]> git.proxmox.com Git - pve-docs.git/blame - pveum.1-synopsis.adoc
asciidoc: introduce `pricing-url` variable, much like pmg-docs
[pve-docs.git] / pveum.1-synopsis.adoc
CommitLineData
1f554f76
DM
1*pveum* `<COMMAND> [ARGS] [OPTIONS]`
2
e2d681b3 3*pveum acl delete* `<path> --roles <string>` `[OPTIONS]`
1f554f76
DM
4
5Update Access Control List (add or remove permissions).
6
013dc89f 7`<path>`: `<string>` ::
1f554f76
DM
8
9Access control path
10
2489d6df 11`--groups` `<string>` ::
1f554f76
DM
12
13List of groups.
14
2489d6df 15`--propagate` `<boolean>` ('default =' `1`)::
1f554f76
DM
16
17Allow to propagate (inherit) permissions.
18
2489d6df 19`--roles` `<string>` ::
1f554f76
DM
20
21List of roles.
22
e9cd3bd4
TL
23`--tokens` `<string>` ::
24
25List of API tokens.
26
2489d6df 27`--users` `<string>` ::
1f554f76
DM
28
29List of users.
30
5c1699e5
TL
31*pveum acl list* `[FORMAT_OPTIONS]`
32
33Get Access Control List (ACLs).
34
e2d681b3 35*pveum acl modify* `<path> --roles <string>` `[OPTIONS]`
1f554f76
DM
36
37Update Access Control List (add or remove permissions).
38
013dc89f 39`<path>`: `<string>` ::
1f554f76
DM
40
41Access control path
42
2489d6df 43`--groups` `<string>` ::
1f554f76
DM
44
45List of groups.
46
2489d6df 47`--propagate` `<boolean>` ('default =' `1`)::
1f554f76
DM
48
49Allow to propagate (inherit) permissions.
50
2489d6df 51`--roles` `<string>` ::
1f554f76
DM
52
53List of roles.
54
e9cd3bd4
TL
55`--tokens` `<string>` ::
56
57List of API tokens.
58
2489d6df 59`--users` `<string>` ::
1f554f76
DM
60
61List of users.
62
e2d681b3
TL
63*pveum acldel*
64
65An alias for 'pveum acl delete'.
66
67*pveum aclmod*
68
69An alias for 'pveum acl modify'.
70
71*pveum group add* `<groupid>` `[OPTIONS]`
1f554f76
DM
72
73Create new group.
74
013dc89f 75`<groupid>`: `<string>` ::
1f554f76
DM
76
77no description available
78
2489d6df 79`--comment` `<string>` ::
1f554f76
DM
80
81no description available
82
e2d681b3 83*pveum group delete* `<groupid>`
1f554f76
DM
84
85Delete group.
86
013dc89f 87`<groupid>`: `<string>` ::
1f554f76
DM
88
89no description available
90
5c1699e5
TL
91*pveum group list* `[FORMAT_OPTIONS]`
92
93Group index.
94
e2d681b3 95*pveum group modify* `<groupid>` `[OPTIONS]`
1f554f76
DM
96
97Update group data.
98
013dc89f 99`<groupid>`: `<string>` ::
1f554f76
DM
100
101no description available
102
2489d6df 103`--comment` `<string>` ::
1f554f76
DM
104
105no description available
106
e2d681b3
TL
107*pveum groupadd*
108
109An alias for 'pveum group add'.
110
111*pveum groupdel*
112
113An alias for 'pveum group delete'.
114
115*pveum groupmod*
116
117An alias for 'pveum group modify'.
118
35a75dd3 119*pveum help* `[OPTIONS]`
1f554f76
DM
120
121Get help about specified command.
122
35a75dd3 123`--extra-args` `<array>` ::
1f554f76 124
35a75dd3 125Shows help for a specific command
1f554f76 126
2489d6df 127`--verbose` `<boolean>` ::
1f554f76
DM
128
129Verbose output format.
130
1f554f76
DM
131*pveum passwd* `<userid>`
132
133Change user password.
134
013dc89f 135`<userid>`: `<string>` ::
1f554f76 136
9d2e98ed 137Full User ID, in the `name@realm` format.
1f554f76 138
d2656385
TL
139*pveum pool add* `<poolid>` `[OPTIONS]`
140
141Create new pool.
142
143`<poolid>`: `<string>` ::
144
145no description available
146
147`--comment` `<string>` ::
148
149no description available
150
151*pveum pool delete* `<poolid>`
152
153Delete pool.
154
155`<poolid>`: `<string>` ::
156
157no description available
158
22deb848 159*pveum pool list* `[OPTIONS]` `[FORMAT_OPTIONS]`
d2656385 160
22deb848
TL
161List pools or get pool configuration.
162
163`--poolid` `<string>` ::
164
165no description available
166
167`--type` `<lxc | qemu | storage>` ::
168
169no description available
170+
171NOTE: Requires option(s): `poolid`
d2656385
TL
172
173*pveum pool modify* `<poolid>` `[OPTIONS]`
174
22deb848 175Update pool.
d2656385
TL
176
177`<poolid>`: `<string>` ::
178
179no description available
180
82551b2b
TL
181`--allow-move` `<boolean>` ('default =' `0`)::
182
183Allow adding a guest even if already in another pool. The guest will be removed from its current pool and added to this one.
184
d2656385
TL
185`--comment` `<string>` ::
186
187no description available
188
82551b2b 189`--delete` `<boolean>` ('default =' `0`)::
d2656385 190
82551b2b 191Remove the passed VMIDs and/or storage IDs instead of adding them.
d2656385
TL
192
193`--storage` `<string>` ::
194
82551b2b 195List of storage IDs to add or remove from this pool.
d2656385
TL
196
197`--vms` `<string>` ::
198
82551b2b 199List of guest VMIDs to add or remove from this pool.
d2656385 200
c5aa7e14
TL
201*pveum realm add* `<realm> --type <string>` `[OPTIONS]`
202
203Add an authentication server.
204
205`<realm>`: `<string>` ::
206
207Authentication domain ID
208
c30bb419
TL
209`--acr-values` `<string>` ::
210
211Specifies the Authentication Context Class Reference values that theAuthorization Server is being requested to use for the Auth Request.
212
34f3e481
TL
213`--autocreate` `<boolean>` ('default =' `0`)::
214
215Automatically create users if they do not exist.
216
82551b2b 217`--base_dn` `<string>` ::
c5aa7e14
TL
218
219LDAP base domain name
220
82551b2b 221`--bind_dn` `<string>` ::
c5aa7e14
TL
222
223LDAP bind domain name
224
225`--capath` `<string>` ('default =' `/etc/ssl/certs`)::
226
227Path to the CA certificate store
228
4772952b
TL
229`--case-sensitive` `<boolean>` ('default =' `1`)::
230
231username is case-sensitive
232
c5aa7e14
TL
233`--cert` `<string>` ::
234
235Path to the client certificate
236
237`--certkey` `<string>` ::
238
239Path to the client certificate key
240
82551b2b
TL
241`--check-connection` `<boolean>` ('default =' `0`)::
242
243Check bind connection to the server.
244
34f3e481
TL
245`--client-id` `<string>` ::
246
247OpenID Client ID
248
249`--client-key` `<string>` ::
250
251OpenID Client Key
252
c5aa7e14
TL
253`--comment` `<string>` ::
254
255Description.
256
257`--default` `<boolean>` ::
258
259Use this as default realm
260
261`--domain` `\S+` ::
262
263AD domain name
264
265`--filter` `<string>` ::
266
267LDAP filter for user sync.
268
269`--group_classes` `<string>` ('default =' `groupOfNames, group, univentionGroup, ipausergroup`)::
270
271The objectclasses for groups.
272
82551b2b 273`--group_dn` `<string>` ::
c5aa7e14
TL
274
275LDAP base domain name for group sync. If not set, the base_dn will be used.
276
277`--group_filter` `<string>` ::
278
279LDAP filter for group sync.
280
281`--group_name_attr` `<string>` ::
282
283LDAP attribute representing a groups name. If not set or found, the first value of the DN will be used as name.
284
34f3e481
TL
285`--issuer-url` `<string>` ::
286
287OpenID Issuer Url
288
c5aa7e14
TL
289`--mode` `<ldap | ldap+starttls | ldaps>` ('default =' `ldap`)::
290
291LDAP protocol mode.
292
293`--password` `<string>` ::
294
295LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
296
297`--port` `<integer> (1 - 65535)` ::
298
299Server port.
300
c30bb419
TL
301`--prompt` `(?:none|login|consent|select_account|\S+)` ::
302
303Specifies whether the Authorization Server prompts the End-User for reauthentication and consent.
304
305`--scopes` `<string>` ('default =' `email profile`)::
306
307Specifies the scopes (user details) that should be authorized and returned, for example 'email' or 'profile'.
308
c5aa7e14
TL
309`--secure` `<boolean>` ::
310
311Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
312
313`--server1` `<string>` ::
314
315Server IP address (or DNS name)
316
317`--server2` `<string>` ::
318
319Fallback Server IP address (or DNS name)
320
321`--sslversion` `<tlsv1 | tlsv1_1 | tlsv1_2 | tlsv1_3>` ::
322
323LDAPS TLS/SSL version. It's not recommended to use version older than 1.2!
324
9d2e98ed 325`--sync-defaults-options` `[enable-new=<1|0>] [,full=<1|0>] [,purge=<1|0>] [,remove-vanished=([acl];[properties];[entry])|none] [,scope=<users|groups|both>]` ::
c5aa7e14
TL
326
327The default options for behavior of synchronizations.
328
329`--sync_attributes` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
330
331Comma separated list of key=value pairs for specifying which LDAP attributes map to which PVE user field. For example, to map the LDAP attribute 'mail' to PVEs 'email', write 'email=mail'. By default, each PVE user field is represented by an LDAP attribute of the same name.
332
333`--tfa` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
334
335Use Two-factor authentication.
336
34f3e481 337`--type` `<ad | ldap | openid | pam | pve>` ::
c5aa7e14
TL
338
339Realm type.
340
341`--user_attr` `\S{2,}` ::
342
343LDAP user attribute name
344
345`--user_classes` `<string>` ('default =' `inetorgperson, posixaccount, person, user`)::
346
347The objectclasses for users.
348
c30bb419 349`--username-claim` `<string>` ::
34f3e481
TL
350
351OpenID claim used to generate the unique username.
352
c5aa7e14
TL
353`--verify` `<boolean>` ('default =' `0`)::
354
355Verify the server's SSL certificate
356
357*pveum realm delete* `<realm>`
358
359Delete an authentication server.
360
361`<realm>`: `<string>` ::
362
363Authentication domain ID
364
365*pveum realm list* `[FORMAT_OPTIONS]`
366
367Authentication domain index.
368
369*pveum realm modify* `<realm>` `[OPTIONS]`
370
371Update authentication server settings.
372
373`<realm>`: `<string>` ::
374
375Authentication domain ID
376
c30bb419
TL
377`--acr-values` `<string>` ::
378
379Specifies the Authentication Context Class Reference values that theAuthorization Server is being requested to use for the Auth Request.
380
34f3e481
TL
381`--autocreate` `<boolean>` ('default =' `0`)::
382
383Automatically create users if they do not exist.
384
82551b2b 385`--base_dn` `<string>` ::
c5aa7e14
TL
386
387LDAP base domain name
388
82551b2b 389`--bind_dn` `<string>` ::
c5aa7e14
TL
390
391LDAP bind domain name
392
393`--capath` `<string>` ('default =' `/etc/ssl/certs`)::
394
395Path to the CA certificate store
396
4772952b
TL
397`--case-sensitive` `<boolean>` ('default =' `1`)::
398
399username is case-sensitive
400
c5aa7e14
TL
401`--cert` `<string>` ::
402
403Path to the client certificate
404
405`--certkey` `<string>` ::
406
407Path to the client certificate key
408
82551b2b
TL
409`--check-connection` `<boolean>` ('default =' `0`)::
410
411Check bind connection to the server.
412
34f3e481
TL
413`--client-id` `<string>` ::
414
415OpenID Client ID
416
417`--client-key` `<string>` ::
418
419OpenID Client Key
420
c5aa7e14
TL
421`--comment` `<string>` ::
422
423Description.
424
425`--default` `<boolean>` ::
426
427Use this as default realm
428
429`--delete` `<string>` ::
430
431A list of settings you want to delete.
432
433`--digest` `<string>` ::
434
82551b2b 435Prevent changes if current configuration file has a different digest. This can be used to prevent concurrent modifications.
c5aa7e14
TL
436
437`--domain` `\S+` ::
438
439AD domain name
440
441`--filter` `<string>` ::
442
443LDAP filter for user sync.
444
445`--group_classes` `<string>` ('default =' `groupOfNames, group, univentionGroup, ipausergroup`)::
446
447The objectclasses for groups.
448
82551b2b 449`--group_dn` `<string>` ::
c5aa7e14
TL
450
451LDAP base domain name for group sync. If not set, the base_dn will be used.
452
453`--group_filter` `<string>` ::
454
455LDAP filter for group sync.
456
457`--group_name_attr` `<string>` ::
458
459LDAP attribute representing a groups name. If not set or found, the first value of the DN will be used as name.
460
34f3e481
TL
461`--issuer-url` `<string>` ::
462
463OpenID Issuer Url
464
c5aa7e14
TL
465`--mode` `<ldap | ldap+starttls | ldaps>` ('default =' `ldap`)::
466
467LDAP protocol mode.
468
469`--password` `<string>` ::
470
471LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
472
473`--port` `<integer> (1 - 65535)` ::
474
475Server port.
476
c30bb419
TL
477`--prompt` `(?:none|login|consent|select_account|\S+)` ::
478
479Specifies whether the Authorization Server prompts the End-User for reauthentication and consent.
480
481`--scopes` `<string>` ('default =' `email profile`)::
482
483Specifies the scopes (user details) that should be authorized and returned, for example 'email' or 'profile'.
484
c5aa7e14
TL
485`--secure` `<boolean>` ::
486
487Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
488
489`--server1` `<string>` ::
490
491Server IP address (or DNS name)
492
493`--server2` `<string>` ::
494
495Fallback Server IP address (or DNS name)
496
497`--sslversion` `<tlsv1 | tlsv1_1 | tlsv1_2 | tlsv1_3>` ::
498
499LDAPS TLS/SSL version. It's not recommended to use version older than 1.2!
500
9d2e98ed 501`--sync-defaults-options` `[enable-new=<1|0>] [,full=<1|0>] [,purge=<1|0>] [,remove-vanished=([acl];[properties];[entry])|none] [,scope=<users|groups|both>]` ::
c5aa7e14
TL
502
503The default options for behavior of synchronizations.
504
505`--sync_attributes` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
506
507Comma separated list of key=value pairs for specifying which LDAP attributes map to which PVE user field. For example, to map the LDAP attribute 'mail' to PVEs 'email', write 'email=mail'. By default, each PVE user field is represented by an LDAP attribute of the same name.
508
509`--tfa` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
510
511Use Two-factor authentication.
512
513`--user_attr` `\S{2,}` ::
514
515LDAP user attribute name
516
517`--user_classes` `<string>` ('default =' `inetorgperson, posixaccount, person, user`)::
518
519The objectclasses for users.
520
521`--verify` `<boolean>` ('default =' `0`)::
522
523Verify the server's SSL certificate
524
525*pveum realm sync* `<realm>` `[OPTIONS]`
526
527Syncs users and/or groups from the configured LDAP to user.cfg. NOTE:
528Synced groups will have the name 'name-$realm', so make sure those groups
529do not exist to prevent overwriting.
530
531`<realm>`: `<string>` ::
532
533Authentication domain ID
534
535`--dry-run` `<boolean>` ('default =' `0`)::
536
537If set, does not write anything.
538
539`--enable-new` `<boolean>` ('default =' `1`)::
540
541Enable newly synced users immediately.
542
543`--full` `<boolean>` ::
544
7af2edf9 545DEPRECATED: use 'remove-vanished' instead. If set, uses the LDAP Directory as source of truth, deleting users or groups not returned from the sync and removing all locally modified properties of synced users. If not set, only syncs information which is present in the synced data, and does not delete or modify anything else.
c5aa7e14
TL
546
547`--purge` `<boolean>` ::
548
7af2edf9
TL
549DEPRECATED: use 'remove-vanished' instead. Remove ACLs for users or groups which were removed from the config during a sync.
550
9d2e98ed 551`--remove-vanished` `([acl];[properties];[entry])|none` ('default =' `none`)::
7af2edf9 552
9d2e98ed 553A semicolon-seperated list of things to remove when they or the user vanishes during a sync. The following values are possible: 'entry' removes the user/group when not returned from the sync. 'properties' removes the set properties on existing user/group that do not appear in the source (even custom ones). 'acl' removes acls when the user/group is not returned from the sync. Instead of a list it also can be 'none' (the default).
c5aa7e14
TL
554
555`--scope` `<both | groups | users>` ::
556
557Select what to sync.
558
e2d681b3 559*pveum role add* `<roleid>` `[OPTIONS]`
1f554f76
DM
560
561Create new role.
562
013dc89f 563`<roleid>`: `<string>` ::
1f554f76
DM
564
565no description available
566
2489d6df 567`--privs` `<string>` ::
1f554f76
DM
568
569no description available
570
e2d681b3 571*pveum role delete* `<roleid>`
1f554f76
DM
572
573Delete role.
574
013dc89f 575`<roleid>`: `<string>` ::
1f554f76
DM
576
577no description available
578
5c1699e5
TL
579*pveum role list* `[FORMAT_OPTIONS]`
580
581Role index.
582
e2d681b3 583*pveum role modify* `<roleid>` `[OPTIONS]`
1f554f76 584
e2d681b3 585Update an existing role.
1f554f76 586
013dc89f 587`<roleid>`: `<string>` ::
1f554f76
DM
588
589no description available
590
2489d6df 591`--append` `<boolean>` ::
1f554f76
DM
592
593no description available
594+
595NOTE: Requires option(s): `privs`
596
2489d6df 597`--privs` `<string>` ::
1f554f76
DM
598
599no description available
600
e2d681b3
TL
601*pveum roleadd*
602
603An alias for 'pveum role add'.
604
605*pveum roledel*
606
607An alias for 'pveum role delete'.
608
609*pveum rolemod*
610
611An alias for 'pveum role modify'.
612
1f554f76
DM
613*pveum ticket* `<username>` `[OPTIONS]`
614
615Create or verify authentication ticket.
616
013dc89f 617`<username>`: `<string>` ::
1f554f76
DM
618
619User name
620
4a407cfd 621`--new-format` `<boolean>` ('default =' `1`)::
5370fa8c 622
4a407cfd 623This parameter is now ignored and assumed to be 1.
5370fa8c 624
2489d6df 625`--otp` `<string>` ::
1f554f76
DM
626
627One-time password for Two-factor authentication.
628
2489d6df 629`--path` `<string>` ::
1f554f76
DM
630
631Verify ticket, and check if user have access 'privs' on 'path'
632+
633NOTE: Requires option(s): `privs`
634
2489d6df 635`--privs` `<string>` ::
1f554f76
DM
636
637Verify ticket, and check if user have access 'privs' on 'path'
638+
639NOTE: Requires option(s): `path`
640
2489d6df 641`--realm` `<string>` ::
1f554f76 642
c2993fe5 643You can optionally pass the realm using this parameter. Normally the realm is simply added to the username <username>@<relam>.
1f554f76 644
5370fa8c
TL
645`--tfa-challenge` `<string>` ::
646
647The signed TFA challenge string the user wants to respond to.
648
e2d681b3 649*pveum user add* `<userid>` `[OPTIONS]`
1f554f76
DM
650
651Create new user.
652
013dc89f 653`<userid>`: `<string>` ::
1f554f76 654
9d2e98ed 655Full User ID, in the `name@realm` format.
1f554f76 656
2489d6df 657`--comment` `<string>` ::
1f554f76
DM
658
659no description available
660
2489d6df 661`--email` `<string>` ::
1f554f76
DM
662
663no description available
664
2489d6df 665`--enable` `<boolean>` ('default =' `1`)::
1f554f76 666
e2d681b3 667Enable the account (default). You can set this to '0' to disable the account
1f554f76 668
2489d6df 669`--expire` `<integer> (0 - N)` ::
1f554f76 670
c2993fe5 671Account expiration date (seconds since epoch). '0' means no expiration date.
1f554f76 672
2489d6df 673`--firstname` `<string>` ::
1f554f76
DM
674
675no description available
676
2489d6df 677`--groups` `<string>` ::
1f554f76
DM
678
679no description available
680
2489d6df 681`--keys` `<string>` ::
1f554f76
DM
682
683Keys for two factor auth (yubico).
684
2489d6df 685`--lastname` `<string>` ::
1f554f76
DM
686
687no description available
688
e2d681b3 689`--password` `<string>` ::
1f554f76
DM
690
691Initial password.
692
e2d681b3 693*pveum user delete* `<userid>`
1f554f76
DM
694
695Delete user.
696
013dc89f 697`<userid>`: `<string>` ::
1f554f76 698
9d2e98ed 699Full User ID, in the `name@realm` format.
1f554f76 700
5c1699e5
TL
701*pveum user list* `[OPTIONS]` `[FORMAT_OPTIONS]`
702
703User index.
704
705`--enabled` `<boolean>` ::
706
707Optional filter for enable property.
708
e9cd3bd4
TL
709`--full` `<boolean>` ('default =' `0`)::
710
711Include group and token information.
712
e2d681b3 713*pveum user modify* `<userid>` `[OPTIONS]`
1f554f76
DM
714
715Update user configuration.
716
013dc89f 717`<userid>`: `<string>` ::
1f554f76 718
9d2e98ed 719Full User ID, in the `name@realm` format.
1f554f76 720
2489d6df 721`--append` `<boolean>` ::
1f554f76
DM
722
723no description available
724+
725NOTE: Requires option(s): `groups`
726
2489d6df 727`--comment` `<string>` ::
1f554f76
DM
728
729no description available
730
2489d6df 731`--email` `<string>` ::
1f554f76
DM
732
733no description available
734
e2d681b3 735`--enable` `<boolean>` ('default =' `1`)::
1f554f76 736
e2d681b3 737Enable the account (default). You can set this to '0' to disable the account
1f554f76 738
2489d6df 739`--expire` `<integer> (0 - N)` ::
1f554f76 740
c2993fe5 741Account expiration date (seconds since epoch). '0' means no expiration date.
1f554f76 742
2489d6df 743`--firstname` `<string>` ::
1f554f76
DM
744
745no description available
746
2489d6df 747`--groups` `<string>` ::
1f554f76
DM
748
749no description available
750
2489d6df 751`--keys` `<string>` ::
1f554f76
DM
752
753Keys for two factor auth (yubico).
754
2489d6df 755`--lastname` `<string>` ::
1f554f76
DM
756
757no description available
758
e9cd3bd4
TL
759*pveum user permissions* `[<userid>]` `[OPTIONS]` `[FORMAT_OPTIONS]`
760
761Retrieve effective permissions of given user/token.
762
763`<userid>`: `(?^:^(?^:[^\s:/]+)\@(?^:[A-Za-z][A-Za-z0-9\.\-_]+)(?:!(?^:[A-Za-z][A-Za-z0-9\.\-_]+))?$)` ::
764
765User ID or full API token ID
766
767`--path` `<string>` ::
768
769Only dump this specific path, not the whole tree.
770
ac70d7d1
TL
771*pveum user tfa delete* `<userid>` `[OPTIONS]`
772
5370fa8c 773Delete TFA entries from a user.
ac70d7d1
TL
774
775`<userid>`: `<string>` ::
776
9d2e98ed 777Full User ID, in the `name@realm` format.
ac70d7d1 778
5370fa8c 779`--id` `<string>` ::
ac70d7d1 780
5370fa8c 781The TFA ID, if none provided, all TFA entries will be deleted.
ac70d7d1 782
4a407cfd
TL
783*pveum user tfa list* `[<userid>]`
784
785List TFA entries.
786
787`<userid>`: `<string>` ::
788
789Full User ID, in the `name@realm` format.
790
791*pveum user tfa unlock* `<userid>`
792
793Unlock a user's TFA authentication.
794
795`<userid>`: `<string>` ::
796
797Full User ID, in the `name@realm` format.
798
e9cd3bd4
TL
799*pveum user token add* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
800
801Generate a new API token for a specific user. NOTE: returns API token
802value, which needs to be stored as it cannot be retrieved afterwards!
803
804`<userid>`: `<string>` ::
805
9d2e98ed 806Full User ID, in the `name@realm` format.
e9cd3bd4
TL
807
808`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
809
810User-specific token identifier.
811
812`--comment` `<string>` ::
813
814no description available
815
816`--expire` `<integer> (0 - N)` ('default =' `same as user`)::
817
818API token expiration date (seconds since epoch). '0' means no expiration date.
819
820`--privsep` `<boolean>` ('default =' `1`)::
821
822Restrict API token privileges with separate ACLs (default), or give full privileges of corresponding user.
823
824*pveum user token list* `<userid>` `[FORMAT_OPTIONS]`
825
826Get user API tokens.
827
828`<userid>`: `<string>` ::
829
9d2e98ed 830Full User ID, in the `name@realm` format.
e9cd3bd4
TL
831
832*pveum user token modify* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
833
834Update API token for a specific user.
835
836`<userid>`: `<string>` ::
837
9d2e98ed 838Full User ID, in the `name@realm` format.
e9cd3bd4
TL
839
840`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
841
842User-specific token identifier.
843
844`--comment` `<string>` ::
845
846no description available
847
848`--expire` `<integer> (0 - N)` ('default =' `same as user`)::
849
850API token expiration date (seconds since epoch). '0' means no expiration date.
851
852`--privsep` `<boolean>` ('default =' `1`)::
853
854Restrict API token privileges with separate ACLs (default), or give full privileges of corresponding user.
855
856*pveum user token permissions* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
857
858Retrieve effective permissions of given token.
859
860`<userid>`: `<string>` ::
861
9d2e98ed 862Full User ID, in the `name@realm` format.
e9cd3bd4
TL
863
864`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
865
866User-specific token identifier.
867
868`--path` `<string>` ::
869
870Only dump this specific path, not the whole tree.
871
872*pveum user token remove* `<userid> <tokenid>` `[FORMAT_OPTIONS]`
873
874Remove API token for a specific user.
875
876`<userid>`: `<string>` ::
877
9d2e98ed 878Full User ID, in the `name@realm` format.
e9cd3bd4
TL
879
880`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
881
882User-specific token identifier.
883
e2d681b3
TL
884*pveum useradd*
885
886An alias for 'pveum user add'.
887
888*pveum userdel*
889
890An alias for 'pveum user delete'.
891
892*pveum usermod*
893
894An alias for 'pveum user modify'.
895
1f554f76 896