]> git.proxmox.com Git - pve-docs.git/blame_incremental - pveum.1-synopsis.adoc
ui: reword user-menu header docs
[pve-docs.git] / pveum.1-synopsis.adoc
... / ...
CommitLineData
1*pveum* `<COMMAND> [ARGS] [OPTIONS]`
2
3*pveum acl delete* `<path> --roles <string>` `[OPTIONS]`
4
5Update Access Control List (add or remove permissions).
6
7`<path>`: `<string>` ::
8
9Access control path
10
11`--groups` `<string>` ::
12
13List of groups.
14
15`--propagate` `<boolean>` ('default =' `1`)::
16
17Allow to propagate (inherit) permissions.
18
19`--roles` `<string>` ::
20
21List of roles.
22
23`--tokens` `<string>` ::
24
25List of API tokens.
26
27`--users` `<string>` ::
28
29List of users.
30
31*pveum acl list* `[FORMAT_OPTIONS]`
32
33Get Access Control List (ACLs).
34
35*pveum acl modify* `<path> --roles <string>` `[OPTIONS]`
36
37Update Access Control List (add or remove permissions).
38
39`<path>`: `<string>` ::
40
41Access control path
42
43`--groups` `<string>` ::
44
45List of groups.
46
47`--propagate` `<boolean>` ('default =' `1`)::
48
49Allow to propagate (inherit) permissions.
50
51`--roles` `<string>` ::
52
53List of roles.
54
55`--tokens` `<string>` ::
56
57List of API tokens.
58
59`--users` `<string>` ::
60
61List of users.
62
63*pveum acldel*
64
65An alias for 'pveum acl delete'.
66
67*pveum aclmod*
68
69An alias for 'pveum acl modify'.
70
71*pveum group add* `<groupid>` `[OPTIONS]`
72
73Create new group.
74
75`<groupid>`: `<string>` ::
76
77no description available
78
79`--comment` `<string>` ::
80
81no description available
82
83*pveum group delete* `<groupid>`
84
85Delete group.
86
87`<groupid>`: `<string>` ::
88
89no description available
90
91*pveum group list* `[FORMAT_OPTIONS]`
92
93Group index.
94
95*pveum group modify* `<groupid>` `[OPTIONS]`
96
97Update group data.
98
99`<groupid>`: `<string>` ::
100
101no description available
102
103`--comment` `<string>` ::
104
105no description available
106
107*pveum groupadd*
108
109An alias for 'pveum group add'.
110
111*pveum groupdel*
112
113An alias for 'pveum group delete'.
114
115*pveum groupmod*
116
117An alias for 'pveum group modify'.
118
119*pveum help* `[OPTIONS]`
120
121Get help about specified command.
122
123`--extra-args` `<array>` ::
124
125Shows help for a specific command
126
127`--verbose` `<boolean>` ::
128
129Verbose output format.
130
131*pveum passwd* `<userid>`
132
133Change user password.
134
135`<userid>`: `<string>` ::
136
137Full User ID, in the `name@realm` format.
138
139*pveum pool add* `<poolid>` `[OPTIONS]`
140
141Create new pool.
142
143`<poolid>`: `<string>` ::
144
145no description available
146
147`--comment` `<string>` ::
148
149no description available
150
151*pveum pool delete* `<poolid>`
152
153Delete pool.
154
155`<poolid>`: `<string>` ::
156
157no description available
158
159*pveum pool list* `[FORMAT_OPTIONS]`
160
161Pool index.
162
163*pveum pool modify* `<poolid>` `[OPTIONS]`
164
165Update pool data.
166
167`<poolid>`: `<string>` ::
168
169no description available
170
171`--allow-move` `<boolean>` ('default =' `0`)::
172
173Allow adding a guest even if already in another pool. The guest will be removed from its current pool and added to this one.
174
175`--comment` `<string>` ::
176
177no description available
178
179`--delete` `<boolean>` ('default =' `0`)::
180
181Remove the passed VMIDs and/or storage IDs instead of adding them.
182
183`--storage` `<string>` ::
184
185List of storage IDs to add or remove from this pool.
186
187`--vms` `<string>` ::
188
189List of guest VMIDs to add or remove from this pool.
190
191*pveum realm add* `<realm> --type <string>` `[OPTIONS]`
192
193Add an authentication server.
194
195`<realm>`: `<string>` ::
196
197Authentication domain ID
198
199`--acr-values` `<string>` ::
200
201Specifies the Authentication Context Class Reference values that theAuthorization Server is being requested to use for the Auth Request.
202
203`--autocreate` `<boolean>` ('default =' `0`)::
204
205Automatically create users if they do not exist.
206
207`--base_dn` `<string>` ::
208
209LDAP base domain name
210
211`--bind_dn` `<string>` ::
212
213LDAP bind domain name
214
215`--capath` `<string>` ('default =' `/etc/ssl/certs`)::
216
217Path to the CA certificate store
218
219`--case-sensitive` `<boolean>` ('default =' `1`)::
220
221username is case-sensitive
222
223`--cert` `<string>` ::
224
225Path to the client certificate
226
227`--certkey` `<string>` ::
228
229Path to the client certificate key
230
231`--check-connection` `<boolean>` ('default =' `0`)::
232
233Check bind connection to the server.
234
235`--client-id` `<string>` ::
236
237OpenID Client ID
238
239`--client-key` `<string>` ::
240
241OpenID Client Key
242
243`--comment` `<string>` ::
244
245Description.
246
247`--default` `<boolean>` ::
248
249Use this as default realm
250
251`--domain` `\S+` ::
252
253AD domain name
254
255`--filter` `<string>` ::
256
257LDAP filter for user sync.
258
259`--group_classes` `<string>` ('default =' `groupOfNames, group, univentionGroup, ipausergroup`)::
260
261The objectclasses for groups.
262
263`--group_dn` `<string>` ::
264
265LDAP base domain name for group sync. If not set, the base_dn will be used.
266
267`--group_filter` `<string>` ::
268
269LDAP filter for group sync.
270
271`--group_name_attr` `<string>` ::
272
273LDAP attribute representing a groups name. If not set or found, the first value of the DN will be used as name.
274
275`--issuer-url` `<string>` ::
276
277OpenID Issuer Url
278
279`--mode` `<ldap | ldap+starttls | ldaps>` ('default =' `ldap`)::
280
281LDAP protocol mode.
282
283`--password` `<string>` ::
284
285LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
286
287`--port` `<integer> (1 - 65535)` ::
288
289Server port.
290
291`--prompt` `(?:none|login|consent|select_account|\S+)` ::
292
293Specifies whether the Authorization Server prompts the End-User for reauthentication and consent.
294
295`--scopes` `<string>` ('default =' `email profile`)::
296
297Specifies the scopes (user details) that should be authorized and returned, for example 'email' or 'profile'.
298
299`--secure` `<boolean>` ::
300
301Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
302
303`--server1` `<string>` ::
304
305Server IP address (or DNS name)
306
307`--server2` `<string>` ::
308
309Fallback Server IP address (or DNS name)
310
311`--sslversion` `<tlsv1 | tlsv1_1 | tlsv1_2 | tlsv1_3>` ::
312
313LDAPS TLS/SSL version. It's not recommended to use version older than 1.2!
314
315`--sync-defaults-options` `[enable-new=<1|0>] [,full=<1|0>] [,purge=<1|0>] [,remove-vanished=([acl];[properties];[entry])|none] [,scope=<users|groups|both>]` ::
316
317The default options for behavior of synchronizations.
318
319`--sync_attributes` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
320
321Comma separated list of key=value pairs for specifying which LDAP attributes map to which PVE user field. For example, to map the LDAP attribute 'mail' to PVEs 'email', write 'email=mail'. By default, each PVE user field is represented by an LDAP attribute of the same name.
322
323`--tfa` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
324
325Use Two-factor authentication.
326
327`--type` `<ad | ldap | openid | pam | pve>` ::
328
329Realm type.
330
331`--user_attr` `\S{2,}` ::
332
333LDAP user attribute name
334
335`--user_classes` `<string>` ('default =' `inetorgperson, posixaccount, person, user`)::
336
337The objectclasses for users.
338
339`--username-claim` `<string>` ::
340
341OpenID claim used to generate the unique username.
342
343`--verify` `<boolean>` ('default =' `0`)::
344
345Verify the server's SSL certificate
346
347*pveum realm delete* `<realm>`
348
349Delete an authentication server.
350
351`<realm>`: `<string>` ::
352
353Authentication domain ID
354
355*pveum realm list* `[FORMAT_OPTIONS]`
356
357Authentication domain index.
358
359*pveum realm modify* `<realm>` `[OPTIONS]`
360
361Update authentication server settings.
362
363`<realm>`: `<string>` ::
364
365Authentication domain ID
366
367`--acr-values` `<string>` ::
368
369Specifies the Authentication Context Class Reference values that theAuthorization Server is being requested to use for the Auth Request.
370
371`--autocreate` `<boolean>` ('default =' `0`)::
372
373Automatically create users if they do not exist.
374
375`--base_dn` `<string>` ::
376
377LDAP base domain name
378
379`--bind_dn` `<string>` ::
380
381LDAP bind domain name
382
383`--capath` `<string>` ('default =' `/etc/ssl/certs`)::
384
385Path to the CA certificate store
386
387`--case-sensitive` `<boolean>` ('default =' `1`)::
388
389username is case-sensitive
390
391`--cert` `<string>` ::
392
393Path to the client certificate
394
395`--certkey` `<string>` ::
396
397Path to the client certificate key
398
399`--check-connection` `<boolean>` ('default =' `0`)::
400
401Check bind connection to the server.
402
403`--client-id` `<string>` ::
404
405OpenID Client ID
406
407`--client-key` `<string>` ::
408
409OpenID Client Key
410
411`--comment` `<string>` ::
412
413Description.
414
415`--default` `<boolean>` ::
416
417Use this as default realm
418
419`--delete` `<string>` ::
420
421A list of settings you want to delete.
422
423`--digest` `<string>` ::
424
425Prevent changes if current configuration file has a different digest. This can be used to prevent concurrent modifications.
426
427`--domain` `\S+` ::
428
429AD domain name
430
431`--filter` `<string>` ::
432
433LDAP filter for user sync.
434
435`--group_classes` `<string>` ('default =' `groupOfNames, group, univentionGroup, ipausergroup`)::
436
437The objectclasses for groups.
438
439`--group_dn` `<string>` ::
440
441LDAP base domain name for group sync. If not set, the base_dn will be used.
442
443`--group_filter` `<string>` ::
444
445LDAP filter for group sync.
446
447`--group_name_attr` `<string>` ::
448
449LDAP attribute representing a groups name. If not set or found, the first value of the DN will be used as name.
450
451`--issuer-url` `<string>` ::
452
453OpenID Issuer Url
454
455`--mode` `<ldap | ldap+starttls | ldaps>` ('default =' `ldap`)::
456
457LDAP protocol mode.
458
459`--password` `<string>` ::
460
461LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
462
463`--port` `<integer> (1 - 65535)` ::
464
465Server port.
466
467`--prompt` `(?:none|login|consent|select_account|\S+)` ::
468
469Specifies whether the Authorization Server prompts the End-User for reauthentication and consent.
470
471`--scopes` `<string>` ('default =' `email profile`)::
472
473Specifies the scopes (user details) that should be authorized and returned, for example 'email' or 'profile'.
474
475`--secure` `<boolean>` ::
476
477Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
478
479`--server1` `<string>` ::
480
481Server IP address (or DNS name)
482
483`--server2` `<string>` ::
484
485Fallback Server IP address (or DNS name)
486
487`--sslversion` `<tlsv1 | tlsv1_1 | tlsv1_2 | tlsv1_3>` ::
488
489LDAPS TLS/SSL version. It's not recommended to use version older than 1.2!
490
491`--sync-defaults-options` `[enable-new=<1|0>] [,full=<1|0>] [,purge=<1|0>] [,remove-vanished=([acl];[properties];[entry])|none] [,scope=<users|groups|both>]` ::
492
493The default options for behavior of synchronizations.
494
495`--sync_attributes` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
496
497Comma separated list of key=value pairs for specifying which LDAP attributes map to which PVE user field. For example, to map the LDAP attribute 'mail' to PVEs 'email', write 'email=mail'. By default, each PVE user field is represented by an LDAP attribute of the same name.
498
499`--tfa` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
500
501Use Two-factor authentication.
502
503`--user_attr` `\S{2,}` ::
504
505LDAP user attribute name
506
507`--user_classes` `<string>` ('default =' `inetorgperson, posixaccount, person, user`)::
508
509The objectclasses for users.
510
511`--verify` `<boolean>` ('default =' `0`)::
512
513Verify the server's SSL certificate
514
515*pveum realm sync* `<realm>` `[OPTIONS]`
516
517Syncs users and/or groups from the configured LDAP to user.cfg. NOTE:
518Synced groups will have the name 'name-$realm', so make sure those groups
519do not exist to prevent overwriting.
520
521`<realm>`: `<string>` ::
522
523Authentication domain ID
524
525`--dry-run` `<boolean>` ('default =' `0`)::
526
527If set, does not write anything.
528
529`--enable-new` `<boolean>` ('default =' `1`)::
530
531Enable newly synced users immediately.
532
533`--full` `<boolean>` ::
534
535DEPRECATED: use 'remove-vanished' instead. If set, uses the LDAP Directory as source of truth, deleting users or groups not returned from the sync and removing all locally modified properties of synced users. If not set, only syncs information which is present in the synced data, and does not delete or modify anything else.
536
537`--purge` `<boolean>` ::
538
539DEPRECATED: use 'remove-vanished' instead. Remove ACLs for users or groups which were removed from the config during a sync.
540
541`--remove-vanished` `([acl];[properties];[entry])|none` ('default =' `none`)::
542
543A semicolon-seperated list of things to remove when they or the user vanishes during a sync. The following values are possible: 'entry' removes the user/group when not returned from the sync. 'properties' removes the set properties on existing user/group that do not appear in the source (even custom ones). 'acl' removes acls when the user/group is not returned from the sync. Instead of a list it also can be 'none' (the default).
544
545`--scope` `<both | groups | users>` ::
546
547Select what to sync.
548
549*pveum role add* `<roleid>` `[OPTIONS]`
550
551Create new role.
552
553`<roleid>`: `<string>` ::
554
555no description available
556
557`--privs` `<string>` ::
558
559no description available
560
561*pveum role delete* `<roleid>`
562
563Delete role.
564
565`<roleid>`: `<string>` ::
566
567no description available
568
569*pveum role list* `[FORMAT_OPTIONS]`
570
571Role index.
572
573*pveum role modify* `<roleid>` `[OPTIONS]`
574
575Update an existing role.
576
577`<roleid>`: `<string>` ::
578
579no description available
580
581`--append` `<boolean>` ::
582
583no description available
584+
585NOTE: Requires option(s): `privs`
586
587`--privs` `<string>` ::
588
589no description available
590
591*pveum roleadd*
592
593An alias for 'pveum role add'.
594
595*pveum roledel*
596
597An alias for 'pveum role delete'.
598
599*pveum rolemod*
600
601An alias for 'pveum role modify'.
602
603*pveum ticket* `<username>` `[OPTIONS]`
604
605Create or verify authentication ticket.
606
607`<username>`: `<string>` ::
608
609User name
610
611`--new-format` `<boolean>` ('default =' `1`)::
612
613This parameter is now ignored and assumed to be 1.
614
615`--otp` `<string>` ::
616
617One-time password for Two-factor authentication.
618
619`--path` `<string>` ::
620
621Verify ticket, and check if user have access 'privs' on 'path'
622+
623NOTE: Requires option(s): `privs`
624
625`--privs` `<string>` ::
626
627Verify ticket, and check if user have access 'privs' on 'path'
628+
629NOTE: Requires option(s): `path`
630
631`--realm` `<string>` ::
632
633You can optionally pass the realm using this parameter. Normally the realm is simply added to the username <username>@<relam>.
634
635`--tfa-challenge` `<string>` ::
636
637The signed TFA challenge string the user wants to respond to.
638
639*pveum user add* `<userid>` `[OPTIONS]`
640
641Create new user.
642
643`<userid>`: `<string>` ::
644
645Full User ID, in the `name@realm` format.
646
647`--comment` `<string>` ::
648
649no description available
650
651`--email` `<string>` ::
652
653no description available
654
655`--enable` `<boolean>` ('default =' `1`)::
656
657Enable the account (default). You can set this to '0' to disable the account
658
659`--expire` `<integer> (0 - N)` ::
660
661Account expiration date (seconds since epoch). '0' means no expiration date.
662
663`--firstname` `<string>` ::
664
665no description available
666
667`--groups` `<string>` ::
668
669no description available
670
671`--keys` `<string>` ::
672
673Keys for two factor auth (yubico).
674
675`--lastname` `<string>` ::
676
677no description available
678
679`--password` `<string>` ::
680
681Initial password.
682
683*pveum user delete* `<userid>`
684
685Delete user.
686
687`<userid>`: `<string>` ::
688
689Full User ID, in the `name@realm` format.
690
691*pveum user list* `[OPTIONS]` `[FORMAT_OPTIONS]`
692
693User index.
694
695`--enabled` `<boolean>` ::
696
697Optional filter for enable property.
698
699`--full` `<boolean>` ('default =' `0`)::
700
701Include group and token information.
702
703*pveum user modify* `<userid>` `[OPTIONS]`
704
705Update user configuration.
706
707`<userid>`: `<string>` ::
708
709Full User ID, in the `name@realm` format.
710
711`--append` `<boolean>` ::
712
713no description available
714+
715NOTE: Requires option(s): `groups`
716
717`--comment` `<string>` ::
718
719no description available
720
721`--email` `<string>` ::
722
723no description available
724
725`--enable` `<boolean>` ('default =' `1`)::
726
727Enable the account (default). You can set this to '0' to disable the account
728
729`--expire` `<integer> (0 - N)` ::
730
731Account expiration date (seconds since epoch). '0' means no expiration date.
732
733`--firstname` `<string>` ::
734
735no description available
736
737`--groups` `<string>` ::
738
739no description available
740
741`--keys` `<string>` ::
742
743Keys for two factor auth (yubico).
744
745`--lastname` `<string>` ::
746
747no description available
748
749*pveum user permissions* `[<userid>]` `[OPTIONS]` `[FORMAT_OPTIONS]`
750
751Retrieve effective permissions of given user/token.
752
753`<userid>`: `(?^:^(?^:[^\s:/]+)\@(?^:[A-Za-z][A-Za-z0-9\.\-_]+)(?:!(?^:[A-Za-z][A-Za-z0-9\.\-_]+))?$)` ::
754
755User ID or full API token ID
756
757`--path` `<string>` ::
758
759Only dump this specific path, not the whole tree.
760
761*pveum user tfa delete* `<userid>` `[OPTIONS]`
762
763Delete TFA entries from a user.
764
765`<userid>`: `<string>` ::
766
767Full User ID, in the `name@realm` format.
768
769`--id` `<string>` ::
770
771The TFA ID, if none provided, all TFA entries will be deleted.
772
773*pveum user tfa list* `[<userid>]`
774
775List TFA entries.
776
777`<userid>`: `<string>` ::
778
779Full User ID, in the `name@realm` format.
780
781*pveum user tfa unlock* `<userid>`
782
783Unlock a user's TFA authentication.
784
785`<userid>`: `<string>` ::
786
787Full User ID, in the `name@realm` format.
788
789*pveum user token add* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
790
791Generate a new API token for a specific user. NOTE: returns API token
792value, which needs to be stored as it cannot be retrieved afterwards!
793
794`<userid>`: `<string>` ::
795
796Full User ID, in the `name@realm` format.
797
798`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
799
800User-specific token identifier.
801
802`--comment` `<string>` ::
803
804no description available
805
806`--expire` `<integer> (0 - N)` ('default =' `same as user`)::
807
808API token expiration date (seconds since epoch). '0' means no expiration date.
809
810`--privsep` `<boolean>` ('default =' `1`)::
811
812Restrict API token privileges with separate ACLs (default), or give full privileges of corresponding user.
813
814*pveum user token list* `<userid>` `[FORMAT_OPTIONS]`
815
816Get user API tokens.
817
818`<userid>`: `<string>` ::
819
820Full User ID, in the `name@realm` format.
821
822*pveum user token modify* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
823
824Update API token for a specific user.
825
826`<userid>`: `<string>` ::
827
828Full User ID, in the `name@realm` format.
829
830`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
831
832User-specific token identifier.
833
834`--comment` `<string>` ::
835
836no description available
837
838`--expire` `<integer> (0 - N)` ('default =' `same as user`)::
839
840API token expiration date (seconds since epoch). '0' means no expiration date.
841
842`--privsep` `<boolean>` ('default =' `1`)::
843
844Restrict API token privileges with separate ACLs (default), or give full privileges of corresponding user.
845
846*pveum user token permissions* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
847
848Retrieve effective permissions of given token.
849
850`<userid>`: `<string>` ::
851
852Full User ID, in the `name@realm` format.
853
854`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
855
856User-specific token identifier.
857
858`--path` `<string>` ::
859
860Only dump this specific path, not the whole tree.
861
862*pveum user token remove* `<userid> <tokenid>` `[FORMAT_OPTIONS]`
863
864Remove API token for a specific user.
865
866`<userid>`: `<string>` ::
867
868Full User ID, in the `name@realm` format.
869
870`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
871
872User-specific token identifier.
873
874*pveum useradd*
875
876An alias for 'pveum user add'.
877
878*pveum userdel*
879
880An alias for 'pveum user delete'.
881
882*pveum usermod*
883
884An alias for 'pveum user modify'.
885
886