2020-10-02 17:12:57 +03:00
.. _user_mgmt:
User Management
===============
User Configuration
------------------
.. image :: images/screenshots/pbs-gui-user-management.png
:align: right
:alt: User management
Proxmox Backup Server supports several authentication realms, and you need to
choose the realm when you add a new user. Possible realms are:
:pam: Linux PAM standard authentication. Use this if you want to
authenticate as Linux system user (Users need to exist on the
system).
:pbs: Proxmox Backup Server realm. This type stores hashed passwords in
`` /etc/proxmox-backup/shadow.json `` .
After installation, there is a single user `` root@pam `` , which
corresponds to the Unix superuser. User configuration information is stored in the file
`` /etc/proxmox-backup/user.cfg `` . You can use the
`` proxmox-backup-manager `` command line tool to list or manipulate
users:
.. code-block :: console
# proxmox-backup-manager user list
┌─────────────┬────────┬────────┬───────────┬──────────┬────────────────┬────────────────────┐
│ userid │ enable │ expire │ firstname │ lastname │ email │ comment │
╞═════════════╪════════╪════════╪═══════════╪══════════╪════════════════╪════════════════════╡
│ root@pam │ 1 │ │ │ │ │ Superuser │
└─────────────┴────────┴────────┴───────────┴──────────┴────────────────┴────────────────────┘
.. image :: images/screenshots/pbs-gui-user-management-add-user.png
:align: right
:alt: Add a new user
The superuser has full administration rights on everything, so you
2020-11-06 17:46:27 +03:00
normally want to add other users with less privileges. You can add a new
user with the `` user create `` subcommand or through the web
interface, under the **User Management** tab of **Configuration -> Access
Control**. The `` create `` subcommand lets you specify many options like
`` --email `` or `` --password `` . You can update or change any user properties
using the `` update `` subcommand later (**Edit** in the GUI):
2020-10-02 17:12:57 +03:00
.. code-block :: console
# proxmox-backup-manager user create john@pbs --email john@example.com
# proxmox-backup-manager user update john@pbs --firstname John --lastname Smith
# proxmox-backup-manager user update john@pbs --comment "An example user."
.. todo :: Mention how to set password without passing plaintext password as cli argument.
The resulting user list looks like this:
.. code-block :: console
# proxmox-backup-manager user list
┌──────────┬────────┬────────┬───────────┬──────────┬──────────────────┬──────────────────┐
│ userid │ enable │ expire │ firstname │ lastname │ email │ comment │
╞══════════╪════════╪════════╪═══════════╪══════════╪══════════════════╪══════════════════╡
│ john@pbs │ 1 │ │ John │ Smith │ john@example.com │ An example user. │
├──────────┼────────┼────────┼───────────┼──────────┼──────────────────┼──────────────────┤
│ root@pam │ 1 │ │ │ │ │ Superuser │
└──────────┴────────┴────────┴───────────┴──────────┴──────────────────┴──────────────────┘
2020-10-30 17:18:42 +03:00
Newly created users do not have any permissions. Please read the Access Control
2020-10-02 17:12:57 +03:00
section to learn how to set access permissions.
If you want to disable a user account, you can do that by setting `` --enable `` to `` 0 ``
.. code-block :: console
# proxmox-backup-manager user update john@pbs --enable 0
Or completely remove the user with:
.. code-block :: console
# proxmox-backup-manager user remove john@pbs
2020-10-30 17:18:42 +03:00
.. _user_tokens:
API Tokens
----------
2020-11-06 17:46:30 +03:00
.. image :: images/screenshots/pbs-gui-apitoken-overview.png
:align: right
:alt: API Token Overview
2020-10-30 17:18:42 +03:00
Any authenticated user can generate API tokens which can in turn be used to
configure various clients, instead of directly providing the username and
password.
API tokens serve two purposes:
#. Easy revocation in case client gets compromised
#. Limit permissions for each client/token within the users' permission
An API token consists of two parts: an identifier consisting of the user name,
the realm and a tokenname (`` user@realm!tokenname `` ), and a secret value. Both
need to be provided to the client in place of the user ID (`` user@realm `` ) and
2020-10-30 19:01:18 +03:00
the user password, respectively.
2020-10-30 17:18:42 +03:00
2020-11-06 17:46:30 +03:00
.. image :: images/screenshots/pbs-gui-apitoken-secret-value.png
:align: right
:alt: API secret value
2020-10-30 17:18:42 +03:00
The API token is passed from the client to the server by setting the
`` Authorization `` HTTP header with method `` PBSAPIToken `` to the value
`` TOKENID:TOKENSECRET `` .
Generating new tokens can done using `` proxmox-backup-manager `` or the GUI:
.. code-block :: console
# proxmox-backup-manager user generate-token john@pbs client1
Result: {
"tokenid": "john@pbs!client1",
"value": "d63e505a-e3ec-449a-9bc7-1da610d4ccde"
}
.. note :: The displayed secret value needs to be saved, since it cannot be
displayed again after generating the API token.
The `` user list-tokens `` sub-command can be used to display tokens and their
metadata:
.. code-block :: console
# proxmox-backup-manager user list-tokens john@pbs
┌──────────────────┬────────┬────────┬─────────┐
│ tokenid │ enable │ expire │ comment │
╞══════════════════╪════════╪════════╪═════════╡
│ john@pbs!client1 │ 1 │ │ │
└──────────────────┴────────┴────────┴─────────┘
Similarly, the `` user delete-token `` subcommand can be used to delete a token
again.
Newly generated API tokens don't have any permissions. Please read the next
section to learn how to set access permissions.
2020-10-02 17:12:57 +03:00
.. _user_acl:
Access Control
--------------
2020-10-30 17:18:42 +03:00
By default new users and API tokens do not have any permission. Instead you
need to specify what is allowed and what is not. You can do this by assigning
roles to users/tokens on specific objects like datastores or remotes. The
2020-10-02 17:12:57 +03:00
following roles exist:
**NoAccess**
Disable Access - nothing is allowed.
**Admin**
Can do anything.
**Audit**
Can view things, but is not allowed to change settings.
**DatastoreAdmin**
Can do anything on datastores.
**DatastoreAudit**
Can view datastore settings and list content. But
is not allowed to read the actual data.
**DatastoreReader**
Can Inspect datastore content and can do restores.
**DatastoreBackup**
Can backup and restore owned backups.
**DatastorePowerUser**
Can backup, restore, and prune owned backups.
**RemoteAdmin**
Can do anything on remotes.
**RemoteAudit**
Can view remote settings.
**RemoteSyncOperator**
Is allowed to read data from a remote.
2020-11-06 17:46:30 +03:00
.. image :: images/screenshots/pbs-gui-user-management-add-user.png
2020-10-02 17:12:57 +03:00
:align: right
:alt: Add permissions for user
Access permission information is stored in `` /etc/proxmox-backup/acl.cfg `` . The
file contains 5 fields, separated using a colon (':') as a delimiter. A typical
entry takes the form:
`` acl:1:/datastore:john@pbs:DatastoreBackup ``
The data represented in each field is as follows:
#. `` acl `` identifier
#. A `` 1 `` or `` 0 `` , representing whether propagation is enabled or disabled,
respectively
#. The object on which the permission is set. This can be a specific object
(single datastore, remote, etc.) or a top level object, which with
propagation enabled, represents all children of the object also.
2020-10-30 17:18:42 +03:00
#. The user(s)/token(s) for which the permission is set
2020-10-02 17:12:57 +03:00
#. The role being set
2020-10-30 17:18:42 +03:00
You can manage permissions via **Configuration -> Access Control ->
Permissions** in the web interface. Likewise, you can use the `` acl ``
subcommand to manage and monitor user permissions from the command line. For
example, the command below will add the user `` john@pbs `` as a
**DatastoreAdmin** for the datastore `` store1 `` , located at
`` /backup/disk1/store1 `` :
2020-10-02 17:12:57 +03:00
.. code-block :: console
2020-10-30 17:18:42 +03:00
# proxmox-backup-manager acl update /datastore/store1 DatastoreAdmin --auth-id john@pbs
2020-10-02 17:12:57 +03:00
2020-10-30 17:18:42 +03:00
You can list the ACLs of each user/token using the following command:
2020-10-02 17:12:57 +03:00
.. code-block :: console
# proxmox-backup-manager acl list
2020-11-10 15:33:20 +03:00
┌──────────┬───────────────────┬───────────┬────────────────┐
│ ugid │ path │ propagate │ roleid │
╞══════════╪═══════════════════╪═══════════╪════════════════╡
│ john@pbs │ /datastore/store1 │ 1 │ DatastoreAdmin │
└──────────┴───────────────────┴───────────┴────────────────┘
2020-10-02 17:12:57 +03:00
2020-10-30 17:18:42 +03:00
A single user/token can be assigned multiple permission sets for different datastores.
2020-10-02 17:12:57 +03:00
.. Note ::
Naming convention is important here. For datastores on the host,
you must use the convention `` /datastore/{storename} `` . For example, to set
permissions for a datastore mounted at `` /mnt/backup/disk4/store2 `` , you would use
`` /datastore/store2 `` for the path. For remote stores, use the convention
`` /remote/{remote}/{storename} `` , where `` {remote} `` signifies the name of the
remote (see `Remote` below) and `` {storename} `` is the name of the datastore on
the remote.
2020-10-30 17:18:42 +03:00
API Token permissions
~~~~~~~~~~~~~~~~~~~~~
API token permissions are calculated based on ACLs containing their ID
independent of those of their corresponding user. The resulting permission set
on a given path is then intersected with that of the corresponding user.
In practice this means:
#. API tokens require their own ACL entries
#. API tokens can never do more than their corresponding user
Effective permissions
~~~~~~~~~~~~~~~~~~~~~
To calculate and display the effective permission set of a user or API token
you can use the `` proxmox-backup-manager user permission `` command:
.. code-block :: console
2020-10-02 17:12:57 +03:00
2020-11-10 15:33:20 +03:00
# proxmox-backup-manager user permissions john@pbs --path /datastore/store1
2020-10-30 17:18:42 +03:00
Privileges with (*) have the propagate flag set
Path: /datastore/store1
- Datastore.Audit (*)
- Datastore.Backup (*)
- Datastore.Modify (*)
- Datastore.Prune (*)
- Datastore.Read (*)
2020-11-10 15:33:20 +03:00
- Datastore.Verify (*)
2020-10-30 17:18:42 +03:00
# proxmox-backup-manager acl update /datastore/store1 DatastoreBackup --auth-id 'john@pbs!client1'
2020-11-10 15:33:20 +03:00
# proxmox-backup-manager user permissions 'john@pbs!client1' --path /datastore/store1
2020-10-30 17:18:42 +03:00
Privileges with (*) have the propagate flag set
Path: /datastore/store1
- Datastore.Backup (*)
2021-02-01 21:46:07 +03:00
.. _user_tfa:
2021-02-13 12:23:02 +03:00
2021-02-01 21:46:07 +03:00
Two-factor authentication
-------------------------
Introduction
~~~~~~~~~~~~
2021-03-04 17:02:27 +03:00
With simple authentication, only a password (single factor) is required to
successfully claim an identity (authenticate), for example, to be able to log in
as `root@pam` on a specific instance of Proxmox Backup Server. In this case, if
the password gets stolen or leaked, anybody can use it to log in - even if they
should not be allowed to do so.
With two-factor authentication (TFA), a user is asked for an additional factor
to verify their authenticity. Rather than relying on something only the user
knows (a password), this extra factor requires something only the user has, for
example, a piece of hardware (security key) or a secret saved on the user's
smartphone. This prevents a remote user from gaining unauthorized access to an
account, as even if they have the password, they will not have access to the
physical object (second factor).
2021-02-01 21:46:07 +03:00
2021-02-03 12:33:32 +03:00
.. image :: images/screenshots/pbs-gui-tfa-login.png
:align: right
:alt: Add a new user
2021-02-01 21:46:07 +03:00
Available Second Factors
~~~~~~~~~~~~~~~~~~~~~~~~
2021-03-04 17:02:27 +03:00
You can set up multiple second factors, in order to avoid a situation in which
losing your smartphone or security key locks you out of your account
permanently.
2021-02-01 21:46:07 +03:00
2021-03-04 17:02:27 +03:00
Proxmox Backup Server supports three different two-factor authentication
methods:
2021-02-01 21:46:07 +03:00
* TOTP (`Time-based One-Time Password <https://en.wikipedia.org/wiki/Time-based_One-Time_Password> `_ ).
2021-03-04 17:02:27 +03:00
A short code derived from a shared secret and the current time, it changes
2021-02-01 21:46:07 +03:00
every 30 seconds.
* WebAuthn (`Web Authentication <https://en.wikipedia.org/wiki/WebAuthn> `_ ).
A general standard for authentication. It is implemented by various security
2021-03-04 17:02:27 +03:00
devices, like hardware keys or trusted platform modules (TPM) from a computer
2021-02-01 21:46:07 +03:00
or smart phone.
* Single use Recovery Keys. A list of keys which should either be printed out
2021-03-04 17:02:27 +03:00
and locked in a secure place or saved digitally in an electronic vault.
Each key can be used only once. These are perfect for ensuring that you are
not locked out, even if all of your other second factors are lost or corrupt.
2021-02-01 21:46:07 +03:00
Setup
~~~~~
.. _user_tfa_setup_totp:
2021-02-13 12:23:02 +03:00
2021-02-01 21:46:07 +03:00
TOTP
^^^^
2021-02-03 12:33:32 +03:00
.. image :: images/screenshots/pbs-gui-tfa-add-totp.png
:align: right
:alt: Add a new user
2021-03-04 17:02:27 +03:00
There is no server setup required. Simply install a TOTP app on your
2021-02-01 21:46:07 +03:00
smartphone (for example, `FreeOTP <https://freeotp.github.io/> `_ ) and use the
Proxmox Backup Server web-interface to add a TOTP factor.
.. _user_tfa_setup_webauthn:
2021-02-13 12:23:02 +03:00
2021-02-01 21:46:07 +03:00
WebAuthn
^^^^^^^^
2021-03-04 17:02:27 +03:00
For WebAuthn to work, you need to have two things:
2021-02-01 21:46:07 +03:00
* a trusted HTTPS certificate (for example, by using `Let's Encrypt
<https://pbs.proxmox.com/wiki/index.php/HTTPS_Certificate_Configuration>`_)
* setup the WebAuthn configuration (see *Configuration -> Authentication* in the
Proxmox Backup Server web-interface). This can be auto-filled in most setups.
2021-03-04 17:02:27 +03:00
Once you have fulfilled both of these requirements, you can add a WebAuthn
2021-02-01 21:46:07 +03:00
configuration in the *Access Control* panel.
.. _user_tfa_setup_recovery_keys:
2021-02-13 12:23:02 +03:00
2021-02-01 21:46:07 +03:00
Recovery Keys
^^^^^^^^^^^^^
2021-02-03 12:33:32 +03:00
.. image :: images/screenshots/pbs-gui-tfa-add-recovery-keys.png
:align: right
:alt: Add a new user
2021-03-04 17:02:27 +03:00
Recovery key codes do not need any preparation; you can simply create a set of
2021-02-01 21:46:07 +03:00
recovery keys in the *Access Control* panel.
.. note :: There can only be one set of single-use recovery keys per user at any
time.
TFA and Automated Access
~~~~~~~~~~~~~~~~~~~~~~~~
2021-03-04 17:02:27 +03:00
Two-factor authentication is only implemented for the web-interface. You should
2021-02-01 21:46:07 +03:00
use :ref: `API Tokens <user_tokens>` for all other use cases, especially
2021-03-04 17:02:27 +03:00
non-interactive ones (for example, adding a Proxmox Backup Server to Proxmox VE
2021-02-01 21:46:07 +03:00
as a storage).