1. [root@riyimei ~]# authconfig
    2. Usage: authconfig [options] {--update|--updateall|--test|--probe|--restorebackup <name>|--savebackup <name>|--restorelastbackup}
    3. Options:
    4. -h, --help show this help message and exit
    5. --enableshadow, --useshadow
    6. enable shadowed passwords by default
    7. --disableshadow disable shadowed passwords by default
    8. --enablemd5, --usemd5
    9. enable MD5 passwords by default
    10. --disablemd5 disable MD5 passwords by default
    11. --passalgo=<descrypt|bigcrypt|md5|sha256|sha512>
    12. hash/crypt algorithm for new passwords
    13. --enablenis enable NIS for user information by default
    14. --disablenis disable NIS for user information by default
    15. --nisdomain=<domain> default NIS domain
    16. --nisserver=<server> default NIS server
    17. --enableldap enable LDAP for user information by default
    18. --disableldap disable LDAP for user information by default
    19. --enableldapauth enable LDAP for authentication by default
    20. --disableldapauth disable LDAP for authentication by default
    21. --ldapserver=<server>
    22. default LDAP server hostname or URI
    23. --ldapbasedn=<dn> default LDAP base DN
    24. --enableldaptls, --enableldapstarttls
    25. enable use of TLS with LDAP (RFC-2830)
    26. --disableldaptls, --disableldapstarttls
    27. disable use of TLS with LDAP (RFC-2830)
    28. --enablerfc2307bis enable use of RFC-2307bis schema for LDAP user information lookups
    29. --disablerfc2307bis disable use of RFC-2307bis schema for LDAP user information lookups
    30. --ldaploadcacert=<URL>
    31. load CA certificate from the URL
    32. --enablesmartcard enable authentication with smart card by default
    33. --disablesmartcard disable authentication with smart card by default
    34. --enablerequiresmartcard
    35. require smart card for authentication by default
    36. --disablerequiresmartcard
    37. do not require smart card for authentication by default
    38. --smartcardmodule=<module>
    39. default smart card module to use
    40. --smartcardaction=<0=Lock|1=Ignore>
    41. action to be taken on smart card removal
    42. --enablefingerprint enable authentication with fingerprint readers by default
    43. --disablefingerprint disable authentication with fingerprint readers by default
    44. --enableecryptfs enable automatic per-user ecryptfs
    45. --disableecryptfs disable automatic per-user ecryptfs
    46. --enablekrb5 enable kerberos authentication by default
    47. --disablekrb5 disable kerberos authentication by default
    48. --krb5kdc=<server> default kerberos KDC
    49. --krb5adminserver=<server>
    50. default kerberos admin server
    51. --krb5realm=<realm> default kerberos realm
    52. --enablekrb5kdcdns enable use of DNS to find kerberos KDCs
    53. --disablekrb5kdcdns disable use of DNS to find kerberos KDCs
    54. --enablekrb5realmdns enable use of DNS to find kerberos realms
    55. --disablekrb5realmdns
    56. disable use of DNS to find kerberos realms
    57. --enablewinbind enable winbind for user information by default
    58. --disablewinbind disable winbind for user information by default
    59. --enablewinbindauth enable winbind for authentication by default
    60. --disablewinbindauth disable winbind for authentication by default
    61. --smbsecurity=<user|server|domain|ads>
    62. security mode to use for samba and winbind
    63. --smbrealm=<realm> default realm for samba and winbind when security=ads
    64. --smbservers=<servers>
    65. names of servers to authenticate against
    66. --smbworkgroup=<workgroup>
    67. workgroup authentication servers are in
    68. --smbidmaprange=<lowest-highest>, --smbidmapuid=<lowest-highest>, --smbidmapgid=<lowest-highest>
    69. uid range winbind will assign to domain or ads users
    70. --winbindseparator=<\>
    71. the character which will be used to separate the domain and user part of winbind-created user names if winbindusedefaultdomain is not enabled
    72. --winbindtemplatehomedir=</home/%D/%U>
    73. the directory which winbind-created users will have as home directories
    74. --winbindtemplateshell=</bin/false>
    75. the shell which winbind-created users will have as their login shell
    76. --enablewinbindusedefaultdomain
    77. configures winbind to assume that users with no domain in their user names are domain users
    78. --disablewinbindusedefaultdomain
    79. configures winbind to assume that users with no domain in their user names are not domain users
    80. --enablewinbindoffline
    81. configures winbind to allow offline login
    82. --disablewinbindoffline
    83. configures winbind to prevent offline login
    84. --enablewinbindkrb5 winbind will use Kerberos 5 to authenticate
    85. --disablewinbindkrb5 winbind will use the default authentication method
    86. --winbindjoin=<Administrator>
    87. join the winbind domain or ads realm now as this administrator
    88. --enableipav2 enable IPAv2 for user information and authentication by default
    89. --disableipav2 disable IPAv2 for user information and authentication by default
    90. --ipav2domain=<domain>
    91. the IPAv2 domain the system should be part of
    92. --ipav2realm=<realm> the realm for the IPAv2 domain
    93. --ipav2server=<servers>
    94. the server for the IPAv2 domain
    95. --enableipav2nontp do not setup the NTP against the IPAv2 domain
    96. --disableipav2nontp setup the NTP against the IPAv2 domain (default)
    97. --ipav2join=<account>
    98. join the IPAv2 domain as this account
    99. --enablewins enable wins for hostname resolution
    100. --disablewins disable wins for hostname resolution
    101. --enablepreferdns prefer dns over wins or nis for hostname resolution
    102. --disablepreferdns do not prefer dns over wins or nis for hostname resolution
    103. --enablehesiod enable hesiod for user information by default
    104. --disablehesiod disable hesiod for user information by default
    105. --hesiodlhs=<lhs> default hesiod LHS
    106. --hesiodrhs=<rhs> default hesiod RHS
    107. --enablesssd enable SSSD for user information by default with manually managed configuration
    108. --disablesssd disable SSSD for user information by default (still used for supported configurations)
    109. --enablesssdauth enable SSSD for authentication by default with manually managed configuration
    110. --disablesssdauth disable SSSD for authentication by default (still used for supported configurations)
    111. --enableforcelegacy never use SSSD implicitly even for supported configurations
    112. --disableforcelegacy use SSSD implicitly if it supports the configuration
    113. --enablecachecreds enable caching of user credentials in SSSD by default
    114. --disablecachecreds disable caching of user credentials in SSSD by default
    115. --enablecache enable caching of user information by default (automatically disabled when SSSD is used)
    116. --disablecache disable caching of user information by default
    117. --enablelocauthorize local authorization is sufficient for local users
    118. --disablelocauthorize
    119. authorize local users also through remote service
    120. --enablepamaccess check access.conf during account authorization
    121. --disablepamaccess do not check access.conf during account authorization
    122. --enablesysnetauth authenticate system accounts by network services
    123. --disablesysnetauth authenticate system accounts by local files only
    124. --enablemkhomedir create home directories for users on their first login
    125. --disablemkhomedir do not create home directories for users on their first login
    126. --passminlen=<number>
    127. minimum length of a password
    128. --passminclass=<number>
    129. minimum number of character classes in a password
    130. --passmaxrepeat=<number>
    131. maximum number of same consecutive characters in a password
    132. --passmaxclassrepeat=<number>
    133. maximum number of consecutive characters of same class in a password
    134. --enablereqlower require at least one lowercase character in a password
    135. --disablereqlower do not require lowercase characters in a password
    136. --enablerequpper require at least one uppercase character in a password
    137. --disablerequpper do not require uppercase characters in a password
    138. --enablereqdigit require at least one digit in a password
    139. --disablereqdigit do not require digits in a password
    140. --enablereqother require at least one other character in a password
    141. --disablereqother do not require other characters in a password
    142. --enablefaillock enable account locking in case of too many consecutive authentication failures
    143. --disablefaillock disable account locking on too many consecutive authentication failures
    144. --faillockargs=<options>
    145. the pam_faillock module options
    146. --nostart do not start/stop portmap, ypbind, and nscd
    147. --test do not update the configuration files, only print new settings
    148. --update, --kickstart
    149. opposite of --test, update configuration files with changed settings
    150. --updateall update all configuration files
    151. --probe probe network for defaults and print them
    152. --savebackup=<name> save a backup of all configuration files
    153. --restorebackup=<name>
    154. restore the backup of configuration files
    155. --restorelastbackup restore the backup of configuration files saved before the previous configuration change
    156. [root@riyimei ~]#