]> git.proxmox.com Git - pve-docs.git/blame - pveum.adoc
move and expand the Objects and Paths section
[pve-docs.git] / pveum.adoc
CommitLineData
3c8533f2
DM
1ifdef::manvolnum[]
2PVE({manvolnum})
3================
38fd0958 4include::attributes.txt[]
3c8533f2
DM
5
6NAME
7----
8
9pveum - Proxmox VE User Manager
10
11
12SYNOPSYS
13--------
14
15include::pveum.1-synopsis.adoc[]
16
17
18DESCRIPTION
19-----------
20endif::manvolnum[]
21
22ifndef::manvolnum[]
23User Management
24===============
38fd0958 25include::attributes.txt[]
3c8533f2
DM
26endif::manvolnum[]
27
28// Copied from pve wiki: Revision as of 16:10, 27 October 2015
29
5462c161
WB
30Proxmox VE supports multiple authentication sources, e.g. Linux PAM,
31an integrated Proxmox VE authentication server, LDAP, Microsoft Active
32Directory.
3c8533f2
DM
33
34By using the role based user- and permission management for all
5eba0743
FG
35objects (VMs, storages, nodes, etc.) granular access can be defined.
36
3c8533f2 37
c80b9ee6
WB
38Users
39-----
40
41{pve} stores user attributes in `/etc/pve/user.cfg`.
42Passwords are not stored here, users are instead associated with
43<<authentication-realms,authentication realms>> described below.
44Therefore a user is internally often identified by its name and
45realm in the form `<userid>@<realm>`.
46
47Each user entry in this file contains the following information:
48
49* First name
50* Last name
51* E-mail address
52* Group memberships
53* An optional Expiration date
54* A comment or note about this user
55* Whether this user is enabled or disabled
56* Optional two factor authentication keys
57
58
59System administrator
60~~~~~~~~~~~~~~~~~~~~
61
62The system's root user can always log in via the Linux PAM realm and is an
63unconfined administrator. This user cannot be deleted, but attributes can
64still be changed and system mails will be sent to the email address
65assigned to this user.
66
67
68Groups
69~~~~~~
70
71Each user can be member of several groups. Groups are the preferred
72way to organize access permissions. You should always grant permission
73to groups instead of using individual users. That way you will get a
74much shorter access control list which is easier to handle.
75
76
d6614202 77[[authentication-realms]]
3c8533f2
DM
78Authentication Realms
79---------------------
80
d6614202
WB
81As {pve} users are just counterparts for users existing on some external
82realm, the realms have to be configured in `/etc/pve/domains.cfg`.
83The following realms (authentication methods) are available:
3c8533f2
DM
84
85Linux PAM standard authentication::
d6614202
WB
86In this case a system user has to exist (eg. created via the `adduser`
87command) on all nodes the user is allowed to login, and the user
88authenticates with their usual system password.
89+
3c8533f2
DM
90[source,bash]
91----
92useradd heinz
93passwd heinz
94groupadd watchman
95usermod -a -G watchman heinz
96----
97
98Proxmox VE authentication server::
d6614202
WB
99This is a unix like password store (`/etc/pve/priv/shadow.cfg`).
100Password are encrypted using the SHA-256 hash method.
101This is the most convenient method for for small (or even medium)
102installations where users do not need access to anything outside of
103{pve}. In this case users are fully managed by {pve} and are able to
104change their own passwords via the GUI.
105
106LDAP::
107It is possible to authenticate users via an LDAP server (eq.
108openldap). The server and an optional fallback server can be
109configured and the connection can be encrypted via SSL.
110+
111Users are searched under a 'Base Domain Name' (`base_dn`), with the
112user name found in the attribute specified in the 'User Attribute Name'
113(`user_attr`) field.
114+
115For instance, if a user is represented via the
116following ldif dataset:
117+
118----
119# user1 of People at ldap-test.com
120dn: uid=user1,ou=People,dc=ldap-test,dc=com
121objectClass: top
122objectClass: person
123objectClass: organizationalPerson
124objectClass: inetOrgPerson
125uid: user1
126cn: Test User 1
127sn: Testers
128description: This is the first test user.
129----
130+
131The 'Base Domain Name' would be `ou=People,dc=ldap-test,dc=com` and the user
132attribute would be `uid`.
133+
134If {pve} needs to authenticate (bind) to the ldap server before being
135able to query and authenticate users, a bind domain name can be
136configured via the `bind_dn` property in `/etc/pve/domains.cfg`. Its
137password then has to be stored in `/etc/pve/priv/ldap/<realmname>.pw`
138(eg. `/etc/pve/priv/ldap/my-ldap.pw`). This file should contain a
139single line containing the raw password.
140
141Microsoft Active Directory::
3c8533f2 142
d6614202
WB
143A server and authentication domain need to be specified. Like with
144ldap an optional fallback server, optional port, and SSL
145encryption can be configured.
3c8533f2 146
5eba0743 147
9e8f2770
WB
148Two factor authentication
149-------------------------
150
151Each realm can optionally be secured additionally by two factor
152authentication. This can be done by selecting one of the available methods
153via the 'TFA' dropdown box when adding or editing an Authentication Realm.
154When a realm has TFA enabled it becomes a requirement and only users with
155configured TFA will be able to login.
156
157Currently there are two methods available:
158
159Time based OATH (TOTP)::
160This uses the standard HMAC-SHA1 algorithm where the current time is hashed
161with the user's configured key. The time step and password length
162parameters are configured.
163+
164A user can have multiple keys configured (separated by spaces), and the
165keys can be specified in Base32 (RFC3548) or hexadecimal notation.
166+
167{pve} provides a key generation tool (`oathkeygen`) which prints out a
168random key in Base32 notation which can be used directly with various OTP
169tools, such as the `oathtool` command line tool, the Google authenticator
170or FreeOTP Android apps.
171
172YubiKey OTP::
173For authenticating via a YubiKey a Yubico API ID, API KEY and validation
174server URL must be configured, and users must have a YubiKey available. In
175order to get the key ID from a YubiKey, you can trigger the YubiKey once
176after connecting it to USB and copy the first 12 characters of the typed
177password into the user's 'Key IDs' field.
178+
179Please refer to the
180https://developers.yubico.com/OTP/[YubiKey OTP] documentation for how to use the
181https://www.yubico.com/products/services-software/yubicloud/[YubiCloud] or
182https://developers.yubico.com/Software_Projects/YubiKey_OTP/YubiCloud_Validation_Servers/[
183host your own verification server].
184
185
04f44730 186Permission Management
3c8533f2
DM
187---------------------
188
04f44730
WB
189In order for a user to perform an action (such as listing, modifying or
190deleting a parts of a VM configuration), the user needs to have the
191appropriate permissions.
192
193{pve} uses a role and path based permission management system. An entry in
194the permissions table allows a user or group to take on a specific role
195when accessing an 'object' or 'path'. This means an such an access rule can
196be represented as a triple of '(path, user, role)' or '(path, group,
197role)', with the role containing a set of allowed actions, and the path
198representing the target of these actions.
199
5eba0743 200
853d288b
WB
201Roles
202~~~~~
203
204A role is simply a list of privileges. Proxmox VE comes with a number
205of predefined roles which satisfies most needs.
206
207* `Administrator`: has all privileges
208* `NoAccess`: has no privileges (used to forbid access)
209* `PVEAdmin`: can do most things, but miss rights to modify system settings (`Sys.PowerMgmt`, `Sys.Modify`, `Realm.Allocate`).
210* `PVEAuditor`: read only access
211* `PVEDatastoreAdmin`: create and allocate backup space and templates
212* `PVEDatastoreUser`: allocate backup space and view storage
213* `PVEPoolAdmin`: allocate pools
214* `PVESysAdmin`: User ACLs, audit, system console and system logs
215* `PVETemplateUser`: view and clone templates
216* `PVEUserAdmin`: user administration
217* `PVEVMAdmin`: fully administer VMs
218* `PVEVMUser`: view, backup, config CDROM, VM console, VM power management
219
220You can see the whole set of predefined roles on the GUI.
221
222Adding new roles can currently only be done from the command line, like
223this:
224
225[source,bash]
226----
227pveum roleadd PVE_Power-only -privs "VM.PowerMgmt VM.Console"
228pveum roleadd Sys_Power-only -privs "Sys.PowerMgmt Sys.Console"
229----
230
231
3c8533f2
DM
232Privileges
233~~~~~~~~~~
234
235A privilege is the right to perform a specific action. To simplify
236management, lists of privileges are grouped into roles, which can then
0e1fda70
WB
237be used in the permission table. Note that privileges cannot directly be
238assigned to users and paths without being part of a role.
3c8533f2
DM
239
240We currently use the following privileges:
241
242Node / System related privileges::
243
244* `Permissions.Modify`: modify access permissions
245* `Sys.PowerMgmt`: Node power management (start, stop, reset, shutdown, ...)
246* `Sys.Console`: console access to Node
247* `Sys.Syslog`: view Syslog
248* `Sys.Audit`: view node status/config
249* `Sys.Modify`: create/remove/modify node network parameters
250* `Group.Allocate`: create/remove/modify groups
251* `Pool.Allocate`: create/remove/modify a pool
252* `Realm.Allocate`: create/remove/modify authentication realms
253* `Realm.AllocateUser`: assign user to a realm
254* `User.Modify`: create/remove/modify user access and details.
255
256Virtual machine related privileges::
257
258* `VM.Allocate`: create/remove new VM to server inventory
259* `VM.Migrate`: migrate VM to alternate server on cluster
260* `VM.PowerMgmt`: power management (start, stop, reset, shutdown, ...)
261* `VM.Console`: console access to VM
262* `VM.Monitor`: access to VM monitor (kvm)
263* `VM.Backup`: backup/restore VMs
264* `VM.Audit`: view VM config
265* `VM.Clone`: clone/copy a VM
266* `VM.Config.Disk`: add/modify/delete Disks
267* `VM.Config.CDROM`: eject/change CDROM
268* `VM.Config.CPU`: modify CPU settings
269* `VM.Config.Memory`: modify Memory settings
270* `VM.Config.Network`: add/modify/delete Network devices
271* `VM.Config.HWType`: modify emulated HW type
272* `VM.Config.Options`: modify any other VM configuration
273* `VM.Snapshot`: create/remove VM snapshots
274
275Storage related privileges::
276
277* `Datastore.Allocate`: create/remove/modify a data store, delete volumes
278* `Datastore.AllocateSpace`: allocate space on a datastore
279* `Datastore.AllocateTemplate`: allocate/upload templates and iso images
280* `Datastore.Audit`: view/browse a datastore
281
5eba0743 282
b8eeec52
WB
283Objects and Paths
284~~~~~~~~~~~~~~~~~
285
286Access permissions are assigned to objects, such as a virtual machines,
287storages or pools of resources.
288We use file system like paths to address these objects. These paths form a
289natural tree, and permissions of higher levels (shorter path) can
290optionally be propagated down within this hierarchy.
291
292[[templated-paths]]
293Paths can be templated. When an API call requires permissions on a
294templated path, the path may contain references to parameters of the API
295call. These references are specified in curly braces. Some parameters are
296implicitly taken from the API call's URI. For instance the permission path
297`/nodes/{node}` when calling '/nodes/mynode/status' requires permissions on
298`/nodes/mynode`, while the path `{path}` in a PUT request to `/access/acl`
299refers to the method's `path` parameter.
300
301Some examples are:
302
303* `/nodes/{node}`: Access to {pve} server machines
304* `/vms`: Covers all VMs
305* `/vms/{vmid}`: Access to specific VMs
306* `/storage/{storeid}`: Access to a storages
307* `/pool/{poolname}`: Access to VMs part of a <<resource-pools,pool>
308* `/access/groups`: Group administration
309* `/access/realms/{realmid}`: Administrative access to realms
310
311
3c8533f2
DM
312Permissions
313~~~~~~~~~~~
314
315Permissions are the way we control access to objects. In technical
316terms they are simply a triple containing `<path,user,role>`. This
317concept is also known as access control lists. Each permission
318specifies a subject (user or group) and a role (set of privileges) on
319a specific path.
320
321When a subject requests an action on an object, the framework looks up
322the roles assigned to that subject (using the object path). The set of
323roles defines the granted privileges.
324
5eba0743 325
3c8533f2
DM
326Inheritance
327^^^^^^^^^^^
328
5eba0743 329As mentioned earlier, object paths form a file system like tree, and
3c8533f2
DM
330permissions can be inherited down that tree (the propagate flag is set
331by default). We use the following inheritance rules:
332
74936daf
WB
333* Permissions for individual users always replace group permissions.
334* Permissions for groups apply when the user is member of that group.
335* Permissions replace the ones inherited from an upper level.
3c8533f2 336
5eba0743 337
3c8533f2
DM
338Pools
339~~~~~
340
341Pools can be used to group a set of virtual machines and data
8c1189b6 342stores. You can then simply set permissions on pools (`/pool/{poolid}`),
3c8533f2
DM
343which are inherited to all pool members. This is a great way simplify
344access control.
345
74936daf
WB
346
347What permission do I need?
348~~~~~~~~~~~~~~~~~~~~~~~~~~
349
350The required API permissions are documented for each individual
351method, and can be found at http://pve.proxmox.com/pve-docs/api-viewer/
352
353The permissions are specified as a list which can be interpreted as a
354tree of logic and access-check functions:
355
356`["and", <subtests>...]` and `["or", <subtests>...]`::
357Each(`and`) or any(`or`) further element in the current list has to be true.
358
359`["perm", <path>, [ <privileges>... ], <options>...]`::
360The `path` is a templated parameter (see <<templated-paths,Objects and
361Paths>>). All (or , if the `any` option is used, any) of the listed
362privileges must be allowed on the specified path. If a `require-param`
363option is specified, then its specified parameter is required even if the
364API call's schema otherwise lists it as being optional.
365
366`["userid-group", [ <privileges>... ], <options>...]`::
367The callermust have any of the listed privileges on `/access/groups`. In
368addition there are two possible checks depending on whether the
369`groups_param` option is set:
370+
371* `groups_param` is set: The API call has a non-optional `groups` parameter
372and the caller must have any of the listed privileges on all of the listed
373groups.
374* `groups_param` is not set: The user passed via the `userid` parameter
375must exist and be part of a group on which the caller has any of the listed
376privileges (via the `/access/groups/<group>` path).
377
378`["userid-param", "self"]`::
379The value provided for the API call's `userid` parameter must refer to the
380user performing the action. (Usually in conjunction with `or`, to allow
381users to perform an action on themselves even if they don't have elevated
382privileges.)
383
384`["userid-param", "Realm.AllocateUser"]`::
385The user needs `Realm.AllocateUser` access to `/access/realm/<realm>`, with
386`<realm>` refering to the realm of the user passed via the `userid`
387parameter. Note that the user does not need to exist in order to be
388associated with a realm, since user IDs are passed in the form of
389`<username>@<realm>`.
390
391`["perm-modify", <path>]`::
392The `path` is a templated parameter (see <<templated-paths,Objects and
393Paths>>). The user needs either the `Permissions.Modify` privilege, or,
394depending on the path, the following privileges as a possible substitute:
395+
396* `/storage/...`: additionally requires 'Datastore.Allocate`
397* `/vms/...`: additionally requires 'VM.Allocate`
398* `/pool/...`: additionally requires 'Pool.Allocate`
399+
400If the path is empty, `Permission.Modify` on `/access` is required.
401
3c8533f2
DM
402Command Line Tool
403-----------------
404
405Most users will simply use the GUI to manage users. But there is also
8c1189b6 406a full featured command line tool called `pveum` (short for ``**P**roxmox
4f6e7e05
WB
407**VE** **U**ser **M**anager''). Please note that all Proxmox VE command
408line tools are wrappers around the API, so you can also access those
409function through the REST API.
3c8533f2
DM
410
411Here are some simple usage examples. To show help type:
412
413[source,bash]
414 pveum
415
416or (to show detailed help about a specific command)
417
418[source,bash]
419 pveum help useradd
420
421Create a new user:
422
423[source,bash]
424 pveum useradd testuser@pve -comment "Just a test"
425
426Set or Change the password (not all realms support that):
427
428[source,bash]
429 pveum passwd testuser@pve
430
431Disable a user:
432
433[source,bash]
434 pveum usermod testuser@pve -enable 0
435
436Create a new group:
437
438[source,bash]
439 pveum groupadd testgroup
440
441Create a new role:
442
443[source,bash]
444 pveum roleadd PVE_Power-only -privs "VM.PowerMgmt VM.Console"
445
446
447Real World Examples
448-------------------
449
5eba0743 450
3c8533f2
DM
451Administrator Group
452~~~~~~~~~~~~~~~~~~~
453
454One of the most wanted features was the ability to define a group of
5eba0743 455users with full administrator rights (without using the root account).
3c8533f2
DM
456
457Define the group:
458
459[source,bash]
460 pveum groupadd admin -comment "System Administrators"
461
462Then add the permission:
463
464[source,bash]
465 pveum aclmod / -group admin -role Administrator
466
467You can finally add users to the new 'admin' group:
468
469[source,bash]
470 pveum usermod testuser@pve -group admin
471
472
473Auditors
474~~~~~~~~
475
476You can give read only access to users by assigning the `PVEAuditor`
477role to users or groups.
478
8c1189b6 479Example1: Allow user `joe@pve` to see everything
3c8533f2
DM
480
481[source,bash]
482 pveum aclmod / -user joe@pve -role PVEAuditor
483
8c1189b6 484Example1: Allow user `joe@pve` to see all virtual machines
3c8533f2
DM
485
486[source,bash]
487 pveum aclmod /vms -user joe@pve -role PVEAuditor
488
5eba0743 489
3c8533f2
DM
490Delegate User Management
491~~~~~~~~~~~~~~~~~~~~~~~~
492
8c1189b6 493If you want to delegate user managenent to user `joe@pve` you can do
3c8533f2
DM
494that with:
495
496[source,bash]
497 pveum aclmod /access -user joe@pve -role PVEUserAdmin
498
8c1189b6 499User `joe@pve` can now add and remove users, change passwords and
3c8533f2
DM
500other user attributes. This is a very powerful role, and you most
501likely want to limit that to selected realms and groups. The following
8c1189b6
FG
502example allows `joe@pve` to modify users within realm `pve` if they
503are members of group `customers`:
3c8533f2
DM
504
505[source,bash]
506 pveum aclmod /access/realm/pve -user joe@pve -role PVEUserAdmin
507 pveum aclmod /access/groups/customers -user joe@pve -role PVEUserAdmin
508
0abc65b0 509NOTE: The user is able to add other users, but only if they are
8c1189b6
FG
510members of group `customers` and within realm `pve`.
511
3c8533f2
DM
512
513Pools
514~~~~~
515
516An enterprise is usually structured into several smaller departments,
517and it is common that you want to assign resources to them and
518delegate management tasks. A pool is simply a set of virtual machines
519and data stores. You can create pools on the GUI. After that you can
520add resources to the pool (VMs, Storage).
521
522You can also assign permissions to the pool. Those permissions are
523inherited to all pool members.
524
525Lets assume you have a software development department, so we first
526create a group
527
528[source,bash]
529 pveum groupadd developers -comment "Our software developers"
530
531Now we create a new user which is a member of that group
532
533[source,bash]
534 pveum useradd developer1@pve -group developers -password
535
0abc65b0 536NOTE: The -password parameter will prompt you for a password
3c8533f2 537
8c1189b6 538I assume we already created a pool called ``dev-pool'' on the GUI. So we can now assign permission to that pool:
3c8533f2
DM
539
540[source,bash]
541 pveum aclmod /pool/dev-pool/ -group developers -role PVEAdmin
542
543Our software developers can now administrate the resources assigned to
544that pool.
545
546
547ifdef::manvolnum[]
548include::pve-copyright.adoc[]
549endif::manvolnum[]
550