]> git.proxmox.com Git - pve-docs.git/blame_incremental - pveum.1-synopsis.adoc
network: override device names: suggest running update-initramfs
[pve-docs.git] / pveum.1-synopsis.adoc
... / ...
CommitLineData
1*pveum* `<COMMAND> [ARGS] [OPTIONS]`
2
3*pveum acl delete* `<path> --roles <string>` `[OPTIONS]`
4
5Update Access Control List (add or remove permissions).
6
7`<path>`: `<string>` ::
8
9Access control path
10
11`--groups` `<string>` ::
12
13List of groups.
14
15`--propagate` `<boolean>` ('default =' `1`)::
16
17Allow to propagate (inherit) permissions.
18
19`--roles` `<string>` ::
20
21List of roles.
22
23`--tokens` `<string>` ::
24
25List of API tokens.
26
27`--users` `<string>` ::
28
29List of users.
30
31*pveum acl list* `[FORMAT_OPTIONS]`
32
33Get Access Control List (ACLs).
34
35*pveum acl modify* `<path> --roles <string>` `[OPTIONS]`
36
37Update Access Control List (add or remove permissions).
38
39`<path>`: `<string>` ::
40
41Access control path
42
43`--groups` `<string>` ::
44
45List of groups.
46
47`--propagate` `<boolean>` ('default =' `1`)::
48
49Allow to propagate (inherit) permissions.
50
51`--roles` `<string>` ::
52
53List of roles.
54
55`--tokens` `<string>` ::
56
57List of API tokens.
58
59`--users` `<string>` ::
60
61List of users.
62
63*pveum acldel*
64
65An alias for 'pveum acl delete'.
66
67*pveum aclmod*
68
69An alias for 'pveum acl modify'.
70
71*pveum group add* `<groupid>` `[OPTIONS]`
72
73Create new group.
74
75`<groupid>`: `<string>` ::
76
77no description available
78
79`--comment` `<string>` ::
80
81no description available
82
83*pveum group delete* `<groupid>`
84
85Delete group.
86
87`<groupid>`: `<string>` ::
88
89no description available
90
91*pveum group list* `[FORMAT_OPTIONS]`
92
93Group index.
94
95*pveum group modify* `<groupid>` `[OPTIONS]`
96
97Update group data.
98
99`<groupid>`: `<string>` ::
100
101no description available
102
103`--comment` `<string>` ::
104
105no description available
106
107*pveum groupadd*
108
109An alias for 'pveum group add'.
110
111*pveum groupdel*
112
113An alias for 'pveum group delete'.
114
115*pveum groupmod*
116
117An alias for 'pveum group modify'.
118
119*pveum help* `[OPTIONS]`
120
121Get help about specified command.
122
123`--extra-args` `<array>` ::
124
125Shows help for a specific command
126
127`--verbose` `<boolean>` ::
128
129Verbose output format.
130
131*pveum passwd* `<userid>` `[OPTIONS]`
132
133Change user password.
134
135`<userid>`: `<string>` ::
136
137Full User ID, in the `name@realm` format.
138
139`--confirmation-password` `<string>` ::
140
141The current password of the user performing the change.
142
143*pveum pool add* `<poolid>` `[OPTIONS]`
144
145Create new pool.
146
147`<poolid>`: `<string>` ::
148
149no description available
150
151`--comment` `<string>` ::
152
153no description available
154
155*pveum pool delete* `<poolid>`
156
157Delete pool.
158
159`<poolid>`: `<string>` ::
160
161no description available
162
163*pveum pool list* `[OPTIONS]` `[FORMAT_OPTIONS]`
164
165List pools or get pool configuration.
166
167`--poolid` `<string>` ::
168
169no description available
170
171`--type` `<lxc | qemu | storage>` ::
172
173no description available
174+
175NOTE: Requires option(s): `poolid`
176
177*pveum pool modify* `<poolid>` `[OPTIONS]`
178
179Update pool.
180
181`<poolid>`: `<string>` ::
182
183no description available
184
185`--allow-move` `<boolean>` ('default =' `0`)::
186
187Allow adding a guest even if already in another pool. The guest will be removed from its current pool and added to this one.
188
189`--comment` `<string>` ::
190
191no description available
192
193`--delete` `<boolean>` ('default =' `0`)::
194
195Remove the passed VMIDs and/or storage IDs instead of adding them.
196
197`--storage` `<string>` ::
198
199List of storage IDs to add or remove from this pool.
200
201`--vms` `<string>` ::
202
203List of guest VMIDs to add or remove from this pool.
204
205*pveum realm add* `<realm> --type <string>` `[OPTIONS]`
206
207Add an authentication server.
208
209`<realm>`: `<string>` ::
210
211Authentication domain ID
212
213`--acr-values` `^[^\x00-\x1F\x7F <>#"]*$` ::
214
215Specifies the Authentication Context Class Reference values that theAuthorization Server is being requested to use for the Auth Request.
216
217`--autocreate` `<boolean>` ('default =' `0`)::
218
219Automatically create users if they do not exist.
220
221`--base_dn` `<string>` ::
222
223LDAP base domain name
224
225`--bind_dn` `<string>` ::
226
227LDAP bind domain name
228
229`--capath` `<string>` ('default =' `/etc/ssl/certs`)::
230
231Path to the CA certificate store
232
233`--case-sensitive` `<boolean>` ('default =' `1`)::
234
235username is case-sensitive
236
237`--cert` `<string>` ::
238
239Path to the client certificate
240
241`--certkey` `<string>` ::
242
243Path to the client certificate key
244
245`--check-connection` `<boolean>` ('default =' `0`)::
246
247Check bind connection to the server.
248
249`--client-id` `<string>` ::
250
251OpenID Client ID
252
253`--client-key` `<string>` ::
254
255OpenID Client Key
256
257`--comment` `<string>` ::
258
259Description.
260
261`--default` `<boolean>` ::
262
263Use this as default realm
264
265`--domain` `\S+` ::
266
267AD domain name
268
269`--filter` `<string>` ::
270
271LDAP filter for user sync.
272
273`--group_classes` `<string>` ('default =' `groupOfNames, group, univentionGroup, ipausergroup`)::
274
275The objectclasses for groups.
276
277`--group_dn` `<string>` ::
278
279LDAP base domain name for group sync. If not set, the base_dn will be used.
280
281`--group_filter` `<string>` ::
282
283LDAP filter for group sync.
284
285`--group_name_attr` `<string>` ::
286
287LDAP attribute representing a groups name. If not set or found, the first value of the DN will be used as name.
288
289`--issuer-url` `<string>` ::
290
291OpenID Issuer Url
292
293`--mode` `<ldap | ldap+starttls | ldaps>` ('default =' `ldap`)::
294
295LDAP protocol mode.
296
297`--password` `<string>` ::
298
299LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
300
301`--port` `<integer> (1 - 65535)` ::
302
303Server port.
304
305`--prompt` `(?:none|login|consent|select_account|\S+)` ::
306
307Specifies whether the Authorization Server prompts the End-User for reauthentication and consent.
308
309`--scopes` `<string>` ('default =' `email profile`)::
310
311Specifies the scopes (user details) that should be authorized and returned, for example 'email' or 'profile'.
312
313`--secure` `<boolean>` ::
314
315Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
316
317`--server1` `<string>` ::
318
319Server IP address (or DNS name)
320
321`--server2` `<string>` ::
322
323Fallback Server IP address (or DNS name)
324
325`--sslversion` `<tlsv1 | tlsv1_1 | tlsv1_2 | tlsv1_3>` ::
326
327LDAPS TLS/SSL version. It's not recommended to use version older than 1.2!
328
329`--sync-defaults-options` `[enable-new=<1|0>] [,full=<1|0>] [,purge=<1|0>] [,remove-vanished=([acl];[properties];[entry])|none] [,scope=<users|groups|both>]` ::
330
331The default options for behavior of synchronizations.
332
333`--sync_attributes` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
334
335Comma separated list of key=value pairs for specifying which LDAP attributes map to which PVE user field. For example, to map the LDAP attribute 'mail' to PVEs 'email', write 'email=mail'. By default, each PVE user field is represented by an LDAP attribute of the same name.
336
337`--tfa` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
338
339Use Two-factor authentication.
340
341`--type` `<ad | ldap | openid | pam | pve>` ::
342
343Realm type.
344
345`--user_attr` `\S{2,}` ::
346
347LDAP user attribute name
348
349`--user_classes` `<string>` ('default =' `inetorgperson, posixaccount, person, user`)::
350
351The objectclasses for users.
352
353`--username-claim` `<string>` ::
354
355OpenID claim used to generate the unique username.
356
357`--verify` `<boolean>` ('default =' `0`)::
358
359Verify the server's SSL certificate
360
361*pveum realm delete* `<realm>`
362
363Delete an authentication server.
364
365`<realm>`: `<string>` ::
366
367Authentication domain ID
368
369*pveum realm list* `[FORMAT_OPTIONS]`
370
371Authentication domain index.
372
373*pveum realm modify* `<realm>` `[OPTIONS]`
374
375Update authentication server settings.
376
377`<realm>`: `<string>` ::
378
379Authentication domain ID
380
381`--acr-values` `^[^\x00-\x1F\x7F <>#"]*$` ::
382
383Specifies the Authentication Context Class Reference values that theAuthorization Server is being requested to use for the Auth Request.
384
385`--autocreate` `<boolean>` ('default =' `0`)::
386
387Automatically create users if they do not exist.
388
389`--base_dn` `<string>` ::
390
391LDAP base domain name
392
393`--bind_dn` `<string>` ::
394
395LDAP bind domain name
396
397`--capath` `<string>` ('default =' `/etc/ssl/certs`)::
398
399Path to the CA certificate store
400
401`--case-sensitive` `<boolean>` ('default =' `1`)::
402
403username is case-sensitive
404
405`--cert` `<string>` ::
406
407Path to the client certificate
408
409`--certkey` `<string>` ::
410
411Path to the client certificate key
412
413`--check-connection` `<boolean>` ('default =' `0`)::
414
415Check bind connection to the server.
416
417`--client-id` `<string>` ::
418
419OpenID Client ID
420
421`--client-key` `<string>` ::
422
423OpenID Client Key
424
425`--comment` `<string>` ::
426
427Description.
428
429`--default` `<boolean>` ::
430
431Use this as default realm
432
433`--delete` `<string>` ::
434
435A list of settings you want to delete.
436
437`--digest` `<string>` ::
438
439Prevent changes if current configuration file has a different digest. This can be used to prevent concurrent modifications.
440
441`--domain` `\S+` ::
442
443AD domain name
444
445`--filter` `<string>` ::
446
447LDAP filter for user sync.
448
449`--group_classes` `<string>` ('default =' `groupOfNames, group, univentionGroup, ipausergroup`)::
450
451The objectclasses for groups.
452
453`--group_dn` `<string>` ::
454
455LDAP base domain name for group sync. If not set, the base_dn will be used.
456
457`--group_filter` `<string>` ::
458
459LDAP filter for group sync.
460
461`--group_name_attr` `<string>` ::
462
463LDAP attribute representing a groups name. If not set or found, the first value of the DN will be used as name.
464
465`--issuer-url` `<string>` ::
466
467OpenID Issuer Url
468
469`--mode` `<ldap | ldap+starttls | ldaps>` ('default =' `ldap`)::
470
471LDAP protocol mode.
472
473`--password` `<string>` ::
474
475LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
476
477`--port` `<integer> (1 - 65535)` ::
478
479Server port.
480
481`--prompt` `(?:none|login|consent|select_account|\S+)` ::
482
483Specifies whether the Authorization Server prompts the End-User for reauthentication and consent.
484
485`--scopes` `<string>` ('default =' `email profile`)::
486
487Specifies the scopes (user details) that should be authorized and returned, for example 'email' or 'profile'.
488
489`--secure` `<boolean>` ::
490
491Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
492
493`--server1` `<string>` ::
494
495Server IP address (or DNS name)
496
497`--server2` `<string>` ::
498
499Fallback Server IP address (or DNS name)
500
501`--sslversion` `<tlsv1 | tlsv1_1 | tlsv1_2 | tlsv1_3>` ::
502
503LDAPS TLS/SSL version. It's not recommended to use version older than 1.2!
504
505`--sync-defaults-options` `[enable-new=<1|0>] [,full=<1|0>] [,purge=<1|0>] [,remove-vanished=([acl];[properties];[entry])|none] [,scope=<users|groups|both>]` ::
506
507The default options for behavior of synchronizations.
508
509`--sync_attributes` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
510
511Comma separated list of key=value pairs for specifying which LDAP attributes map to which PVE user field. For example, to map the LDAP attribute 'mail' to PVEs 'email', write 'email=mail'. By default, each PVE user field is represented by an LDAP attribute of the same name.
512
513`--tfa` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
514
515Use Two-factor authentication.
516
517`--user_attr` `\S{2,}` ::
518
519LDAP user attribute name
520
521`--user_classes` `<string>` ('default =' `inetorgperson, posixaccount, person, user`)::
522
523The objectclasses for users.
524
525`--verify` `<boolean>` ('default =' `0`)::
526
527Verify the server's SSL certificate
528
529*pveum realm sync* `<realm>` `[OPTIONS]`
530
531Syncs users and/or groups from the configured LDAP to user.cfg. NOTE:
532Synced groups will have the name 'name-$realm', so make sure those groups
533do not exist to prevent overwriting.
534
535`<realm>`: `<string>` ::
536
537Authentication domain ID
538
539`--dry-run` `<boolean>` ('default =' `0`)::
540
541If set, does not write anything.
542
543`--enable-new` `<boolean>` ('default =' `1`)::
544
545Enable newly synced users immediately.
546
547`--full` `<boolean>` ::
548
549DEPRECATED: use 'remove-vanished' instead. If set, uses the LDAP Directory as source of truth, deleting users or groups not returned from the sync and removing all locally modified properties of synced users. If not set, only syncs information which is present in the synced data, and does not delete or modify anything else.
550
551`--purge` `<boolean>` ::
552
553DEPRECATED: use 'remove-vanished' instead. Remove ACLs for users or groups which were removed from the config during a sync.
554
555`--remove-vanished` `([acl];[properties];[entry])|none` ('default =' `none`)::
556
557A semicolon-seperated list of things to remove when they or the user vanishes during a sync. The following values are possible: 'entry' removes the user/group when not returned from the sync. 'properties' removes the set properties on existing user/group that do not appear in the source (even custom ones). 'acl' removes acls when the user/group is not returned from the sync. Instead of a list it also can be 'none' (the default).
558
559`--scope` `<both | groups | users>` ::
560
561Select what to sync.
562
563*pveum role add* `<roleid>` `[OPTIONS]`
564
565Create new role.
566
567`<roleid>`: `<string>` ::
568
569no description available
570
571`--privs` `<string>` ::
572
573no description available
574
575*pveum role delete* `<roleid>`
576
577Delete role.
578
579`<roleid>`: `<string>` ::
580
581no description available
582
583*pveum role list* `[FORMAT_OPTIONS]`
584
585Role index.
586
587*pveum role modify* `<roleid>` `[OPTIONS]`
588
589Update an existing role.
590
591`<roleid>`: `<string>` ::
592
593no description available
594
595`--append` `<boolean>` ::
596
597no description available
598+
599NOTE: Requires option(s): `privs`
600
601`--privs` `<string>` ::
602
603no description available
604
605*pveum roleadd*
606
607An alias for 'pveum role add'.
608
609*pveum roledel*
610
611An alias for 'pveum role delete'.
612
613*pveum rolemod*
614
615An alias for 'pveum role modify'.
616
617*pveum ticket* `<username>` `[OPTIONS]`
618
619Create or verify authentication ticket.
620
621`<username>`: `<string>` ::
622
623User name
624
625`--new-format` `<boolean>` ('default =' `1`)::
626
627This parameter is now ignored and assumed to be 1.
628
629`--otp` `<string>` ::
630
631One-time password for Two-factor authentication.
632
633`--path` `<string>` ::
634
635Verify ticket, and check if user have access 'privs' on 'path'
636+
637NOTE: Requires option(s): `privs`
638
639`--privs` `<string>` ::
640
641Verify ticket, and check if user have access 'privs' on 'path'
642+
643NOTE: Requires option(s): `path`
644
645`--realm` `<string>` ::
646
647You can optionally pass the realm using this parameter. Normally the realm is simply added to the username <username>@<relam>.
648
649`--tfa-challenge` `<string>` ::
650
651The signed TFA challenge string the user wants to respond to.
652
653*pveum user add* `<userid>` `[OPTIONS]`
654
655Create new user.
656
657`<userid>`: `<string>` ::
658
659Full User ID, in the `name@realm` format.
660
661`--comment` `<string>` ::
662
663no description available
664
665`--email` `<string>` ::
666
667no description available
668
669`--enable` `<boolean>` ('default =' `1`)::
670
671Enable the account (default). You can set this to '0' to disable the account
672
673`--expire` `<integer> (0 - N)` ::
674
675Account expiration date (seconds since epoch). '0' means no expiration date.
676
677`--firstname` `<string>` ::
678
679no description available
680
681`--groups` `<string>` ::
682
683no description available
684
685`--keys` `[0-9a-zA-Z!=]{0,4096}` ::
686
687Keys for two factor auth (yubico).
688
689`--lastname` `<string>` ::
690
691no description available
692
693`--password` `<string>` ::
694
695Initial password.
696
697*pveum user delete* `<userid>`
698
699Delete user.
700
701`<userid>`: `<string>` ::
702
703Full User ID, in the `name@realm` format.
704
705*pveum user list* `[OPTIONS]` `[FORMAT_OPTIONS]`
706
707User index.
708
709`--enabled` `<boolean>` ::
710
711Optional filter for enable property.
712
713`--full` `<boolean>` ('default =' `0`)::
714
715Include group and token information.
716
717*pveum user modify* `<userid>` `[OPTIONS]`
718
719Update user configuration.
720
721`<userid>`: `<string>` ::
722
723Full User ID, in the `name@realm` format.
724
725`--append` `<boolean>` ::
726
727no description available
728+
729NOTE: Requires option(s): `groups`
730
731`--comment` `<string>` ::
732
733no description available
734
735`--email` `<string>` ::
736
737no description available
738
739`--enable` `<boolean>` ('default =' `1`)::
740
741Enable the account (default). You can set this to '0' to disable the account
742
743`--expire` `<integer> (0 - N)` ::
744
745Account expiration date (seconds since epoch). '0' means no expiration date.
746
747`--firstname` `<string>` ::
748
749no description available
750
751`--groups` `<string>` ::
752
753no description available
754
755`--keys` `[0-9a-zA-Z!=]{0,4096}` ::
756
757Keys for two factor auth (yubico).
758
759`--lastname` `<string>` ::
760
761no description available
762
763*pveum user permissions* `[<userid>]` `[OPTIONS]` `[FORMAT_OPTIONS]`
764
765Retrieve effective permissions of given user/token.
766
767`<userid>`: `(?^:^(?^:[^\s:/]+)\@(?^:[A-Za-z][A-Za-z0-9\.\-_]+)(?:!(?^:[A-Za-z][A-Za-z0-9\.\-_]+))?$)` ::
768
769User ID or full API token ID
770
771`--path` `<string>` ::
772
773Only dump this specific path, not the whole tree.
774
775*pveum user tfa delete* `<userid>` `[OPTIONS]`
776
777Delete TFA entries from a user.
778
779`<userid>`: `<string>` ::
780
781Full User ID, in the `name@realm` format.
782
783`--id` `<string>` ::
784
785The TFA ID, if none provided, all TFA entries will be deleted.
786
787*pveum user tfa list* `[<userid>]`
788
789List TFA entries.
790
791`<userid>`: `<string>` ::
792
793Full User ID, in the `name@realm` format.
794
795*pveum user tfa unlock* `<userid>`
796
797Unlock a user's TFA authentication.
798
799`<userid>`: `<string>` ::
800
801Full User ID, in the `name@realm` format.
802
803*pveum user token add* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
804
805Generate a new API token for a specific user. NOTE: returns API token
806value, which needs to be stored as it cannot be retrieved afterwards!
807
808`<userid>`: `<string>` ::
809
810Full User ID, in the `name@realm` format.
811
812`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
813
814User-specific token identifier.
815
816`--comment` `<string>` ::
817
818no description available
819
820`--expire` `<integer> (0 - N)` ('default =' `same as user`)::
821
822API token expiration date (seconds since epoch). '0' means no expiration date.
823
824`--privsep` `<boolean>` ('default =' `1`)::
825
826Restrict API token privileges with separate ACLs (default), or give full privileges of corresponding user.
827
828*pveum user token list* `<userid>` `[FORMAT_OPTIONS]`
829
830Get user API tokens.
831
832`<userid>`: `<string>` ::
833
834Full User ID, in the `name@realm` format.
835
836*pveum user token modify* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
837
838Update API token for a specific user.
839
840`<userid>`: `<string>` ::
841
842Full User ID, in the `name@realm` format.
843
844`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
845
846User-specific token identifier.
847
848`--comment` `<string>` ::
849
850no description available
851
852`--expire` `<integer> (0 - N)` ('default =' `same as user`)::
853
854API token expiration date (seconds since epoch). '0' means no expiration date.
855
856`--privsep` `<boolean>` ('default =' `1`)::
857
858Restrict API token privileges with separate ACLs (default), or give full privileges of corresponding user.
859
860*pveum user token permissions* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
861
862Retrieve effective permissions of given token.
863
864`<userid>`: `<string>` ::
865
866Full User ID, in the `name@realm` format.
867
868`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
869
870User-specific token identifier.
871
872`--path` `<string>` ::
873
874Only dump this specific path, not the whole tree.
875
876*pveum user token remove* `<userid> <tokenid>` `[FORMAT_OPTIONS]`
877
878Remove API token for a specific user.
879
880`<userid>`: `<string>` ::
881
882Full User ID, in the `name@realm` format.
883
884`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
885
886User-specific token identifier.
887
888*pveum useradd*
889
890An alias for 'pveum user add'.
891
892*pveum userdel*
893
894An alias for 'pveum user delete'.
895
896*pveum usermod*
897
898An alias for 'pveum user modify'.
899
900