] [-lp password] dsconfigad [-lu username] [-lp password] [-mobile enable | disable] [-mobileconfirm enable | disable] [-localhome enable | disable] [-useuncpath enable | disable] [-protocol afp | smb] [-shell value] [-uid attribute | -nouid] [-gid attribute | -nogid] [-ggid attribute | -noggid] [-preferred server | -nopreferred] [-groups "group1,group2,..." | -nogroups] [-alldomains enable | disable] [-packetsign allow | disable | require] [-packetencrypt allow | disable | require] [-passinterval value] [-namespace forest | domain] [-enableSSO] dsconfigad -staticmap attribute-type attribute-value [-lu username] [-lp password]
DESCRIPTION
This tool allows command-line configuration of the Active Directory Plug- in. dsconfigad has the same functionality for configuring the Active Directory plugin as the Directory Utility application. It requires "admin" privileges to the local workstation and to the Directory to make changes. A list of flags and their descriptions: -h Lists the options for calling dsconfigad -show Shows the current configuration of the Active Directory Plugin -f Force the process (i.e., join the existing account or remove the binding) -a computerid Add "computerid" to the specified Domain -r Remove this computer from the current Domain -status Print status information while adding computer to domain. -u username Username of a Network account that has administrative privileges to add/remove this computer to/from the specified Domain -p password Password to use in conjunction with the specified username. If this is not specified, you will be prompted for entry. Note that using this option has a security risk due to a small window where the password could be captured from running process list. Consider using the prompting mechanism to ensure passwords are not exposed unexpectedly. -lu username Username of a local account that has administrative privileges to this computer -lp password Password to use in conjunction with the specified local user- name. If this is not specified, you will be prompted for entry. Note that using this option has a security risk due to a small window where the password could be captured from running process list. Consider using the prompting mechanism to ensure pass- words are not exposed unexpectedly. -domain fqdn The fully-qualified DNS name of the Domain to be used when adding the computer to the Directory (e.g., domain.ads.demo.com). -ou dn The LDAP DN of the container to use for adding the computer. If this is not specified, it will default to the container "CN=Computers" within the domain that was specified (e.g., "CN=Computers,DC=domain,DC=ads,DC=demo,DC=com" -mobile enable | disable This flag determines whether the plugin will enable mobile account support for offline logon (disabled by default). This flag is a hint. If the appopriate Workgroup Management settings exist for a user, this will not override, as directory settings for the user take precendence. -mobileconfirm enable | disable This flag determines whether the plugin will warn the user when a mobile account is going to be created. This flag is a hint as discussed in -mobile -localhome enable | disable This flag determines whether the plugin forces all home directo- ries to be local to the computer (i.e., /Users/username) (enabled by default). -useuncpath enable | disable This flag determines whether the plugin uses the UNC specified in the Active Directory when mounting the network home. If this is disabled, the plugin will look for Apple schema extensions to mount the home directory. -protocol afp | smb This flag determines how a home directory is mounted on the desktop. By default SMB is used, but AFP can be used for use with Mac OS X Server or 3rd Party AFP solutions on Windows Servers (previously known as mountstyle) -shell value Use the specified shell (e.g., "/bin/bash") if a shell attribute does not exist in the directory for the user logging into this computer. Use a shell value of "none" to disable use of a default shell, preserving values that are only specified in the directory. -uid attribute This specifies the attribute to be used for the UID of the user. By default, a UID is generated from the Active Directory GUID. -nouid Turn off any previously mapped attribute and generate the UID from the Active Directory GUID. -gid attribute This specifies the attribute to be used for the GID of the user. By default, a GID is derived from the primaryGroupID of the user (typically Domain Users). -nogid Turn off any previously mapped attribute and use the GID from the directory. -ggid attribute This specifies the attribute to be used for the GID of the group. By default, a group GID is generated from the Active Directory GUID of the group. -noggid Turn off any previously mapped attribute and generate the group GID from the Active Directory GUID. -preferred server Use the specified server for all Directory lookups and authenti- cations. If the server is no longer available, it will fail- over to other servers. -nopreferred Turn off any previously specified server and default to dynamic server discovery. -groups group1,group2,... Use the listed groups to determine who has local administrative privileges on this computer. Groups can be specified by domain to ensure security is not compromised, e.g., "domain admins@domain.ads.demo.com" -nogroups Disable use of the current groups for determining administrative privileges on this computer. -alldomains enable | disable This flag determines whether the plugin allows authentication from any domain in the forest. When this is enabled, individual domains will not be visible, only "All Domains". If it is dis- abled, you will have the ability to select the specific domains that can authenticate to this computer. Enabled by default. -staticmap attribute-type attribute-value Enable static mapping of an attribute-type to a specific attribute-value for User records. Do not static map values such as UID, RecordName and GeneratedUID as unexpected behavior will occur. This is for use in other attributes that are not typi- cally searched. Attribute types are Directory Service types (i.e., "dsAttrTypeStandard:State"), see DirectoryServiceAt- tributes(7). -packetsign allow | disable | require By default packet signing is allowed but not required, but can be required or disabled (for example if debugging a problem). This ensures that the data to/from the server is not tampered with by another computer before received it is received. -packetencrypt allow | disable | require By default packet encryption is allowed but not required, but can be required or disabled (for example if debugging a prob- lem). This ensures that the data to/from the server is encrypted and signed guaranteeing the content was not tampered with and cannot be seen by other computers on the network. -passinterval value Set how often the computer trust account password should be changed (default 14). -namespace forest | domain Sets the primary account username naming convention. By default it is set to "domain" naming which assumes no conflicting user accounts across all domains. If your Active Directory forest has conflicts setting this to "forest" will prefix all usernames with "DOMAIN\" to ensure unique naming between domains (e.g., "ADDOMAIN\user1"). Warning: this will change the primary name of the user for all logins. Changing this setting on an exist- ing system will cause any existing homes to be unused on the local machine. -enableSSO (Server Only) When using MacOS X Server with Active Directory, this enables SSO for all supported services.
EXAMPLES
Adding a computer to a Directory: dsconfigad -a ThisComputer -u "administrator" -ou "CN=Computers,OU=Engineering,DC=ads,DC=demo,DC=com" -domain domain.ads.apple.com Giving a set of groups administrative access to the local computer: dsconfigad -groups "DOMAIN\domain admins,FOREST\enterprise admins,DOMAIN\desktop techs"
SEE ALSO
DirectoryService(8), DirectoryServiceAttributes(7) Darwin September 17, 2009 Darwin
Mac OS X 10.6 - Generated Thu Sep 17 20:25:51 CDT 2009