authconfig, authconfig-tui - an interface for configuring system
authconfig provides a simple method of configuring /etc/sysconfig/net‐
work to handle NIS, as well as /etc/passwd and /etc/shadow, the files
used for shadow password support. Basic LDAP, Kerberos 5, and Winbind
client configuration is also provided.
If --test action is specified, authconfig can be run by users other
then root, and any configuration changes are not saved but printed
instead. If --update action is specified, authconfig must be run by
root (or through console helper), and configuration changes are saved.
Only the files affected by the configuration changes are overwritten.
If --updateall action is specified, authconfig must be run by root (or
through console helper), and all configuration files are written. The
--probe action instructs authconfig to use DNS and other means to guess
at configuration information for the current host, print its guesses if
it finds them to standard output, and exit.
The --restorebackup, --savebackup, and --restorelastbackup actions pro‐
vide a possibility to save and later restore a backup of configuration
files which authconfig modifies. Authconfig also saves an automatic
backup of configuration files before every configuration change. This
special backup can be restored by the --restorelastbackup action.
If --nostart is specified (which is what the install program does),
ypbind or other daemons will not be started or stopped immediately fol‐
lowing program execution, but only enabled to start or stop at boot
The --enablenis, --enableldap, --enablewinbind, and --enablehesiod
options are used to configure user information services in /etc/nss‐
witch.conf, the --enablecache option is used to configure naming ser‐
vices caching, and the --enableshadow, --enableldapauth, --enablekrb5,
and --enablewinbindauth options are used to configure authentication
functions via /etc/pam.d/system-auth. Each --enable has a matching
--disable option that disables the service if it is already enabled.
The respective services have parameters which configure their server
The algorithm used for storing new password hashes can be specified by
the --passalgo option which takes one of the following possible values
as a parameter: descrypt, bigcrypt, md5, sha256, and sha512.
The --enablelocauthorize option allows to bypass checking network
authentication services for authorization and the --enablesysnetauth
allows authentication of system accounts (with uid < 500) by these ser‐
When the configuration settings allow use of SSSD for user information
services and authentication, SSSD will be automatically used instead of
the legacy services and the SSSD configuration will be set up so there
is a default domain populated with the settings required to connect the
services. The --enablesssd and --enablesssdauth options force adding
SSSD to /etc/nsswitch.conf and /etc/pam.d/system-auth, but they do not
set up the domain in the SSSD configuration files. The SSSD configura‐
tion has to be set up manually. The allowed configuration of services
for SSSD are: LDAP for user information (--enableldap) and either LDAP
(--enableldapauth), or Kerberos (--enablekrb5) for authentication.
In case SSSD does not support some feature of the legacy services that
are required for the site configuration, the use of the legacy services
can be forced by setting FORCELEGACY=yes in /etc/sysconfig/authconfig.
The list of options mentioned here in the manual page is not exhaus‐
tive, please refer to authconfig --help for the complete list of the
The authconfig-tui supports all options of authconfig but it implies
--update as the default action. Its window contains a Cancel button by
default. If --back option is specified at run time, a Back button is
presented instead. If --kickstart is specified, no interactive screens
will be seen. The values the program will use will be those specified
by the other options (--passalgo, --enableshadow, etc.).
For namelist you may substitute either a single name or a comma-sepa‐
rated list of names.
The authconfig-tui is deprecated. No new configuration settings will be
supported by its text user interface. Use system-config-authentication
GUI application or the command line options instead.
authconfig returns 0 on success, 2 on error.
authconfig-tui returns 0 on success, 2 on error, and 1 if the user can‐
celled the program (by using either the Cancel or Back button).
Used to track whether or not particular authentication
mechanisms are enabled. Currently includes variables
named USESHADOW, USEMD5, USEKERBEROS, USELDAPAUTH, USESM‐
BAUTH, USEWINBIND, USEWINBINDAUTH, USEHESIOD, USENIS,
USELDAP, and others.
Used for shadow password support.
Configuration file for NIS support.
Another configuration file for NIS support.
Used to configure nss_ldap, pam_ldap, nslcd, and the
OpenLDAP library. Only the files already existing on the
system are modified.
Used to configure Kerberos 5.
Used to configure Hesiod.
Used to configure winbind authentication.
Used to configure user information services.
Used to configure parameters of user accounts (minimum
UID of a regular user, password hashing algorithm).
Common PAM configuration for system services which
include it using the include directive. It is created as
symlink and not relinked if it points to another file.
Contains the actual PAM configuration for system services
and is the default target of the /etc/pam.d/system-auth
symlink. If a local configuration of PAM is created (and
symlinked from system-auth file) this file can be
SEE ALSOauthconfig-gtk(8), system-auth-ac(5), passwd(5), shadow(5),
pwconv(1), domainname(1), ypbind(8), nsswitch.conf(5),
Nalin Dahyabhai <firstname.lastname@example.org>, Preston Brown <email@example.com>,
Matt Wilson <firstname.lastname@example.org>, Tomas Mraz <email@example.com>
Red Hat, Inc. 22 July 2011 AUTHCONFIG(8)