The adsysctl command

adsysctl is a command line utility to request actions from the daemon and query its current status. You can get more verbose output with the -v accumulative flags, which will stream all logs from the service corresponding to your specific request.

As a general rule, favor shell completion and the help command for discovering various parts of the adsysctl user interface. It will help you by completing subcommands, flags, users and pages of the offline documentation.

Checking which policies are applied

To check which policies are currently applied to the current AD user, run adsysctl policy applied:

$ adsysctl policy applied
Policies from machine configuration:- MainOffice Policy 2 ({B8D10A86-0B78-4899-91AF-6F0124ECEB48})- MainOffice Policy ({C4F393CA-AD9A-4595-AEBC-3FA6EE484285})- Default Domain Policy ({31B2F340-016D-11D2-945F-00C04FB984F9}) Policies from user configuration:- RnD Policy 3 ({073AA7FC-5C1A-4A12-9AFC-42EC9C5CAF04})- RnD Policy 2 ({83A5BD5B-1D5D-472D-827F-DE0E6F714300})- RnD Policy ({5EC4DF8F-FF4E-41DE-846B-52AA6FFAF242})- IT Policy ({75545F76-DEC2-4ADA-B7B8-D5209FD48727})- Default Domain Policy ({31B2F340-016D-11D2-945F-00C04FB984F9})

Note

The order of policies is top-down, with higher GPOs having priority over lower ones on the stack (e.g., respecting OU order, GPO enforcement, GPO block instructions on your AD setup).

A username can be passed to request other users, if you have the right permissions:

$ adsysctl policy applied tina
Policies from machine configuration:- MainOffice Policy ({A2F393CA-AD9A-4595-AEBC-3FA6EE484285})- Default Domain Policy ({31B2F340-016D-11D2-945F-00C04FB984F9}) Policies from user configuration:- RnD Policy 4 ({25A5BD5B-1D5D-472D-827F-DE0E6F714300})- IT Policy ({75545F76-DEC2-4ADA-B7B8-D5209FD48727})- Default Domain Policy ({31B2F340-016D-11D2-945F-00C04FB984F9})

Tip

Use shell completion to get the list of active users that you can request which policies are applied on.

The --details flag can be used to check which policies are set to a given value or disabled by which key:

$ adsysctl policy applied --details
Policies from machine configuration:- MainOffice Policy 2 ({B8D10A86-0B78-4899-91AF-6F0124ECEB48})    - gdm:        - dconf/org/gnome/desktop/notifications/show-banners: Locked to system default- MainOffice Policy ({C4F393CA-AD9A-4595-AEBC-3FA6EE484285})    - gdm:        - dconf/org/gnome/desktop/interface/clock-format: 24h        - dconf/org/gnome/desktop/interface/clock-show-date: false        - dconf/org/gnome/desktop/interface/clock-show-weekday: true        - dconf/org/gnome/desktop/screensaver/picture-uri: 'file:///usr/share/backgrounds/ubuntu-default-greyscale-wallpaper.png'- Default Domain Policy ({31B2F340-016D-11D2-945F-00C04FB984F9}) Policies from user configuration:- RnD Policy 3 ({073AA7FC-5C1A-4A12-9AFC-42EC9C5CAF04})    - dconf:        - org/gnome/desktop/media-handling/automount: Locked to system default- RnD Policy 2 ({83A5BD5B-1D5D-472D-827F-DE0E6F714300})- RnD Policy ({5EC4DF8F-FF4E-41DE-846B-52AA6FFAF242})    - dconf:        - org/gnome/shell/favorite-apps: libreoffice-writer.desktop\nsnap-store_ubuntu-software.desktop\nyelp.desktop- IT Policy ({75545F76-DEC2-4ADA-B7B8-D5209FD48727})    - dconf:        - org/gnome/desktop/background/picture-options: stretched        - org/gnome/desktop/background/picture-uri: file:///usr/share/backgrounds/canonical.png- Default Domain Policy ({31B2F340-016D-11D2-945F-00C04FB984F9})

The --all flag lists every key set by a given GPO, including the ones that are redefined by another GPO with a higher priority. This is can be helpful for debugging your GPO stack and discovering where a given value is defined:

$ adsysctl policy applied --all
Policies from machine configuration:- MainOffice Policy 2 ({B8D10A86-0B78-4899-91AF-6F0124ECEB48})    - gdm:        - dconf/org/gnome/desktop/notifications/show-banners: Locked to system default- MainOffice Policy ({C4F393CA-AD9A-4595-AEBC-3FA6EE484285})    - gdm:        - dconf/org/gnome/desktop/interface/clock-format: 24h        - dconf/org/gnome/desktop/interface/clock-show-date: false        - dconf/org/gnome/desktop/interface/clock-show-weekday: true        - dconf/org/gnome/desktop/screensaver/picture-uri: 'file:///usr/share/backgrounds/ubuntu-default-greyscale-wallpaper.png'- Default Domain Policy ({31B2F340-016D-11D2-945F-00C04FB984F9}) Policies from user configuration:- RnD Policy 3 ({073AA7FC-5C1A-4A12-9AFC-42EC9C5CAF04})    - dconf:        - org/gnome/desktop/media-handling/automount: Locked to system default- RnD Policy 2 ({83A5BD5B-1D5D-472D-827F-DE0E6F714300})- RnD Policy ({5EC4DF8F-FF4E-41DE-846B-52AA6FFAF242})    - dconf:        - org/gnome/shell/favorite-apps: libreoffice-writer.desktop\nsnap-store_ubuntu-software.desktop\nyelp.desktop- IT Policy ({75545F76-DEC2-4ADA-B7B8-D5209FD48727})    - dconf:        - org/gnome/desktop/background/picture-options: stretched        - org/gnome/desktop/background/picture-uri: file:///usr/share/backgrounds/canonical.png        - org/gnome/shell/favorite-apps: 'firefox.desktop'\n'thunderbird.desktop'\n'org.gnome.Nautilus.desktop'- Default Domain Policy ({31B2F340-016D-11D2-945F-00C04FB984F9})

Refreshing the policies

The command adsysctl policy update is used to refresh the policies. By default only the policy of the current user is updated. It can also refresh only the policy of the machine with the flag -m, or the machine and all the active users with the flag -a. On success nothing is displayed.

For example, refreshing the policy for all the objects:

$ adsysctl policy update --all -v
INFO No configuration file: Config File "adsys" Not Found in "[/home/warthogs.biz/b/bob /etc]".We will only use the defaults, env variables or flags. INFO Apply policy for adclient04 (machine: true)  INFO Apply policy for bob@warthogs.biz (machine: false)

You can provide the name of a user and the path to its Kerberos ticket to refresh a given user.

For example for user bob@warthogs.biz

$ adsysctl update bob@warthogs.biz /tmp/krb5cc_1899001102_wBlbck -vv
INFO No configuration file: Config File "adsys" Not Found in "[/home/warthogs.biz/b/bob /etc]".We will only use the defaults, env variables or flags. DEBUG Connecting as [[26812:519495]]               DEBUG New request /service/UpdatePolicy            DEBUG Requesting with parameters: IsComputer: false, All: false, Target: bob@warthogs.biz, Krb5Cc: /tmp/krb5cc_1899001102_wBlbck DEBUG Check if grpc request peer is authorized     DEBUG Polkit call result, authorized: true         DEBUG GetPolicies for "bob@warthogs.biz", type "user" DEBUG GPO "RnD Policy 3" for "bob@warthogs.biz" available at "smb://warthogs.biz/SysVol/warthogs.biz/Policies/{073AA7FC-5C1A-4A12-9AFC-42EC9C5CAF04}" DEBUG GPO "RnD Policy 2" for "bob@warthogs.biz" available at "smb://warthogs.biz/SysVol/warthogs.biz/Policies/{83A5BD5B-1D5D-472D-827F-DE0E6F714300}" DEBUG GPO "RnD Policy" for "bob@warthogs.biz" available at "smb://warthogs.biz/SysVol/warthogs.biz/Policies/{5EC4DF8F-FF4E-41DE-846B-52AA6FFAF242}" DEBUG GPO "IT Policy" for "bob@warthogs.biz" available at "smb://warthogs.biz/SysVol/warthogs.biz/Policies/{75545F76-DEC2-4ADA-B7B8-D5209FD48727}" DEBUG GPO "Default Domain Policy" for "bob@warthogs.biz" available at "smb://warthogs.biz/sysvol/warthogs.biz/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}" DEBUG Analyzing GPO "Default Domain Policy"        DEBUG Analyzing GPO "IT Policy"                    DEBUG Analyzing GPO "RnD Policy 2"                 DEBUG Analyzing GPO "RnD Policy 3"                 DEBUG Analyzing GPO "RnD Policy"                   DEBUG Policy "RnD Policy 2" doesn't have any policy for class "user" open /var/cache/adsys/gpo_cache/{83A5BD5B-1D5D-472D-827F-DE0E6F714300}/User/Registry.pol: no such file or directory DEBUG Policy "Default Domain Policy" doesn't have any policy for class "user" open /var/cache/adsys/gpo_cache/{31B2F340-016D-11D2-945F-00C04FB984F9}/User/Registry.pol: no such file or directory INFO Apply policy for bob@warthogs.biz (machine: false) DEBUG ApplyPolicy dconf policy to bob@warthogs.biz DEBUG Update user profile /etc/dconf/profile/bob@warthogs.biz DEBUG Analyzing entry {Key:org/gnome/desktop/background/picture-options Value:stretched Disabled:false Meta:s} DEBUG Analyzing entry {Key:org/gnome/desktop/background/picture-uri Value:file:///usr/share/backgrounds/canonical.png Disabled:false Meta:s} DEBUG Analyzing entry {Key:org/gnome/desktop/media-handling/automount Value: Disabled:true Meta:} DEBUG Analyzing entry {Key:org/gnome/shell/favorite-apps Value:libreoffice-writer.desktopsnap-store_ubuntu-software.desktopyelp.desktop Disabled:false Meta:as}

Getting the status of the service

The command adsysctl service status can be used to get the status:

$ adsysctl service status
Machine, updated on Tue May 18 12:15Connected users:  bob@warthogs.biz, updated on Tue May 18 12:15 Active Directory:  Server: ldap://adc01.warthogs.biz  Domain: warthogs.biz SSS:  Configuration: /etc/sssd/sssd.conf  Cache directory: /var/lib/sss/db Daemon:  Timeout after 2m0s  Listening on: /run/adsysd.sock  Cache path: /var/cache/adsys  Run path: /run/adsys  Dconf path: /etc/dconf

The information includes connected users, when users last refreshed, when the next refresh is scheduled and various service configuration options (static or dynamically configured).

Debugging

The cat command has already been described in the adsys-daemon reference.

You can display logs with debugging levels independent of daemon and clients debugging levels. Local printing will also be forwarded.

For example, running cat while the command version and applied are executed:

$ adsysctl service cat -vv
INFO No configuration file: Config File "adsys" Not Found in "[/root /etc]".We will only use the defaults, env variables or flags. DEBUG Connecting as [[29220:823925]]               DEBUG New request /service/Cat                     DEBUG Requesting with parameters:                  DEBUG Check if grpc request peer is authorized     DEBUG Authorized as being administrator            INFO New connection from client [[29302:462445]]  DEBUG [[29302:462445]] New request /service/Version DEBUG [[29302:462445]] Requesting with parameters:  DEBUG [[29302:462445]] Check if grpc request peer is authorized DEBUG [[29302:462445]] Any user always authorized  DEBUG Request /service/Version done                INFO New connection from client [[29455:217212]]  DEBUG [[29455:217212]] New request /service/DumpPolicies DEBUG [[29455:217212]] Requesting with parameters: Target: bob@warthogs.biz, Details: false, All: false DEBUG [[29455:217212]] Check if grpc request peer is authorized DEBUG [[29455:217212]] Polkit call result, authorized: true INFO [[29455:217212]] Dumping policies for bob@warthogs.biz DEBUG Request /service/DumpPolicies done

Other commands

Versions

You can get the current service and client versions with the version command to check you are running with latest version on both sides:

$ adsysctl version
adsysctl        0.5adsysd          0.5

Documentation

An offline version of this documentation is available in the daemon. It will render the documentation on the command line.

You can get a list of all chapters with their titles:

$ adsysctl doc
   Table of content                                                             1. [Welcome] ADSys: Active Directory Group Policy integration                 2. [Prerequisites] Prerequisites and installation                           […]

And render a given chapter by requesting it:

$ adsysctl doc Welcome
   ADSys: Active Directory Group Policy integration                                                                                                                                                                                                                           ADSys is the Active Directory Group Policy client for Ubuntu. It allows[…]

Finally, there are different rendering modes for the documentation.

You can dump documentation in html — for example — with the --format flag.

Admx generation

The policy admx command dumps pre-built Active Directory administrative templates that can be deployed on the Active Directory server.

For more information, check the AD setup documentation

Stopping the service

If you do not wish to wait for the idling timeout to stop the server, you can request graceful shutdown with adsysctl service stop.

This will first wait for all active connections to ends before shutting down.

The -force flag ends the service immediately.