]> git.proxmox.com Git - pve-docs.git/blame - pveum.1-synopsis.adoc
fix #3884: Add section for kernel samepage merging
[pve-docs.git] / pveum.1-synopsis.adoc
CommitLineData
1f554f76
DM
1*pveum* `<COMMAND> [ARGS] [OPTIONS]`
2
e2d681b3 3*pveum acl delete* `<path> --roles <string>` `[OPTIONS]`
1f554f76
DM
4
5Update Access Control List (add or remove permissions).
6
013dc89f 7`<path>`: `<string>` ::
1f554f76
DM
8
9Access control path
10
2489d6df 11`--groups` `<string>` ::
1f554f76
DM
12
13List of groups.
14
2489d6df 15`--propagate` `<boolean>` ('default =' `1`)::
1f554f76
DM
16
17Allow to propagate (inherit) permissions.
18
2489d6df 19`--roles` `<string>` ::
1f554f76
DM
20
21List of roles.
22
e9cd3bd4
TL
23`--tokens` `<string>` ::
24
25List of API tokens.
26
2489d6df 27`--users` `<string>` ::
1f554f76
DM
28
29List of users.
30
5c1699e5
TL
31*pveum acl list* `[FORMAT_OPTIONS]`
32
33Get Access Control List (ACLs).
34
e2d681b3 35*pveum acl modify* `<path> --roles <string>` `[OPTIONS]`
1f554f76
DM
36
37Update Access Control List (add or remove permissions).
38
013dc89f 39`<path>`: `<string>` ::
1f554f76
DM
40
41Access control path
42
2489d6df 43`--groups` `<string>` ::
1f554f76
DM
44
45List of groups.
46
2489d6df 47`--propagate` `<boolean>` ('default =' `1`)::
1f554f76
DM
48
49Allow to propagate (inherit) permissions.
50
2489d6df 51`--roles` `<string>` ::
1f554f76
DM
52
53List of roles.
54
e9cd3bd4
TL
55`--tokens` `<string>` ::
56
57List of API tokens.
58
2489d6df 59`--users` `<string>` ::
1f554f76
DM
60
61List of users.
62
e2d681b3
TL
63*pveum acldel*
64
65An alias for 'pveum acl delete'.
66
67*pveum aclmod*
68
69An alias for 'pveum acl modify'.
70
71*pveum group add* `<groupid>` `[OPTIONS]`
1f554f76
DM
72
73Create new group.
74
013dc89f 75`<groupid>`: `<string>` ::
1f554f76
DM
76
77no description available
78
2489d6df 79`--comment` `<string>` ::
1f554f76
DM
80
81no description available
82
e2d681b3 83*pveum group delete* `<groupid>`
1f554f76
DM
84
85Delete group.
86
013dc89f 87`<groupid>`: `<string>` ::
1f554f76
DM
88
89no description available
90
5c1699e5
TL
91*pveum group list* `[FORMAT_OPTIONS]`
92
93Group index.
94
e2d681b3 95*pveum group modify* `<groupid>` `[OPTIONS]`
1f554f76
DM
96
97Update group data.
98
013dc89f 99`<groupid>`: `<string>` ::
1f554f76
DM
100
101no description available
102
2489d6df 103`--comment` `<string>` ::
1f554f76
DM
104
105no description available
106
e2d681b3
TL
107*pveum groupadd*
108
109An alias for 'pveum group add'.
110
111*pveum groupdel*
112
113An alias for 'pveum group delete'.
114
115*pveum groupmod*
116
117An alias for 'pveum group modify'.
118
35a75dd3 119*pveum help* `[OPTIONS]`
1f554f76
DM
120
121Get help about specified command.
122
35a75dd3 123`--extra-args` `<array>` ::
1f554f76 124
35a75dd3 125Shows help for a specific command
1f554f76 126
2489d6df 127`--verbose` `<boolean>` ::
1f554f76
DM
128
129Verbose output format.
130
1f554f76
DM
131*pveum passwd* `<userid>`
132
133Change user password.
134
013dc89f 135`<userid>`: `<string>` ::
1f554f76
DM
136
137User ID
138
d2656385
TL
139*pveum pool add* `<poolid>` `[OPTIONS]`
140
141Create new pool.
142
143`<poolid>`: `<string>` ::
144
145no description available
146
147`--comment` `<string>` ::
148
149no description available
150
151*pveum pool delete* `<poolid>`
152
153Delete pool.
154
155`<poolid>`: `<string>` ::
156
157no description available
158
159*pveum pool list* `[FORMAT_OPTIONS]`
160
161Pool index.
162
163*pveum pool modify* `<poolid>` `[OPTIONS]`
164
165Update pool data.
166
167`<poolid>`: `<string>` ::
168
169no description available
170
171`--comment` `<string>` ::
172
173no description available
174
175`--delete` `<boolean>` ::
176
177Remove vms/storage (instead of adding it).
178
179`--storage` `<string>` ::
180
181List of storage IDs.
182
183`--vms` `<string>` ::
184
185List of virtual machines.
186
c5aa7e14
TL
187*pveum realm add* `<realm> --type <string>` `[OPTIONS]`
188
189Add an authentication server.
190
191`<realm>`: `<string>` ::
192
193Authentication domain ID
194
c30bb419
TL
195`--acr-values` `<string>` ::
196
197Specifies the Authentication Context Class Reference values that theAuthorization Server is being requested to use for the Auth Request.
198
34f3e481
TL
199`--autocreate` `<boolean>` ('default =' `0`)::
200
201Automatically create users if they do not exist.
202
c5aa7e14
TL
203`--base_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
204
205LDAP base domain name
206
207`--bind_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
208
209LDAP bind domain name
210
211`--capath` `<string>` ('default =' `/etc/ssl/certs`)::
212
213Path to the CA certificate store
214
4772952b
TL
215`--case-sensitive` `<boolean>` ('default =' `1`)::
216
217username is case-sensitive
218
c5aa7e14
TL
219`--cert` `<string>` ::
220
221Path to the client certificate
222
223`--certkey` `<string>` ::
224
225Path to the client certificate key
226
34f3e481
TL
227`--client-id` `<string>` ::
228
229OpenID Client ID
230
231`--client-key` `<string>` ::
232
233OpenID Client Key
234
c5aa7e14
TL
235`--comment` `<string>` ::
236
237Description.
238
239`--default` `<boolean>` ::
240
241Use this as default realm
242
243`--domain` `\S+` ::
244
245AD domain name
246
247`--filter` `<string>` ::
248
249LDAP filter for user sync.
250
251`--group_classes` `<string>` ('default =' `groupOfNames, group, univentionGroup, ipausergroup`)::
252
253The objectclasses for groups.
254
255`--group_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
256
257LDAP base domain name for group sync. If not set, the base_dn will be used.
258
259`--group_filter` `<string>` ::
260
261LDAP filter for group sync.
262
263`--group_name_attr` `<string>` ::
264
265LDAP attribute representing a groups name. If not set or found, the first value of the DN will be used as name.
266
34f3e481
TL
267`--issuer-url` `<string>` ::
268
269OpenID Issuer Url
270
c5aa7e14
TL
271`--mode` `<ldap | ldap+starttls | ldaps>` ('default =' `ldap`)::
272
273LDAP protocol mode.
274
275`--password` `<string>` ::
276
277LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
278
279`--port` `<integer> (1 - 65535)` ::
280
281Server port.
282
c30bb419
TL
283`--prompt` `(?:none|login|consent|select_account|\S+)` ::
284
285Specifies whether the Authorization Server prompts the End-User for reauthentication and consent.
286
287`--scopes` `<string>` ('default =' `email profile`)::
288
289Specifies the scopes (user details) that should be authorized and returned, for example 'email' or 'profile'.
290
c5aa7e14
TL
291`--secure` `<boolean>` ::
292
293Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
294
295`--server1` `<string>` ::
296
297Server IP address (or DNS name)
298
299`--server2` `<string>` ::
300
301Fallback Server IP address (or DNS name)
302
303`--sslversion` `<tlsv1 | tlsv1_1 | tlsv1_2 | tlsv1_3>` ::
304
305LDAPS TLS/SSL version. It's not recommended to use version older than 1.2!
306
307`--sync-defaults-options` `[enable-new=<1|0>] [,full=<1|0>] [,purge=<1|0>] [,scope=<users|groups|both>]` ::
308
309The default options for behavior of synchronizations.
310
311`--sync_attributes` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
312
313Comma separated list of key=value pairs for specifying which LDAP attributes map to which PVE user field. For example, to map the LDAP attribute 'mail' to PVEs 'email', write 'email=mail'. By default, each PVE user field is represented by an LDAP attribute of the same name.
314
315`--tfa` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
316
317Use Two-factor authentication.
318
34f3e481 319`--type` `<ad | ldap | openid | pam | pve>` ::
c5aa7e14
TL
320
321Realm type.
322
323`--user_attr` `\S{2,}` ::
324
325LDAP user attribute name
326
327`--user_classes` `<string>` ('default =' `inetorgperson, posixaccount, person, user`)::
328
329The objectclasses for users.
330
c30bb419 331`--username-claim` `<string>` ::
34f3e481
TL
332
333OpenID claim used to generate the unique username.
334
c5aa7e14
TL
335`--verify` `<boolean>` ('default =' `0`)::
336
337Verify the server's SSL certificate
338
339*pveum realm delete* `<realm>`
340
341Delete an authentication server.
342
343`<realm>`: `<string>` ::
344
345Authentication domain ID
346
347*pveum realm list* `[FORMAT_OPTIONS]`
348
349Authentication domain index.
350
351*pveum realm modify* `<realm>` `[OPTIONS]`
352
353Update authentication server settings.
354
355`<realm>`: `<string>` ::
356
357Authentication domain ID
358
c30bb419
TL
359`--acr-values` `<string>` ::
360
361Specifies the Authentication Context Class Reference values that theAuthorization Server is being requested to use for the Auth Request.
362
34f3e481
TL
363`--autocreate` `<boolean>` ('default =' `0`)::
364
365Automatically create users if they do not exist.
366
c5aa7e14
TL
367`--base_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
368
369LDAP base domain name
370
371`--bind_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
372
373LDAP bind domain name
374
375`--capath` `<string>` ('default =' `/etc/ssl/certs`)::
376
377Path to the CA certificate store
378
4772952b
TL
379`--case-sensitive` `<boolean>` ('default =' `1`)::
380
381username is case-sensitive
382
c5aa7e14
TL
383`--cert` `<string>` ::
384
385Path to the client certificate
386
387`--certkey` `<string>` ::
388
389Path to the client certificate key
390
34f3e481
TL
391`--client-id` `<string>` ::
392
393OpenID Client ID
394
395`--client-key` `<string>` ::
396
397OpenID Client Key
398
c5aa7e14
TL
399`--comment` `<string>` ::
400
401Description.
402
403`--default` `<boolean>` ::
404
405Use this as default realm
406
407`--delete` `<string>` ::
408
409A list of settings you want to delete.
410
411`--digest` `<string>` ::
412
413Prevent changes if current configuration file has different SHA1 digest. This can be used to prevent concurrent modifications.
414
415`--domain` `\S+` ::
416
417AD domain name
418
419`--filter` `<string>` ::
420
421LDAP filter for user sync.
422
423`--group_classes` `<string>` ('default =' `groupOfNames, group, univentionGroup, ipausergroup`)::
424
425The objectclasses for groups.
426
427`--group_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
428
429LDAP base domain name for group sync. If not set, the base_dn will be used.
430
431`--group_filter` `<string>` ::
432
433LDAP filter for group sync.
434
435`--group_name_attr` `<string>` ::
436
437LDAP attribute representing a groups name. If not set or found, the first value of the DN will be used as name.
438
34f3e481
TL
439`--issuer-url` `<string>` ::
440
441OpenID Issuer Url
442
c5aa7e14
TL
443`--mode` `<ldap | ldap+starttls | ldaps>` ('default =' `ldap`)::
444
445LDAP protocol mode.
446
447`--password` `<string>` ::
448
449LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
450
451`--port` `<integer> (1 - 65535)` ::
452
453Server port.
454
c30bb419
TL
455`--prompt` `(?:none|login|consent|select_account|\S+)` ::
456
457Specifies whether the Authorization Server prompts the End-User for reauthentication and consent.
458
459`--scopes` `<string>` ('default =' `email profile`)::
460
461Specifies the scopes (user details) that should be authorized and returned, for example 'email' or 'profile'.
462
c5aa7e14
TL
463`--secure` `<boolean>` ::
464
465Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
466
467`--server1` `<string>` ::
468
469Server IP address (or DNS name)
470
471`--server2` `<string>` ::
472
473Fallback Server IP address (or DNS name)
474
475`--sslversion` `<tlsv1 | tlsv1_1 | tlsv1_2 | tlsv1_3>` ::
476
477LDAPS TLS/SSL version. It's not recommended to use version older than 1.2!
478
479`--sync-defaults-options` `[enable-new=<1|0>] [,full=<1|0>] [,purge=<1|0>] [,scope=<users|groups|both>]` ::
480
481The default options for behavior of synchronizations.
482
483`--sync_attributes` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
484
485Comma separated list of key=value pairs for specifying which LDAP attributes map to which PVE user field. For example, to map the LDAP attribute 'mail' to PVEs 'email', write 'email=mail'. By default, each PVE user field is represented by an LDAP attribute of the same name.
486
487`--tfa` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
488
489Use Two-factor authentication.
490
491`--user_attr` `\S{2,}` ::
492
493LDAP user attribute name
494
495`--user_classes` `<string>` ('default =' `inetorgperson, posixaccount, person, user`)::
496
497The objectclasses for users.
498
499`--verify` `<boolean>` ('default =' `0`)::
500
501Verify the server's SSL certificate
502
503*pveum realm sync* `<realm>` `[OPTIONS]`
504
505Syncs users and/or groups from the configured LDAP to user.cfg. NOTE:
506Synced groups will have the name 'name-$realm', so make sure those groups
507do not exist to prevent overwriting.
508
509`<realm>`: `<string>` ::
510
511Authentication domain ID
512
513`--dry-run` `<boolean>` ('default =' `0`)::
514
515If set, does not write anything.
516
517`--enable-new` `<boolean>` ('default =' `1`)::
518
519Enable newly synced users immediately.
520
521`--full` `<boolean>` ::
522
523If set, uses the LDAP Directory as source of truth, deleting users or groups not returned from the sync. Otherwise only syncs information which is not already present, and does not deletes or modifies anything else.
524
525`--purge` `<boolean>` ::
526
527Remove ACLs for users or groups which were removed from the config during a sync.
528
529`--scope` `<both | groups | users>` ::
530
531Select what to sync.
532
e2d681b3 533*pveum role add* `<roleid>` `[OPTIONS]`
1f554f76
DM
534
535Create new role.
536
013dc89f 537`<roleid>`: `<string>` ::
1f554f76
DM
538
539no description available
540
2489d6df 541`--privs` `<string>` ::
1f554f76
DM
542
543no description available
544
e2d681b3 545*pveum role delete* `<roleid>`
1f554f76
DM
546
547Delete role.
548
013dc89f 549`<roleid>`: `<string>` ::
1f554f76
DM
550
551no description available
552
5c1699e5
TL
553*pveum role list* `[FORMAT_OPTIONS]`
554
555Role index.
556
e2d681b3 557*pveum role modify* `<roleid>` `[OPTIONS]`
1f554f76 558
e2d681b3 559Update an existing role.
1f554f76 560
013dc89f 561`<roleid>`: `<string>` ::
1f554f76
DM
562
563no description available
564
2489d6df 565`--append` `<boolean>` ::
1f554f76
DM
566
567no description available
568+
569NOTE: Requires option(s): `privs`
570
2489d6df 571`--privs` `<string>` ::
1f554f76
DM
572
573no description available
574
e2d681b3
TL
575*pveum roleadd*
576
577An alias for 'pveum role add'.
578
579*pveum roledel*
580
581An alias for 'pveum role delete'.
582
583*pveum rolemod*
584
585An alias for 'pveum role modify'.
586
1f554f76
DM
587*pveum ticket* `<username>` `[OPTIONS]`
588
589Create or verify authentication ticket.
590
013dc89f 591`<username>`: `<string>` ::
1f554f76
DM
592
593User name
594
5370fa8c
TL
595`--new-format` `<boolean>` ('default =' `0`)::
596
597With webauthn the format of half-authenticated tickts changed. New clients should pass 1 here and not worry about the old format. The old format is deprecated and will be retired with PVE-8.0
598
2489d6df 599`--otp` `<string>` ::
1f554f76
DM
600
601One-time password for Two-factor authentication.
602
2489d6df 603`--path` `<string>` ::
1f554f76
DM
604
605Verify ticket, and check if user have access 'privs' on 'path'
606+
607NOTE: Requires option(s): `privs`
608
2489d6df 609`--privs` `<string>` ::
1f554f76
DM
610
611Verify ticket, and check if user have access 'privs' on 'path'
612+
613NOTE: Requires option(s): `path`
614
2489d6df 615`--realm` `<string>` ::
1f554f76 616
c2993fe5 617You can optionally pass the realm using this parameter. Normally the realm is simply added to the username <username>@<relam>.
1f554f76 618
5370fa8c
TL
619`--tfa-challenge` `<string>` ::
620
621The signed TFA challenge string the user wants to respond to.
622
e2d681b3 623*pveum user add* `<userid>` `[OPTIONS]`
1f554f76
DM
624
625Create new user.
626
013dc89f 627`<userid>`: `<string>` ::
1f554f76
DM
628
629User ID
630
2489d6df 631`--comment` `<string>` ::
1f554f76
DM
632
633no description available
634
2489d6df 635`--email` `<string>` ::
1f554f76
DM
636
637no description available
638
2489d6df 639`--enable` `<boolean>` ('default =' `1`)::
1f554f76 640
e2d681b3 641Enable the account (default). You can set this to '0' to disable the account
1f554f76 642
2489d6df 643`--expire` `<integer> (0 - N)` ::
1f554f76 644
c2993fe5 645Account expiration date (seconds since epoch). '0' means no expiration date.
1f554f76 646
2489d6df 647`--firstname` `<string>` ::
1f554f76
DM
648
649no description available
650
2489d6df 651`--groups` `<string>` ::
1f554f76
DM
652
653no description available
654
2489d6df 655`--keys` `<string>` ::
1f554f76
DM
656
657Keys for two factor auth (yubico).
658
2489d6df 659`--lastname` `<string>` ::
1f554f76
DM
660
661no description available
662
e2d681b3 663`--password` `<string>` ::
1f554f76
DM
664
665Initial password.
666
e2d681b3 667*pveum user delete* `<userid>`
1f554f76
DM
668
669Delete user.
670
013dc89f 671`<userid>`: `<string>` ::
1f554f76
DM
672
673User ID
674
5c1699e5
TL
675*pveum user list* `[OPTIONS]` `[FORMAT_OPTIONS]`
676
677User index.
678
679`--enabled` `<boolean>` ::
680
681Optional filter for enable property.
682
e9cd3bd4
TL
683`--full` `<boolean>` ('default =' `0`)::
684
685Include group and token information.
686
e2d681b3 687*pveum user modify* `<userid>` `[OPTIONS]`
1f554f76
DM
688
689Update user configuration.
690
013dc89f 691`<userid>`: `<string>` ::
1f554f76
DM
692
693User ID
694
2489d6df 695`--append` `<boolean>` ::
1f554f76
DM
696
697no description available
698+
699NOTE: Requires option(s): `groups`
700
2489d6df 701`--comment` `<string>` ::
1f554f76
DM
702
703no description available
704
2489d6df 705`--email` `<string>` ::
1f554f76
DM
706
707no description available
708
e2d681b3 709`--enable` `<boolean>` ('default =' `1`)::
1f554f76 710
e2d681b3 711Enable the account (default). You can set this to '0' to disable the account
1f554f76 712
2489d6df 713`--expire` `<integer> (0 - N)` ::
1f554f76 714
c2993fe5 715Account expiration date (seconds since epoch). '0' means no expiration date.
1f554f76 716
2489d6df 717`--firstname` `<string>` ::
1f554f76
DM
718
719no description available
720
2489d6df 721`--groups` `<string>` ::
1f554f76
DM
722
723no description available
724
2489d6df 725`--keys` `<string>` ::
1f554f76
DM
726
727Keys for two factor auth (yubico).
728
2489d6df 729`--lastname` `<string>` ::
1f554f76
DM
730
731no description available
732
e9cd3bd4
TL
733*pveum user permissions* `[<userid>]` `[OPTIONS]` `[FORMAT_OPTIONS]`
734
735Retrieve effective permissions of given user/token.
736
737`<userid>`: `(?^:^(?^:[^\s:/]+)\@(?^:[A-Za-z][A-Za-z0-9\.\-_]+)(?:!(?^:[A-Za-z][A-Za-z0-9\.\-_]+))?$)` ::
738
739User ID or full API token ID
740
741`--path` `<string>` ::
742
743Only dump this specific path, not the whole tree.
744
ac70d7d1
TL
745*pveum user tfa delete* `<userid>` `[OPTIONS]`
746
5370fa8c 747Delete TFA entries from a user.
ac70d7d1
TL
748
749`<userid>`: `<string>` ::
750
751User ID
752
5370fa8c 753`--id` `<string>` ::
ac70d7d1 754
5370fa8c 755The TFA ID, if none provided, all TFA entries will be deleted.
ac70d7d1 756
e9cd3bd4
TL
757*pveum user token add* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
758
759Generate a new API token for a specific user. NOTE: returns API token
760value, which needs to be stored as it cannot be retrieved afterwards!
761
762`<userid>`: `<string>` ::
763
764User ID
765
766`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
767
768User-specific token identifier.
769
770`--comment` `<string>` ::
771
772no description available
773
774`--expire` `<integer> (0 - N)` ('default =' `same as user`)::
775
776API token expiration date (seconds since epoch). '0' means no expiration date.
777
778`--privsep` `<boolean>` ('default =' `1`)::
779
780Restrict API token privileges with separate ACLs (default), or give full privileges of corresponding user.
781
782*pveum user token list* `<userid>` `[FORMAT_OPTIONS]`
783
784Get user API tokens.
785
786`<userid>`: `<string>` ::
787
788User ID
789
790*pveum user token modify* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
791
792Update API token for a specific user.
793
794`<userid>`: `<string>` ::
795
796User ID
797
798`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
799
800User-specific token identifier.
801
802`--comment` `<string>` ::
803
804no description available
805
806`--expire` `<integer> (0 - N)` ('default =' `same as user`)::
807
808API token expiration date (seconds since epoch). '0' means no expiration date.
809
810`--privsep` `<boolean>` ('default =' `1`)::
811
812Restrict API token privileges with separate ACLs (default), or give full privileges of corresponding user.
813
814*pveum user token permissions* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
815
816Retrieve effective permissions of given token.
817
818`<userid>`: `<string>` ::
819
820User ID
821
822`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
823
824User-specific token identifier.
825
826`--path` `<string>` ::
827
828Only dump this specific path, not the whole tree.
829
830*pveum user token remove* `<userid> <tokenid>` `[FORMAT_OPTIONS]`
831
832Remove API token for a specific user.
833
834`<userid>`: `<string>` ::
835
836User ID
837
838`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
839
840User-specific token identifier.
841
e2d681b3
TL
842*pveum useradd*
843
844An alias for 'pveum user add'.
845
846*pveum userdel*
847
848An alias for 'pveum user delete'.
849
850*pveum usermod*
851
852An alias for 'pveum user modify'.
853
1f554f76 854