]> git.proxmox.com Git - pve-docs.git/blob - pveum.1-synopsis.adoc
vzdump: drop overly scary & outdated warning about fleecing
[pve-docs.git] / pveum.1-synopsis.adoc
1 *pveum* `<COMMAND> [ARGS] [OPTIONS]`
2
3 *pveum acl delete* `<path> --roles <string>` `[OPTIONS]`
4
5 Update Access Control List (add or remove permissions).
6
7 `<path>`: `<string>` ::
8
9 Access control path
10
11 `--groups` `<string>` ::
12
13 List of groups.
14
15 `--propagate` `<boolean>` ('default =' `1`)::
16
17 Allow to propagate (inherit) permissions.
18
19 `--roles` `<string>` ::
20
21 List of roles.
22
23 `--tokens` `<string>` ::
24
25 List of API tokens.
26
27 `--users` `<string>` ::
28
29 List of users.
30
31 *pveum acl list* `[FORMAT_OPTIONS]`
32
33 Get Access Control List (ACLs).
34
35 *pveum acl modify* `<path> --roles <string>` `[OPTIONS]`
36
37 Update Access Control List (add or remove permissions).
38
39 `<path>`: `<string>` ::
40
41 Access control path
42
43 `--groups` `<string>` ::
44
45 List of groups.
46
47 `--propagate` `<boolean>` ('default =' `1`)::
48
49 Allow to propagate (inherit) permissions.
50
51 `--roles` `<string>` ::
52
53 List of roles.
54
55 `--tokens` `<string>` ::
56
57 List of API tokens.
58
59 `--users` `<string>` ::
60
61 List of users.
62
63 *pveum acldel*
64
65 An alias for 'pveum acl delete'.
66
67 *pveum aclmod*
68
69 An alias for 'pveum acl modify'.
70
71 *pveum group add* `<groupid>` `[OPTIONS]`
72
73 Create new group.
74
75 `<groupid>`: `<string>` ::
76
77 no description available
78
79 `--comment` `<string>` ::
80
81 no description available
82
83 *pveum group delete* `<groupid>`
84
85 Delete group.
86
87 `<groupid>`: `<string>` ::
88
89 no description available
90
91 *pveum group list* `[FORMAT_OPTIONS]`
92
93 Group index.
94
95 *pveum group modify* `<groupid>` `[OPTIONS]`
96
97 Update group data.
98
99 `<groupid>`: `<string>` ::
100
101 no description available
102
103 `--comment` `<string>` ::
104
105 no description available
106
107 *pveum groupadd*
108
109 An alias for 'pveum group add'.
110
111 *pveum groupdel*
112
113 An alias for 'pveum group delete'.
114
115 *pveum groupmod*
116
117 An alias for 'pveum group modify'.
118
119 *pveum help* `[OPTIONS]`
120
121 Get help about specified command.
122
123 `--extra-args` `<array>` ::
124
125 Shows help for a specific command
126
127 `--verbose` `<boolean>` ::
128
129 Verbose output format.
130
131 *pveum passwd* `<userid>`
132
133 Change user password.
134
135 `<userid>`: `<string>` ::
136
137 User ID
138
139 *pveum pool add* `<poolid>` `[OPTIONS]`
140
141 Create new pool.
142
143 `<poolid>`: `<string>` ::
144
145 no description available
146
147 `--comment` `<string>` ::
148
149 no description available
150
151 *pveum pool delete* `<poolid>`
152
153 Delete pool.
154
155 `<poolid>`: `<string>` ::
156
157 no description available
158
159 *pveum pool list* `[FORMAT_OPTIONS]`
160
161 Pool index.
162
163 *pveum pool modify* `<poolid>` `[OPTIONS]`
164
165 Update pool data.
166
167 `<poolid>`: `<string>` ::
168
169 no description available
170
171 `--comment` `<string>` ::
172
173 no description available
174
175 `--delete` `<boolean>` ::
176
177 Remove vms/storage (instead of adding it).
178
179 `--storage` `<string>` ::
180
181 List of storage IDs.
182
183 `--vms` `<string>` ::
184
185 List of virtual machines.
186
187 *pveum realm add* `<realm> --type <string>` `[OPTIONS]`
188
189 Add an authentication server.
190
191 `<realm>`: `<string>` ::
192
193 Authentication domain ID
194
195 `--autocreate` `<boolean>` ('default =' `0`)::
196
197 Automatically create users if they do not exist.
198
199 `--base_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
200
201 LDAP base domain name
202
203 `--bind_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
204
205 LDAP bind domain name
206
207 `--capath` `<string>` ('default =' `/etc/ssl/certs`)::
208
209 Path to the CA certificate store
210
211 `--case-sensitive` `<boolean>` ('default =' `1`)::
212
213 username is case-sensitive
214
215 `--cert` `<string>` ::
216
217 Path to the client certificate
218
219 `--certkey` `<string>` ::
220
221 Path to the client certificate key
222
223 `--client-id` `<string>` ::
224
225 OpenID Client ID
226
227 `--client-key` `<string>` ::
228
229 OpenID Client Key
230
231 `--comment` `<string>` ::
232
233 Description.
234
235 `--default` `<boolean>` ::
236
237 Use this as default realm
238
239 `--domain` `\S+` ::
240
241 AD domain name
242
243 `--filter` `<string>` ::
244
245 LDAP filter for user sync.
246
247 `--group_classes` `<string>` ('default =' `groupOfNames, group, univentionGroup, ipausergroup`)::
248
249 The objectclasses for groups.
250
251 `--group_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
252
253 LDAP base domain name for group sync. If not set, the base_dn will be used.
254
255 `--group_filter` `<string>` ::
256
257 LDAP filter for group sync.
258
259 `--group_name_attr` `<string>` ::
260
261 LDAP attribute representing a groups name. If not set or found, the first value of the DN will be used as name.
262
263 `--issuer-url` `<string>` ::
264
265 OpenID Issuer Url
266
267 `--mode` `<ldap | ldap+starttls | ldaps>` ('default =' `ldap`)::
268
269 LDAP protocol mode.
270
271 `--password` `<string>` ::
272
273 LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
274
275 `--port` `<integer> (1 - 65535)` ::
276
277 Server port.
278
279 `--secure` `<boolean>` ::
280
281 Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
282
283 `--server1` `<string>` ::
284
285 Server IP address (or DNS name)
286
287 `--server2` `<string>` ::
288
289 Fallback Server IP address (or DNS name)
290
291 `--sslversion` `<tlsv1 | tlsv1_1 | tlsv1_2 | tlsv1_3>` ::
292
293 LDAPS TLS/SSL version. It's not recommended to use version older than 1.2!
294
295 `--sync-defaults-options` `[enable-new=<1|0>] [,full=<1|0>] [,purge=<1|0>] [,scope=<users|groups|both>]` ::
296
297 The default options for behavior of synchronizations.
298
299 `--sync_attributes` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
300
301 Comma separated list of key=value pairs for specifying which LDAP attributes map to which PVE user field. For example, to map the LDAP attribute 'mail' to PVEs 'email', write 'email=mail'. By default, each PVE user field is represented by an LDAP attribute of the same name.
302
303 `--tfa` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
304
305 Use Two-factor authentication.
306
307 `--type` `<ad | ldap | openid | pam | pve>` ::
308
309 Realm type.
310
311 `--user_attr` `\S{2,}` ::
312
313 LDAP user attribute name
314
315 `--user_classes` `<string>` ('default =' `inetorgperson, posixaccount, person, user`)::
316
317 The objectclasses for users.
318
319 `--username-claim` `<email | subject | username>` ::
320
321 OpenID claim used to generate the unique username.
322
323 `--verify` `<boolean>` ('default =' `0`)::
324
325 Verify the server's SSL certificate
326
327 *pveum realm delete* `<realm>`
328
329 Delete an authentication server.
330
331 `<realm>`: `<string>` ::
332
333 Authentication domain ID
334
335 *pveum realm list* `[FORMAT_OPTIONS]`
336
337 Authentication domain index.
338
339 *pveum realm modify* `<realm>` `[OPTIONS]`
340
341 Update authentication server settings.
342
343 `<realm>`: `<string>` ::
344
345 Authentication domain ID
346
347 `--autocreate` `<boolean>` ('default =' `0`)::
348
349 Automatically create users if they do not exist.
350
351 `--base_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
352
353 LDAP base domain name
354
355 `--bind_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
356
357 LDAP bind domain name
358
359 `--capath` `<string>` ('default =' `/etc/ssl/certs`)::
360
361 Path to the CA certificate store
362
363 `--case-sensitive` `<boolean>` ('default =' `1`)::
364
365 username is case-sensitive
366
367 `--cert` `<string>` ::
368
369 Path to the client certificate
370
371 `--certkey` `<string>` ::
372
373 Path to the client certificate key
374
375 `--client-id` `<string>` ::
376
377 OpenID Client ID
378
379 `--client-key` `<string>` ::
380
381 OpenID Client Key
382
383 `--comment` `<string>` ::
384
385 Description.
386
387 `--default` `<boolean>` ::
388
389 Use this as default realm
390
391 `--delete` `<string>` ::
392
393 A list of settings you want to delete.
394
395 `--digest` `<string>` ::
396
397 Prevent changes if current configuration file has different SHA1 digest. This can be used to prevent concurrent modifications.
398
399 `--domain` `\S+` ::
400
401 AD domain name
402
403 `--filter` `<string>` ::
404
405 LDAP filter for user sync.
406
407 `--group_classes` `<string>` ('default =' `groupOfNames, group, univentionGroup, ipausergroup`)::
408
409 The objectclasses for groups.
410
411 `--group_dn` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
412
413 LDAP base domain name for group sync. If not set, the base_dn will be used.
414
415 `--group_filter` `<string>` ::
416
417 LDAP filter for group sync.
418
419 `--group_name_attr` `<string>` ::
420
421 LDAP attribute representing a groups name. If not set or found, the first value of the DN will be used as name.
422
423 `--issuer-url` `<string>` ::
424
425 OpenID Issuer Url
426
427 `--mode` `<ldap | ldap+starttls | ldaps>` ('default =' `ldap`)::
428
429 LDAP protocol mode.
430
431 `--password` `<string>` ::
432
433 LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
434
435 `--port` `<integer> (1 - 65535)` ::
436
437 Server port.
438
439 `--secure` `<boolean>` ::
440
441 Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
442
443 `--server1` `<string>` ::
444
445 Server IP address (or DNS name)
446
447 `--server2` `<string>` ::
448
449 Fallback Server IP address (or DNS name)
450
451 `--sslversion` `<tlsv1 | tlsv1_1 | tlsv1_2 | tlsv1_3>` ::
452
453 LDAPS TLS/SSL version. It's not recommended to use version older than 1.2!
454
455 `--sync-defaults-options` `[enable-new=<1|0>] [,full=<1|0>] [,purge=<1|0>] [,scope=<users|groups|both>]` ::
456
457 The default options for behavior of synchronizations.
458
459 `--sync_attributes` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
460
461 Comma separated list of key=value pairs for specifying which LDAP attributes map to which PVE user field. For example, to map the LDAP attribute 'mail' to PVEs 'email', write 'email=mail'. By default, each PVE user field is represented by an LDAP attribute of the same name.
462
463 `--tfa` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
464
465 Use Two-factor authentication.
466
467 `--user_attr` `\S{2,}` ::
468
469 LDAP user attribute name
470
471 `--user_classes` `<string>` ('default =' `inetorgperson, posixaccount, person, user`)::
472
473 The objectclasses for users.
474
475 `--verify` `<boolean>` ('default =' `0`)::
476
477 Verify the server's SSL certificate
478
479 *pveum realm sync* `<realm>` `[OPTIONS]`
480
481 Syncs users and/or groups from the configured LDAP to user.cfg. NOTE:
482 Synced groups will have the name 'name-$realm', so make sure those groups
483 do not exist to prevent overwriting.
484
485 `<realm>`: `<string>` ::
486
487 Authentication domain ID
488
489 `--dry-run` `<boolean>` ('default =' `0`)::
490
491 If set, does not write anything.
492
493 `--enable-new` `<boolean>` ('default =' `1`)::
494
495 Enable newly synced users immediately.
496
497 `--full` `<boolean>` ::
498
499 If set, uses the LDAP Directory as source of truth, deleting users or groups not returned from the sync. Otherwise only syncs information which is not already present, and does not deletes or modifies anything else.
500
501 `--purge` `<boolean>` ::
502
503 Remove ACLs for users or groups which were removed from the config during a sync.
504
505 `--scope` `<both | groups | users>` ::
506
507 Select what to sync.
508
509 *pveum role add* `<roleid>` `[OPTIONS]`
510
511 Create new role.
512
513 `<roleid>`: `<string>` ::
514
515 no description available
516
517 `--privs` `<string>` ::
518
519 no description available
520
521 *pveum role delete* `<roleid>`
522
523 Delete role.
524
525 `<roleid>`: `<string>` ::
526
527 no description available
528
529 *pveum role list* `[FORMAT_OPTIONS]`
530
531 Role index.
532
533 *pveum role modify* `<roleid>` `[OPTIONS]`
534
535 Update an existing role.
536
537 `<roleid>`: `<string>` ::
538
539 no description available
540
541 `--append` `<boolean>` ::
542
543 no description available
544 +
545 NOTE: Requires option(s): `privs`
546
547 `--privs` `<string>` ::
548
549 no description available
550
551 *pveum roleadd*
552
553 An alias for 'pveum role add'.
554
555 *pveum roledel*
556
557 An alias for 'pveum role delete'.
558
559 *pveum rolemod*
560
561 An alias for 'pveum role modify'.
562
563 *pveum ticket* `<username>` `[OPTIONS]`
564
565 Create or verify authentication ticket.
566
567 `<username>`: `<string>` ::
568
569 User name
570
571 `--otp` `<string>` ::
572
573 One-time password for Two-factor authentication.
574
575 `--path` `<string>` ::
576
577 Verify ticket, and check if user have access 'privs' on 'path'
578 +
579 NOTE: Requires option(s): `privs`
580
581 `--privs` `<string>` ::
582
583 Verify ticket, and check if user have access 'privs' on 'path'
584 +
585 NOTE: Requires option(s): `path`
586
587 `--realm` `<string>` ::
588
589 You can optionally pass the realm using this parameter. Normally the realm is simply added to the username <username>@<relam>.
590
591 *pveum user add* `<userid>` `[OPTIONS]`
592
593 Create new user.
594
595 `<userid>`: `<string>` ::
596
597 User ID
598
599 `--comment` `<string>` ::
600
601 no description available
602
603 `--email` `<string>` ::
604
605 no description available
606
607 `--enable` `<boolean>` ('default =' `1`)::
608
609 Enable the account (default). You can set this to '0' to disable the account
610
611 `--expire` `<integer> (0 - N)` ::
612
613 Account expiration date (seconds since epoch). '0' means no expiration date.
614
615 `--firstname` `<string>` ::
616
617 no description available
618
619 `--groups` `<string>` ::
620
621 no description available
622
623 `--keys` `<string>` ::
624
625 Keys for two factor auth (yubico).
626
627 `--lastname` `<string>` ::
628
629 no description available
630
631 `--password` `<string>` ::
632
633 Initial password.
634
635 *pveum user delete* `<userid>`
636
637 Delete user.
638
639 `<userid>`: `<string>` ::
640
641 User ID
642
643 *pveum user list* `[OPTIONS]` `[FORMAT_OPTIONS]`
644
645 User index.
646
647 `--enabled` `<boolean>` ::
648
649 Optional filter for enable property.
650
651 `--full` `<boolean>` ('default =' `0`)::
652
653 Include group and token information.
654
655 *pveum user modify* `<userid>` `[OPTIONS]`
656
657 Update user configuration.
658
659 `<userid>`: `<string>` ::
660
661 User ID
662
663 `--append` `<boolean>` ::
664
665 no description available
666 +
667 NOTE: Requires option(s): `groups`
668
669 `--comment` `<string>` ::
670
671 no description available
672
673 `--email` `<string>` ::
674
675 no description available
676
677 `--enable` `<boolean>` ('default =' `1`)::
678
679 Enable the account (default). You can set this to '0' to disable the account
680
681 `--expire` `<integer> (0 - N)` ::
682
683 Account expiration date (seconds since epoch). '0' means no expiration date.
684
685 `--firstname` `<string>` ::
686
687 no description available
688
689 `--groups` `<string>` ::
690
691 no description available
692
693 `--keys` `<string>` ::
694
695 Keys for two factor auth (yubico).
696
697 `--lastname` `<string>` ::
698
699 no description available
700
701 *pveum user permissions* `[<userid>]` `[OPTIONS]` `[FORMAT_OPTIONS]`
702
703 Retrieve effective permissions of given user/token.
704
705 `<userid>`: `(?^:^(?^:[^\s:/]+)\@(?^:[A-Za-z][A-Za-z0-9\.\-_]+)(?:!(?^:[A-Za-z][A-Za-z0-9\.\-_]+))?$)` ::
706
707 User ID or full API token ID
708
709 `--path` `<string>` ::
710
711 Only dump this specific path, not the whole tree.
712
713 *pveum user tfa delete* `<userid>` `[OPTIONS]`
714
715 Change user u2f authentication.
716
717 `<userid>`: `<string>` ::
718
719 User ID
720
721 `--config` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
722
723 A TFA configuration. This must currently be of type TOTP of not set at all.
724
725 `--key` `<string>` ::
726
727 When adding TOTP, the shared secret value.
728
729 `--password` `<string>` ::
730
731 The current password.
732
733 `--response` `<string>` ::
734
735 Either the the response to the current u2f registration challenge, or, when adding TOTP, the currently valid TOTP value.
736
737 *pveum user token add* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
738
739 Generate a new API token for a specific user. NOTE: returns API token
740 value, which needs to be stored as it cannot be retrieved afterwards!
741
742 `<userid>`: `<string>` ::
743
744 User ID
745
746 `<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
747
748 User-specific token identifier.
749
750 `--comment` `<string>` ::
751
752 no description available
753
754 `--expire` `<integer> (0 - N)` ('default =' `same as user`)::
755
756 API token expiration date (seconds since epoch). '0' means no expiration date.
757
758 `--privsep` `<boolean>` ('default =' `1`)::
759
760 Restrict API token privileges with separate ACLs (default), or give full privileges of corresponding user.
761
762 *pveum user token list* `<userid>` `[FORMAT_OPTIONS]`
763
764 Get user API tokens.
765
766 `<userid>`: `<string>` ::
767
768 User ID
769
770 *pveum user token modify* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
771
772 Update API token for a specific user.
773
774 `<userid>`: `<string>` ::
775
776 User ID
777
778 `<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
779
780 User-specific token identifier.
781
782 `--comment` `<string>` ::
783
784 no description available
785
786 `--expire` `<integer> (0 - N)` ('default =' `same as user`)::
787
788 API token expiration date (seconds since epoch). '0' means no expiration date.
789
790 `--privsep` `<boolean>` ('default =' `1`)::
791
792 Restrict API token privileges with separate ACLs (default), or give full privileges of corresponding user.
793
794 *pveum user token permissions* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
795
796 Retrieve effective permissions of given token.
797
798 `<userid>`: `<string>` ::
799
800 User ID
801
802 `<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
803
804 User-specific token identifier.
805
806 `--path` `<string>` ::
807
808 Only dump this specific path, not the whole tree.
809
810 *pveum user token remove* `<userid> <tokenid>` `[FORMAT_OPTIONS]`
811
812 Remove API token for a specific user.
813
814 `<userid>`: `<string>` ::
815
816 User ID
817
818 `<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
819
820 User-specific token identifier.
821
822 *pveum useradd*
823
824 An alias for 'pveum user add'.
825
826 *pveum userdel*
827
828 An alias for 'pveum user delete'.
829
830 *pveum usermod*
831
832 An alias for 'pveum user modify'.
833
834