Skip to content

Commit 733967a

Browse files
lcaflcplaffitt
authored andcommitted
chore(README): Limit the ACLs
Reduce the required ACLs to limit risks
1 parent a807ce6 commit 733967a

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,9 @@ HTTPS certificate verification is disabled by default, but can be enabled using
3737
It is strongly recommended to create a dedicated Proxmox user for `pvecontrol` rather than using an existing admin account. This limits the blast radius in case of misconfiguration or credential leak, and makes it easy to audit or revoke access. Here's how to set up a dedicated user and role:
3838

3939
```shell
40-
pveum role add PVEControl --privs "Datastore.Audit,Datastore.AllocateSpace,Datastore.AllocateTemplate,Pool.Audit,SDN.Audit,Sys.Audit,VM.Audit,VM.Allocate,VM.Backup,VM.Clone,VM.Config.CDROM,VM.Config.CPU,VM.Config.Cloudinit,VM.Config.Disk,VM.Config.HWType,VM.Config.Memory,VM.Config.Network,VM.Config.Options,VM.Console,VM.Migrate,VM.Monitor,VM.PowerMgmt,VM.Snapshot,VM.Snapshot.Rollback"
40+
pveum role add custom-PVEControl --privs "Datastore.Audit,Datastore.AllocateSpace,Datastore.AllocateTemplate,Pool.Audit,SDN.Audit,Sys.Audit,VM.Audit,VM.Allocate,VM.Backup,VM.Clone,VM.GuestAgent.Audit,VM.Migrate,VM.Replicate,VM.Snapshot,VM.Snapshot.Rollback"
4141
pveum user add pvecontrol@pve --password my.password.is.weak
42-
pveum acl modify / --roles PVEControl --users pvecontrol@pve
42+
pveum acl modify / --roles custom-PVEControl --users pvecontrol@pve
4343
```
4444

4545
The `PVEControl` role combines:

0 commit comments

Comments
 (0)