]> git.proxmox.com Git - pve-docs.git/blame_incremental - pveum.1-synopsis.adoc
update sdn doc
[pve-docs.git] / pveum.1-synopsis.adoc
... / ...
CommitLineData
1*pveum* `<COMMAND> [ARGS] [OPTIONS]`
2
3*pveum acl delete* `<path> --roles <string>` `[OPTIONS]`
4
5Update Access Control List (add or remove permissions).
6
7`<path>`: `<string>` ::
8
9Access control path
10
11`--groups` `<string>` ::
12
13List of groups.
14
15`--propagate` `<boolean>` ('default =' `1`)::
16
17Allow to propagate (inherit) permissions.
18
19`--roles` `<string>` ::
20
21List of roles.
22
23`--tokens` `<string>` ::
24
25List of API tokens.
26
27`--users` `<string>` ::
28
29List of users.
30
31*pveum acl list* `[FORMAT_OPTIONS]`
32
33Get Access Control List (ACLs).
34
35*pveum acl modify* `<path> --roles <string>` `[OPTIONS]`
36
37Update Access Control List (add or remove permissions).
38
39`<path>`: `<string>` ::
40
41Access control path
42
43`--groups` `<string>` ::
44
45List of groups.
46
47`--propagate` `<boolean>` ('default =' `1`)::
48
49Allow to propagate (inherit) permissions.
50
51`--roles` `<string>` ::
52
53List of roles.
54
55`--tokens` `<string>` ::
56
57List of API tokens.
58
59`--users` `<string>` ::
60
61List of users.
62
63*pveum acldel*
64
65An alias for 'pveum acl delete'.
66
67*pveum aclmod*
68
69An alias for 'pveum acl modify'.
70
71*pveum group add* `<groupid>` `[OPTIONS]`
72
73Create new group.
74
75`<groupid>`: `<string>` ::
76
77no description available
78
79`--comment` `<string>` ::
80
81no description available
82
83*pveum group delete* `<groupid>`
84
85Delete group.
86
87`<groupid>`: `<string>` ::
88
89no description available
90
91*pveum group list* `[FORMAT_OPTIONS]`
92
93Group index.
94
95*pveum group modify* `<groupid>` `[OPTIONS]`
96
97Update group data.
98
99`<groupid>`: `<string>` ::
100
101no description available
102
103`--comment` `<string>` ::
104
105no description available
106
107*pveum groupadd*
108
109An alias for 'pveum group add'.
110
111*pveum groupdel*
112
113An alias for 'pveum group delete'.
114
115*pveum groupmod*
116
117An alias for 'pveum group modify'.
118
119*pveum help* `[OPTIONS]`
120
121Get help about specified command.
122
123`--extra-args` `<array>` ::
124
125Shows help for a specific command
126
127`--verbose` `<boolean>` ::
128
129Verbose output format.
130
131*pveum passwd* `<userid>`
132
133Change user password.
134
135`<userid>`: `<string>` ::
136
137User ID
138
139*pveum pool add* `<poolid>` `[OPTIONS]`
140
141Create new pool.
142
143`<poolid>`: `<string>` ::
144
145no description available
146
147`--comment` `<string>` ::
148
149no description available
150
151*pveum pool delete* `<poolid>`
152
153Delete pool.
154
155`<poolid>`: `<string>` ::
156
157no description available
158
159*pveum pool list* `[FORMAT_OPTIONS]`
160
161Pool index.
162
163*pveum pool modify* `<poolid>` `[OPTIONS]`
164
165Update pool data.
166
167`<poolid>`: `<string>` ::
168
169no description available
170
171`--comment` `<string>` ::
172
173no description available
174
175`--delete` `<boolean>` ::
176
177Remove vms/storage (instead of adding it).
178
179`--storage` `<string>` ::
180
181List of storage IDs.
182
183`--vms` `<string>` ::
184
185List of virtual machines.
186
187*pveum realm add* `<realm> --type <string>` `[OPTIONS]`
188
189Add an authentication server.
190
191`<realm>`: `<string>` ::
192
193Authentication domain ID
194
195`--base_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
196
197LDAP base domain name
198
199`--bind_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
200
201LDAP bind domain name
202
203`--capath` `<string>` ('default =' `/etc/ssl/certs`)::
204
205Path to the CA certificate store
206
207`--case-sensitive` `<boolean>` ('default =' `1`)::
208
209username is case-sensitive
210
211`--cert` `<string>` ::
212
213Path to the client certificate
214
215`--certkey` `<string>` ::
216
217Path to the client certificate key
218
219`--comment` `<string>` ::
220
221Description.
222
223`--default` `<boolean>` ::
224
225Use this as default realm
226
227`--domain` `\S+` ::
228
229AD domain name
230
231`--filter` `<string>` ::
232
233LDAP filter for user sync.
234
235`--group_classes` `<string>` ('default =' `groupOfNames, group, univentionGroup, ipausergroup`)::
236
237The objectclasses for groups.
238
239`--group_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
240
241LDAP base domain name for group sync. If not set, the base_dn will be used.
242
243`--group_filter` `<string>` ::
244
245LDAP filter for group sync.
246
247`--group_name_attr` `<string>` ::
248
249LDAP attribute representing a groups name. If not set or found, the first value of the DN will be used as name.
250
251`--mode` `<ldap | ldap+starttls | ldaps>` ('default =' `ldap`)::
252
253LDAP protocol mode.
254
255`--password` `<string>` ::
256
257LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
258
259`--port` `<integer> (1 - 65535)` ::
260
261Server port.
262
263`--secure` `<boolean>` ::
264
265Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
266
267`--server1` `<string>` ::
268
269Server IP address (or DNS name)
270
271`--server2` `<string>` ::
272
273Fallback Server IP address (or DNS name)
274
275`--sslversion` `<tlsv1 | tlsv1_1 | tlsv1_2 | tlsv1_3>` ::
276
277LDAPS TLS/SSL version. It's not recommended to use version older than 1.2!
278
279`--sync-defaults-options` `[enable-new=<1|0>] [,full=<1|0>] [,purge=<1|0>] [,scope=<users|groups|both>]` ::
280
281The default options for behavior of synchronizations.
282
283`--sync_attributes` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
284
285Comma separated list of key=value pairs for specifying which LDAP attributes map to which PVE user field. For example, to map the LDAP attribute 'mail' to PVEs 'email', write 'email=mail'. By default, each PVE user field is represented by an LDAP attribute of the same name.
286
287`--tfa` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
288
289Use Two-factor authentication.
290
291`--type` `<ad | ldap | pam | pve>` ::
292
293Realm type.
294
295`--user_attr` `\S{2,}` ::
296
297LDAP user attribute name
298
299`--user_classes` `<string>` ('default =' `inetorgperson, posixaccount, person, user`)::
300
301The objectclasses for users.
302
303`--verify` `<boolean>` ('default =' `0`)::
304
305Verify the server's SSL certificate
306
307*pveum realm delete* `<realm>`
308
309Delete an authentication server.
310
311`<realm>`: `<string>` ::
312
313Authentication domain ID
314
315*pveum realm list* `[FORMAT_OPTIONS]`
316
317Authentication domain index.
318
319*pveum realm modify* `<realm>` `[OPTIONS]`
320
321Update authentication server settings.
322
323`<realm>`: `<string>` ::
324
325Authentication domain ID
326
327`--base_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
328
329LDAP base domain name
330
331`--bind_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
332
333LDAP bind domain name
334
335`--capath` `<string>` ('default =' `/etc/ssl/certs`)::
336
337Path to the CA certificate store
338
339`--case-sensitive` `<boolean>` ('default =' `1`)::
340
341username is case-sensitive
342
343`--cert` `<string>` ::
344
345Path to the client certificate
346
347`--certkey` `<string>` ::
348
349Path to the client certificate key
350
351`--comment` `<string>` ::
352
353Description.
354
355`--default` `<boolean>` ::
356
357Use this as default realm
358
359`--delete` `<string>` ::
360
361A list of settings you want to delete.
362
363`--digest` `<string>` ::
364
365Prevent changes if current configuration file has different SHA1 digest. This can be used to prevent concurrent modifications.
366
367`--domain` `\S+` ::
368
369AD domain name
370
371`--filter` `<string>` ::
372
373LDAP filter for user sync.
374
375`--group_classes` `<string>` ('default =' `groupOfNames, group, univentionGroup, ipausergroup`)::
376
377The objectclasses for groups.
378
379`--group_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
380
381LDAP base domain name for group sync. If not set, the base_dn will be used.
382
383`--group_filter` `<string>` ::
384
385LDAP filter for group sync.
386
387`--group_name_attr` `<string>` ::
388
389LDAP attribute representing a groups name. If not set or found, the first value of the DN will be used as name.
390
391`--mode` `<ldap | ldap+starttls | ldaps>` ('default =' `ldap`)::
392
393LDAP protocol mode.
394
395`--password` `<string>` ::
396
397LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
398
399`--port` `<integer> (1 - 65535)` ::
400
401Server port.
402
403`--secure` `<boolean>` ::
404
405Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
406
407`--server1` `<string>` ::
408
409Server IP address (or DNS name)
410
411`--server2` `<string>` ::
412
413Fallback Server IP address (or DNS name)
414
415`--sslversion` `<tlsv1 | tlsv1_1 | tlsv1_2 | tlsv1_3>` ::
416
417LDAPS TLS/SSL version. It's not recommended to use version older than 1.2!
418
419`--sync-defaults-options` `[enable-new=<1|0>] [,full=<1|0>] [,purge=<1|0>] [,scope=<users|groups|both>]` ::
420
421The default options for behavior of synchronizations.
422
423`--sync_attributes` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
424
425Comma separated list of key=value pairs for specifying which LDAP attributes map to which PVE user field. For example, to map the LDAP attribute 'mail' to PVEs 'email', write 'email=mail'. By default, each PVE user field is represented by an LDAP attribute of the same name.
426
427`--tfa` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
428
429Use Two-factor authentication.
430
431`--user_attr` `\S{2,}` ::
432
433LDAP user attribute name
434
435`--user_classes` `<string>` ('default =' `inetorgperson, posixaccount, person, user`)::
436
437The objectclasses for users.
438
439`--verify` `<boolean>` ('default =' `0`)::
440
441Verify the server's SSL certificate
442
443*pveum realm sync* `<realm>` `[OPTIONS]`
444
445Syncs users and/or groups from the configured LDAP to user.cfg. NOTE:
446Synced groups will have the name 'name-$realm', so make sure those groups
447do not exist to prevent overwriting.
448
449`<realm>`: `<string>` ::
450
451Authentication domain ID
452
453`--dry-run` `<boolean>` ('default =' `0`)::
454
455If set, does not write anything.
456
457`--enable-new` `<boolean>` ('default =' `1`)::
458
459Enable newly synced users immediately.
460
461`--full` `<boolean>` ::
462
463If set, uses the LDAP Directory as source of truth, deleting users or groups not returned from the sync. Otherwise only syncs information which is not already present, and does not deletes or modifies anything else.
464
465`--purge` `<boolean>` ::
466
467Remove ACLs for users or groups which were removed from the config during a sync.
468
469`--scope` `<both | groups | users>` ::
470
471Select what to sync.
472
473*pveum role add* `<roleid>` `[OPTIONS]`
474
475Create new role.
476
477`<roleid>`: `<string>` ::
478
479no description available
480
481`--privs` `<string>` ::
482
483no description available
484
485*pveum role delete* `<roleid>`
486
487Delete role.
488
489`<roleid>`: `<string>` ::
490
491no description available
492
493*pveum role list* `[FORMAT_OPTIONS]`
494
495Role index.
496
497*pveum role modify* `<roleid>` `[OPTIONS]`
498
499Update an existing role.
500
501`<roleid>`: `<string>` ::
502
503no description available
504
505`--append` `<boolean>` ::
506
507no description available
508+
509NOTE: Requires option(s): `privs`
510
511`--privs` `<string>` ::
512
513no description available
514
515*pveum roleadd*
516
517An alias for 'pveum role add'.
518
519*pveum roledel*
520
521An alias for 'pveum role delete'.
522
523*pveum rolemod*
524
525An alias for 'pveum role modify'.
526
527*pveum ticket* `<username>` `[OPTIONS]`
528
529Create or verify authentication ticket.
530
531`<username>`: `<string>` ::
532
533User name
534
535`--otp` `<string>` ::
536
537One-time password for Two-factor authentication.
538
539`--path` `<string>` ::
540
541Verify ticket, and check if user have access 'privs' on 'path'
542+
543NOTE: Requires option(s): `privs`
544
545`--privs` `<string>` ::
546
547Verify ticket, and check if user have access 'privs' on 'path'
548+
549NOTE: Requires option(s): `path`
550
551`--realm` `<string>` ::
552
553You can optionally pass the realm using this parameter. Normally the realm is simply added to the username <username>@<relam>.
554
555*pveum user add* `<userid>` `[OPTIONS]`
556
557Create new user.
558
559`<userid>`: `<string>` ::
560
561User ID
562
563`--comment` `<string>` ::
564
565no description available
566
567`--email` `<string>` ::
568
569no description available
570
571`--enable` `<boolean>` ('default =' `1`)::
572
573Enable the account (default). You can set this to '0' to disable the account
574
575`--expire` `<integer> (0 - N)` ::
576
577Account expiration date (seconds since epoch). '0' means no expiration date.
578
579`--firstname` `<string>` ::
580
581no description available
582
583`--groups` `<string>` ::
584
585no description available
586
587`--keys` `<string>` ::
588
589Keys for two factor auth (yubico).
590
591`--lastname` `<string>` ::
592
593no description available
594
595`--password` `<string>` ::
596
597Initial password.
598
599*pveum user delete* `<userid>`
600
601Delete user.
602
603`<userid>`: `<string>` ::
604
605User ID
606
607*pveum user list* `[OPTIONS]` `[FORMAT_OPTIONS]`
608
609User index.
610
611`--enabled` `<boolean>` ::
612
613Optional filter for enable property.
614
615`--full` `<boolean>` ('default =' `0`)::
616
617Include group and token information.
618
619*pveum user modify* `<userid>` `[OPTIONS]`
620
621Update user configuration.
622
623`<userid>`: `<string>` ::
624
625User ID
626
627`--append` `<boolean>` ::
628
629no description available
630+
631NOTE: Requires option(s): `groups`
632
633`--comment` `<string>` ::
634
635no description available
636
637`--email` `<string>` ::
638
639no description available
640
641`--enable` `<boolean>` ('default =' `1`)::
642
643Enable the account (default). You can set this to '0' to disable the account
644
645`--expire` `<integer> (0 - N)` ::
646
647Account expiration date (seconds since epoch). '0' means no expiration date.
648
649`--firstname` `<string>` ::
650
651no description available
652
653`--groups` `<string>` ::
654
655no description available
656
657`--keys` `<string>` ::
658
659Keys for two factor auth (yubico).
660
661`--lastname` `<string>` ::
662
663no description available
664
665*pveum user permissions* `[<userid>]` `[OPTIONS]` `[FORMAT_OPTIONS]`
666
667Retrieve effective permissions of given user/token.
668
669`<userid>`: `(?^:^(?^:[^\s:/]+)\@(?^:[A-Za-z][A-Za-z0-9\.\-_]+)(?:!(?^:[A-Za-z][A-Za-z0-9\.\-_]+))?$)` ::
670
671User ID or full API token ID
672
673`--path` `<string>` ::
674
675Only dump this specific path, not the whole tree.
676
677*pveum user tfa delete* `<userid>` `[OPTIONS]`
678
679Change user u2f authentication.
680
681`<userid>`: `<string>` ::
682
683User ID
684
685`--config` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
686
687A TFA configuration. This must currently be of type TOTP of not set at all.
688
689`--key` `<string>` ::
690
691When adding TOTP, the shared secret value.
692
693`--password` `<string>` ::
694
695The current password.
696
697`--response` `<string>` ::
698
699Either the the response to the current u2f registration challenge, or, when adding TOTP, the currently valid TOTP value.
700
701*pveum user token add* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
702
703Generate a new API token for a specific user. NOTE: returns API token
704value, which needs to be stored as it cannot be retrieved afterwards!
705
706`<userid>`: `<string>` ::
707
708User ID
709
710`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
711
712User-specific token identifier.
713
714`--comment` `<string>` ::
715
716no description available
717
718`--expire` `<integer> (0 - N)` ('default =' `same as user`)::
719
720API token expiration date (seconds since epoch). '0' means no expiration date.
721
722`--privsep` `<boolean>` ('default =' `1`)::
723
724Restrict API token privileges with separate ACLs (default), or give full privileges of corresponding user.
725
726*pveum user token list* `<userid>` `[FORMAT_OPTIONS]`
727
728Get user API tokens.
729
730`<userid>`: `<string>` ::
731
732User ID
733
734*pveum user token modify* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
735
736Update API token for a specific user.
737
738`<userid>`: `<string>` ::
739
740User ID
741
742`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
743
744User-specific token identifier.
745
746`--comment` `<string>` ::
747
748no description available
749
750`--expire` `<integer> (0 - N)` ('default =' `same as user`)::
751
752API token expiration date (seconds since epoch). '0' means no expiration date.
753
754`--privsep` `<boolean>` ('default =' `1`)::
755
756Restrict API token privileges with separate ACLs (default), or give full privileges of corresponding user.
757
758*pveum user token permissions* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
759
760Retrieve effective permissions of given token.
761
762`<userid>`: `<string>` ::
763
764User ID
765
766`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
767
768User-specific token identifier.
769
770`--path` `<string>` ::
771
772Only dump this specific path, not the whole tree.
773
774*pveum user token remove* `<userid> <tokenid>` `[FORMAT_OPTIONS]`
775
776Remove API token for a specific user.
777
778`<userid>`: `<string>` ::
779
780User ID
781
782`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
783
784User-specific token identifier.
785
786*pveum useradd*
787
788An alias for 'pveum user add'.
789
790*pveum userdel*
791
792An alias for 'pveum user delete'.
793
794*pveum usermod*
795
796An alias for 'pveum user modify'.
797
798