]> git.proxmox.com Git - pve-docs.git/blame - pveum.1-synopsis.adoc
update link qemu documentation non web.archive
[pve-docs.git] / pveum.1-synopsis.adoc
CommitLineData
1f554f76
DM
1*pveum* `<COMMAND> [ARGS] [OPTIONS]`
2
e2d681b3 3*pveum acl delete* `<path> --roles <string>` `[OPTIONS]`
1f554f76
DM
4
5Update Access Control List (add or remove permissions).
6
013dc89f 7`<path>`: `<string>` ::
1f554f76
DM
8
9Access control path
10
2489d6df 11`--groups` `<string>` ::
1f554f76
DM
12
13List of groups.
14
2489d6df 15`--propagate` `<boolean>` ('default =' `1`)::
1f554f76
DM
16
17Allow to propagate (inherit) permissions.
18
2489d6df 19`--roles` `<string>` ::
1f554f76
DM
20
21List of roles.
22
e9cd3bd4
TL
23`--tokens` `<string>` ::
24
25List of API tokens.
26
2489d6df 27`--users` `<string>` ::
1f554f76
DM
28
29List of users.
30
5c1699e5
TL
31*pveum acl list* `[FORMAT_OPTIONS]`
32
33Get Access Control List (ACLs).
34
e2d681b3 35*pveum acl modify* `<path> --roles <string>` `[OPTIONS]`
1f554f76
DM
36
37Update Access Control List (add or remove permissions).
38
013dc89f 39`<path>`: `<string>` ::
1f554f76
DM
40
41Access control path
42
2489d6df 43`--groups` `<string>` ::
1f554f76
DM
44
45List of groups.
46
2489d6df 47`--propagate` `<boolean>` ('default =' `1`)::
1f554f76
DM
48
49Allow to propagate (inherit) permissions.
50
2489d6df 51`--roles` `<string>` ::
1f554f76
DM
52
53List of roles.
54
e9cd3bd4
TL
55`--tokens` `<string>` ::
56
57List of API tokens.
58
2489d6df 59`--users` `<string>` ::
1f554f76
DM
60
61List of users.
62
e2d681b3
TL
63*pveum acldel*
64
65An alias for 'pveum acl delete'.
66
67*pveum aclmod*
68
69An alias for 'pveum acl modify'.
70
71*pveum group add* `<groupid>` `[OPTIONS]`
1f554f76
DM
72
73Create new group.
74
013dc89f 75`<groupid>`: `<string>` ::
1f554f76
DM
76
77no description available
78
2489d6df 79`--comment` `<string>` ::
1f554f76
DM
80
81no description available
82
e2d681b3 83*pveum group delete* `<groupid>`
1f554f76
DM
84
85Delete group.
86
013dc89f 87`<groupid>`: `<string>` ::
1f554f76
DM
88
89no description available
90
5c1699e5
TL
91*pveum group list* `[FORMAT_OPTIONS]`
92
93Group index.
94
e2d681b3 95*pveum group modify* `<groupid>` `[OPTIONS]`
1f554f76
DM
96
97Update group data.
98
013dc89f 99`<groupid>`: `<string>` ::
1f554f76
DM
100
101no description available
102
2489d6df 103`--comment` `<string>` ::
1f554f76
DM
104
105no description available
106
e2d681b3
TL
107*pveum groupadd*
108
109An alias for 'pveum group add'.
110
111*pveum groupdel*
112
113An alias for 'pveum group delete'.
114
115*pveum groupmod*
116
117An alias for 'pveum group modify'.
118
35a75dd3 119*pveum help* `[OPTIONS]`
1f554f76
DM
120
121Get help about specified command.
122
35a75dd3 123`--extra-args` `<array>` ::
1f554f76 124
35a75dd3 125Shows help for a specific command
1f554f76 126
2489d6df 127`--verbose` `<boolean>` ::
1f554f76
DM
128
129Verbose output format.
130
1f554f76
DM
131*pveum passwd* `<userid>`
132
133Change user password.
134
013dc89f 135`<userid>`: `<string>` ::
1f554f76
DM
136
137User ID
138
c5aa7e14
TL
139*pveum realm add* `<realm> --type <string>` `[OPTIONS]`
140
141Add an authentication server.
142
143`<realm>`: `<string>` ::
144
145Authentication domain ID
146
147`--base_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
148
149LDAP base domain name
150
151`--bind_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
152
153LDAP bind domain name
154
155`--capath` `<string>` ('default =' `/etc/ssl/certs`)::
156
157Path to the CA certificate store
158
4772952b
TL
159`--case-sensitive` `<boolean>` ('default =' `1`)::
160
161username is case-sensitive
162
c5aa7e14
TL
163`--cert` `<string>` ::
164
165Path to the client certificate
166
167`--certkey` `<string>` ::
168
169Path to the client certificate key
170
171`--comment` `<string>` ::
172
173Description.
174
175`--default` `<boolean>` ::
176
177Use this as default realm
178
179`--domain` `\S+` ::
180
181AD domain name
182
183`--filter` `<string>` ::
184
185LDAP filter for user sync.
186
187`--group_classes` `<string>` ('default =' `groupOfNames, group, univentionGroup, ipausergroup`)::
188
189The objectclasses for groups.
190
191`--group_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
192
193LDAP base domain name for group sync. If not set, the base_dn will be used.
194
195`--group_filter` `<string>` ::
196
197LDAP filter for group sync.
198
199`--group_name_attr` `<string>` ::
200
201LDAP attribute representing a groups name. If not set or found, the first value of the DN will be used as name.
202
203`--mode` `<ldap | ldap+starttls | ldaps>` ('default =' `ldap`)::
204
205LDAP protocol mode.
206
207`--password` `<string>` ::
208
209LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
210
211`--port` `<integer> (1 - 65535)` ::
212
213Server port.
214
215`--secure` `<boolean>` ::
216
217Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
218
219`--server1` `<string>` ::
220
221Server IP address (or DNS name)
222
223`--server2` `<string>` ::
224
225Fallback Server IP address (or DNS name)
226
227`--sslversion` `<tlsv1 | tlsv1_1 | tlsv1_2 | tlsv1_3>` ::
228
229LDAPS TLS/SSL version. It's not recommended to use version older than 1.2!
230
231`--sync-defaults-options` `[enable-new=<1|0>] [,full=<1|0>] [,purge=<1|0>] [,scope=<users|groups|both>]` ::
232
233The default options for behavior of synchronizations.
234
235`--sync_attributes` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
236
237Comma separated list of key=value pairs for specifying which LDAP attributes map to which PVE user field. For example, to map the LDAP attribute 'mail' to PVEs 'email', write 'email=mail'. By default, each PVE user field is represented by an LDAP attribute of the same name.
238
239`--tfa` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
240
241Use Two-factor authentication.
242
243`--type` `<ad | ldap | pam | pve>` ::
244
245Realm type.
246
247`--user_attr` `\S{2,}` ::
248
249LDAP user attribute name
250
251`--user_classes` `<string>` ('default =' `inetorgperson, posixaccount, person, user`)::
252
253The objectclasses for users.
254
255`--verify` `<boolean>` ('default =' `0`)::
256
257Verify the server's SSL certificate
258
259*pveum realm delete* `<realm>`
260
261Delete an authentication server.
262
263`<realm>`: `<string>` ::
264
265Authentication domain ID
266
267*pveum realm list* `[FORMAT_OPTIONS]`
268
269Authentication domain index.
270
271*pveum realm modify* `<realm>` `[OPTIONS]`
272
273Update authentication server settings.
274
275`<realm>`: `<string>` ::
276
277Authentication domain ID
278
279`--base_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
280
281LDAP base domain name
282
283`--bind_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
284
285LDAP bind domain name
286
287`--capath` `<string>` ('default =' `/etc/ssl/certs`)::
288
289Path to the CA certificate store
290
4772952b
TL
291`--case-sensitive` `<boolean>` ('default =' `1`)::
292
293username is case-sensitive
294
c5aa7e14
TL
295`--cert` `<string>` ::
296
297Path to the client certificate
298
299`--certkey` `<string>` ::
300
301Path to the client certificate key
302
303`--comment` `<string>` ::
304
305Description.
306
307`--default` `<boolean>` ::
308
309Use this as default realm
310
311`--delete` `<string>` ::
312
313A list of settings you want to delete.
314
315`--digest` `<string>` ::
316
317Prevent changes if current configuration file has different SHA1 digest. This can be used to prevent concurrent modifications.
318
319`--domain` `\S+` ::
320
321AD domain name
322
323`--filter` `<string>` ::
324
325LDAP filter for user sync.
326
327`--group_classes` `<string>` ('default =' `groupOfNames, group, univentionGroup, ipausergroup`)::
328
329The objectclasses for groups.
330
331`--group_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
332
333LDAP base domain name for group sync. If not set, the base_dn will be used.
334
335`--group_filter` `<string>` ::
336
337LDAP filter for group sync.
338
339`--group_name_attr` `<string>` ::
340
341LDAP attribute representing a groups name. If not set or found, the first value of the DN will be used as name.
342
343`--mode` `<ldap | ldap+starttls | ldaps>` ('default =' `ldap`)::
344
345LDAP protocol mode.
346
347`--password` `<string>` ::
348
349LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
350
351`--port` `<integer> (1 - 65535)` ::
352
353Server port.
354
355`--secure` `<boolean>` ::
356
357Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
358
359`--server1` `<string>` ::
360
361Server IP address (or DNS name)
362
363`--server2` `<string>` ::
364
365Fallback Server IP address (or DNS name)
366
367`--sslversion` `<tlsv1 | tlsv1_1 | tlsv1_2 | tlsv1_3>` ::
368
369LDAPS TLS/SSL version. It's not recommended to use version older than 1.2!
370
371`--sync-defaults-options` `[enable-new=<1|0>] [,full=<1|0>] [,purge=<1|0>] [,scope=<users|groups|both>]` ::
372
373The default options for behavior of synchronizations.
374
375`--sync_attributes` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
376
377Comma separated list of key=value pairs for specifying which LDAP attributes map to which PVE user field. For example, to map the LDAP attribute 'mail' to PVEs 'email', write 'email=mail'. By default, each PVE user field is represented by an LDAP attribute of the same name.
378
379`--tfa` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
380
381Use Two-factor authentication.
382
383`--user_attr` `\S{2,}` ::
384
385LDAP user attribute name
386
387`--user_classes` `<string>` ('default =' `inetorgperson, posixaccount, person, user`)::
388
389The objectclasses for users.
390
391`--verify` `<boolean>` ('default =' `0`)::
392
393Verify the server's SSL certificate
394
395*pveum realm sync* `<realm>` `[OPTIONS]`
396
397Syncs users and/or groups from the configured LDAP to user.cfg. NOTE:
398Synced groups will have the name 'name-$realm', so make sure those groups
399do not exist to prevent overwriting.
400
401`<realm>`: `<string>` ::
402
403Authentication domain ID
404
405`--dry-run` `<boolean>` ('default =' `0`)::
406
407If set, does not write anything.
408
409`--enable-new` `<boolean>` ('default =' `1`)::
410
411Enable newly synced users immediately.
412
413`--full` `<boolean>` ::
414
415If set, uses the LDAP Directory as source of truth, deleting users or groups not returned from the sync. Otherwise only syncs information which is not already present, and does not deletes or modifies anything else.
416
417`--purge` `<boolean>` ::
418
419Remove ACLs for users or groups which were removed from the config during a sync.
420
421`--scope` `<both | groups | users>` ::
422
423Select what to sync.
424
e2d681b3 425*pveum role add* `<roleid>` `[OPTIONS]`
1f554f76
DM
426
427Create new role.
428
013dc89f 429`<roleid>`: `<string>` ::
1f554f76
DM
430
431no description available
432
2489d6df 433`--privs` `<string>` ::
1f554f76
DM
434
435no description available
436
e2d681b3 437*pveum role delete* `<roleid>`
1f554f76
DM
438
439Delete role.
440
013dc89f 441`<roleid>`: `<string>` ::
1f554f76
DM
442
443no description available
444
5c1699e5
TL
445*pveum role list* `[FORMAT_OPTIONS]`
446
447Role index.
448
e2d681b3 449*pveum role modify* `<roleid>` `[OPTIONS]`
1f554f76 450
e2d681b3 451Update an existing role.
1f554f76 452
013dc89f 453`<roleid>`: `<string>` ::
1f554f76
DM
454
455no description available
456
2489d6df 457`--append` `<boolean>` ::
1f554f76
DM
458
459no description available
460+
461NOTE: Requires option(s): `privs`
462
2489d6df 463`--privs` `<string>` ::
1f554f76
DM
464
465no description available
466
e2d681b3
TL
467*pveum roleadd*
468
469An alias for 'pveum role add'.
470
471*pveum roledel*
472
473An alias for 'pveum role delete'.
474
475*pveum rolemod*
476
477An alias for 'pveum role modify'.
478
1f554f76
DM
479*pveum ticket* `<username>` `[OPTIONS]`
480
481Create or verify authentication ticket.
482
013dc89f 483`<username>`: `<string>` ::
1f554f76
DM
484
485User name
486
2489d6df 487`--otp` `<string>` ::
1f554f76
DM
488
489One-time password for Two-factor authentication.
490
2489d6df 491`--path` `<string>` ::
1f554f76
DM
492
493Verify ticket, and check if user have access 'privs' on 'path'
494+
495NOTE: Requires option(s): `privs`
496
2489d6df 497`--privs` `<string>` ::
1f554f76
DM
498
499Verify ticket, and check if user have access 'privs' on 'path'
500+
501NOTE: Requires option(s): `path`
502
2489d6df 503`--realm` `<string>` ::
1f554f76 504
c2993fe5 505You can optionally pass the realm using this parameter. Normally the realm is simply added to the username <username>@<relam>.
1f554f76 506
e2d681b3 507*pveum user add* `<userid>` `[OPTIONS]`
1f554f76
DM
508
509Create new user.
510
013dc89f 511`<userid>`: `<string>` ::
1f554f76
DM
512
513User ID
514
2489d6df 515`--comment` `<string>` ::
1f554f76
DM
516
517no description available
518
2489d6df 519`--email` `<string>` ::
1f554f76
DM
520
521no description available
522
2489d6df 523`--enable` `<boolean>` ('default =' `1`)::
1f554f76 524
e2d681b3 525Enable the account (default). You can set this to '0' to disable the account
1f554f76 526
2489d6df 527`--expire` `<integer> (0 - N)` ::
1f554f76 528
c2993fe5 529Account expiration date (seconds since epoch). '0' means no expiration date.
1f554f76 530
2489d6df 531`--firstname` `<string>` ::
1f554f76
DM
532
533no description available
534
2489d6df 535`--groups` `<string>` ::
1f554f76
DM
536
537no description available
538
2489d6df 539`--keys` `<string>` ::
1f554f76
DM
540
541Keys for two factor auth (yubico).
542
2489d6df 543`--lastname` `<string>` ::
1f554f76
DM
544
545no description available
546
e2d681b3 547`--password` `<string>` ::
1f554f76
DM
548
549Initial password.
550
e2d681b3 551*pveum user delete* `<userid>`
1f554f76
DM
552
553Delete user.
554
013dc89f 555`<userid>`: `<string>` ::
1f554f76
DM
556
557User ID
558
5c1699e5
TL
559*pveum user list* `[OPTIONS]` `[FORMAT_OPTIONS]`
560
561User index.
562
563`--enabled` `<boolean>` ::
564
565Optional filter for enable property.
566
e9cd3bd4
TL
567`--full` `<boolean>` ('default =' `0`)::
568
569Include group and token information.
570
e2d681b3 571*pveum user modify* `<userid>` `[OPTIONS]`
1f554f76
DM
572
573Update user configuration.
574
013dc89f 575`<userid>`: `<string>` ::
1f554f76
DM
576
577User ID
578
2489d6df 579`--append` `<boolean>` ::
1f554f76
DM
580
581no description available
582+
583NOTE: Requires option(s): `groups`
584
2489d6df 585`--comment` `<string>` ::
1f554f76
DM
586
587no description available
588
2489d6df 589`--email` `<string>` ::
1f554f76
DM
590
591no description available
592
e2d681b3 593`--enable` `<boolean>` ('default =' `1`)::
1f554f76 594
e2d681b3 595Enable the account (default). You can set this to '0' to disable the account
1f554f76 596
2489d6df 597`--expire` `<integer> (0 - N)` ::
1f554f76 598
c2993fe5 599Account expiration date (seconds since epoch). '0' means no expiration date.
1f554f76 600
2489d6df 601`--firstname` `<string>` ::
1f554f76
DM
602
603no description available
604
2489d6df 605`--groups` `<string>` ::
1f554f76
DM
606
607no description available
608
2489d6df 609`--keys` `<string>` ::
1f554f76
DM
610
611Keys for two factor auth (yubico).
612
2489d6df 613`--lastname` `<string>` ::
1f554f76
DM
614
615no description available
616
e9cd3bd4
TL
617*pveum user permissions* `[<userid>]` `[OPTIONS]` `[FORMAT_OPTIONS]`
618
619Retrieve effective permissions of given user/token.
620
621`<userid>`: `(?^:^(?^:[^\s:/]+)\@(?^:[A-Za-z][A-Za-z0-9\.\-_]+)(?:!(?^:[A-Za-z][A-Za-z0-9\.\-_]+))?$)` ::
622
623User ID or full API token ID
624
625`--path` `<string>` ::
626
627Only dump this specific path, not the whole tree.
628
ac70d7d1
TL
629*pveum user tfa delete* `<userid>` `[OPTIONS]`
630
631Change user u2f authentication.
632
633`<userid>`: `<string>` ::
634
635User ID
636
637`--config` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
638
639A TFA configuration. This must currently be of type TOTP of not set at all.
640
641`--key` `<string>` ::
642
643When adding TOTP, the shared secret value.
644
645`--password` `<string>` ::
646
647The current password.
648
649`--response` `<string>` ::
650
651Either the the response to the current u2f registration challenge, or, when adding TOTP, the currently valid TOTP value.
652
e9cd3bd4
TL
653*pveum user token add* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
654
655Generate a new API token for a specific user. NOTE: returns API token
656value, which needs to be stored as it cannot be retrieved afterwards!
657
658`<userid>`: `<string>` ::
659
660User ID
661
662`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
663
664User-specific token identifier.
665
666`--comment` `<string>` ::
667
668no description available
669
670`--expire` `<integer> (0 - N)` ('default =' `same as user`)::
671
672API token expiration date (seconds since epoch). '0' means no expiration date.
673
674`--privsep` `<boolean>` ('default =' `1`)::
675
676Restrict API token privileges with separate ACLs (default), or give full privileges of corresponding user.
677
678*pveum user token list* `<userid>` `[FORMAT_OPTIONS]`
679
680Get user API tokens.
681
682`<userid>`: `<string>` ::
683
684User ID
685
686*pveum user token modify* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
687
688Update API token for a specific user.
689
690`<userid>`: `<string>` ::
691
692User ID
693
694`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
695
696User-specific token identifier.
697
698`--comment` `<string>` ::
699
700no description available
701
702`--expire` `<integer> (0 - N)` ('default =' `same as user`)::
703
704API token expiration date (seconds since epoch). '0' means no expiration date.
705
706`--privsep` `<boolean>` ('default =' `1`)::
707
708Restrict API token privileges with separate ACLs (default), or give full privileges of corresponding user.
709
710*pveum user token permissions* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
711
712Retrieve effective permissions of given token.
713
714`<userid>`: `<string>` ::
715
716User ID
717
718`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
719
720User-specific token identifier.
721
722`--path` `<string>` ::
723
724Only dump this specific path, not the whole tree.
725
726*pveum user token remove* `<userid> <tokenid>` `[FORMAT_OPTIONS]`
727
728Remove API token for a specific user.
729
730`<userid>`: `<string>` ::
731
732User ID
733
734`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
735
736User-specific token identifier.
737
e2d681b3
TL
738*pveum useradd*
739
740An alias for 'pveum user add'.
741
742*pveum userdel*
743
744An alias for 'pveum user delete'.
745
746*pveum usermod*
747
748An alias for 'pveum user modify'.
749
1f554f76 750