Skip to content
Bots!
Bots!
  • About
    • Myself
    • আমার দোয়া
  • Bookmarks
    • Bookmarks
    • My OCI Bookmarks
    • Useful Proxmox Commands & Links
    • Learning Nano
    • Useful Sites
    • Useful Virtualbox Command
    • Useful MySQL Command
    • Useful Linux Command
    • BTT-CAS
  • Resources
    • Webinar on Cloud Adoption for Project Managers
  • Photos
  • Videos
  • Downloads
Bots!

Proxmox User Management- Proxmox VE authentication server

Rumi, May 4, 2018

Command Line Tool

Most users will simply use the GUI to manage users. But there is also a full featured command line tool called pveum (short for “Proxmox VE User Manager”). Please note that all Proxmox VE command line tools are wrappers around the API, so you can also access those function through the REST API.
Here are some simple usage examples. To show help type:

pveum

or (to show detailed help about a specific command)

pveum help useradd

Create a new user:

pveum useradd testuser@pve -comment "Just a test"

Set or Change the password (not all realms support that):

pveum passwd testuser@pve

Disable a user:

pveum usermod testuser@pve -enable 0

Create a new group:

pveum groupadd testgroup

Create a new role:

pveum roleadd PVE_Power-only -privs "VM.PowerMgmt VM.Console"

Real World Examples

Administrator Group
One of the most wanted features was the ability to define a group of users with full administrator rights (without using the root account).

Define the group:

pveum groupadd admin -comment "System Administrators"

Then add the permission:

pveum aclmod / -group admin -role Administrator

You can finally add users to the new admin group:

pveum usermod testuser@pve -group admin

Auditors

You can give read only access to users by assigning the PVEAuditor role to users or groups.

Example1: Allow user joe@pve to see everything

pveum aclmod / -user joe@pve -role PVEAuditor

Example1: Allow user joe@pve to see all virtual machines

pveum aclmod /vms -user joe@pve -role PVEAuditor

Delegate User Management
If you want to delegate user management to user joe@pve you can do that with:

pveum aclmod /access -user joe@pve -role PVEUserAdmin

User joe@pve can now add and remove users, change passwords and other user attributes. This is a very powerful role, and you most likely want to limit that to selected realms and groups. The following example allows joe@pve to modify users within realm pve if they are members of group customers:

pveum aclmod /access/realm/pve -user joe@pve -role PVEUserAdmin
pveum aclmod /access/groups/customers -user joe@pve -role PVEUserAdmin
Administrations Proxmox Proxmox

Post navigation

Previous post
Next post

Comments (6)

  1. John says:
    July 2, 2020 at 1:55 am

    Please excuse my noob questions.
    I am still having a problem understanding the difference between testuser@pve and testuser@pam both created by pveum and any user created by root with adduser.
    Is there any way that a user created by root with adduser can be granted the administrator, or any role in Proxmox?
    What is the difference between pam users and pve users created with pveum and why would you use one over the other for any particular purpose?

    Reply
    1. Rumi says:
      July 2, 2020 at 11:31 am

      pam is OS system users and pve belongs to Proxmox Vitual Environment’s own user schema. Proxmox support both the user database support. You can use either.

      Reply
      1. John says:
        July 31, 2020 at 1:54 am

        so “adduser testuser” from an ssh root session should create a testuser@pam account? it does not seem to do that. what am I missing?

        Reply
        1. Rumi says:
          August 2, 2020 at 7:14 pm

          You’re once again creating a SSH session user (PAM)- the post is about creating a PVE user- not a PAM user. As I replied you back, that PVE users have profile privilege on accessing and managing Proxmox users- such as a user can be an Admin or a user can be just an user.

          Reply
    2. Rumi says:
      July 30, 2020 at 9:10 pm

      The commands exhibited in this post are based on PVE users.

      Proxmox has 2 different authentication system through it’s webgui. PAM is native server os authentication method (with lesser proxmox role) and there’s another authentication mode through PVE (Proxmox Virtual Enviornment) itself. You can assign different role based virtual machine control to users.

      Reply
  2. John says:
    July 29, 2020 at 11:21 pm

    As a followup to my previous question;
    I have created my 1st user account with
    adduser user
    from root but I am not able to add that user to the admin account with
    pveum usermod user@pam -group admin
    update user failed: error during cfs-locked ‘file-user_cfg’ operation: no such user (‘user@pam’)
    cat /etc/passwd reveals user does exist
    user:x:1000:1000:,,,:/home/user:/bin/bash
    It seems as though there is some difference between an user created with adduser and one created with pveum useradd

    Reply

Leave a Reply to John Cancel reply

Your email address will not be published. Required fields are marked *

Myself…

Hi, I am Hasan T. Emdad Rumi, an IT Project Manager & Consultant, Virtualization & Cloud Savvyfrom Dhaka, Bangladesh. I have prior experience in managing numerous local and international projects in the area of Telco VAS & NMC, National Data Center & PKI Naitonal Root and CA Infrastructure. Also engaged with several Offshore Software Development Team.

Worked with Orascom Telecom-Banglalink, Network Elites as VAS partner, BTRC, BTT (Turkey) , Mango Teleservices Limited and Access to Informaiton (A2I-UNDP)

Currently working at Oracle Corporation as Principal Technology Solution and Cloud Architect.

You can reach me [h.t.emdad at gmail.com] and I will be delighted to exchange my views.

Tags

Apache Bind Cacti CentOS CentOS 6 CentOS 7 Debain Debian Debian 10 Debian 11 Debian 12 DKIM Docker endian icinga iptables Jitsi LAMP Letsencrypt Linux Munin MySQL Nagios Nextcloud NFS nginx pfsense php Postfix powerdns Proxmox RDP squid SSH SSL Ubuntu Ubuntu 16 Ubuntu 18 Ubuntu 20 Varnish virtualbox vpn Webmin XCP-NG zimbra

Topics

Recent Posts

  • Install Jitsi on Ubuntu 22.04 / 22.10 April 30, 2025
  • Key Lessons in life April 26, 2025
  • Create Proxmox Backup Server (PBS) on Debian 12 April 19, 2025
  • Add Physical Drive in Proxmox VM Guest April 19, 2025
  • Mount a drive permanently with fstab in Linux April 16, 2025
  • Proxmox 1:1 NAT routing March 30, 2025
  • Installation steps of WSL – Windows Subsystem for Linux March 8, 2025
  • Enabling Nested Virtualization In Proxmox March 8, 2025
  • How to Modify/Change console/SSH login banner for Proxmox Virtual Environment (Proxmox VE / PVE) March 3, 2025
  • Install Proxmox Backup Server on Debian 12 February 12, 2025

Archives

Top Posts & Pages

  • Install Jitsi on Ubuntu 22.04 / 22.10
©2025 Bots! | WordPress Theme by SuperbThemes