Hello,
I have a use case that I am unable to get working as I had hoped. I have a user account 'student1' in the group 'student'. I also have a resource pool called 'student1'. The pool ACL is configured to use the '@student' group.
I have several VMs in the 'student1' resource pool. The problem I am having is that the 'student1' user cannot clone any VMs. I get an Error 'Permission check failed (403)'. I think the source of the problem, or at least my observation, is that the Resource Pool cannot be selected in the Clone VM input box (due to role permissions).
Should a user constrained by a resource pool be able to clone a VM? I wanted to give these users the abilities to use and manage VMs, but do so without seeing other students.
Here is the listing from my /etc/pve/user.cfg file:
To test, I added a new resource pool ACL where the 'student1' user was a 'PVEAdmin' role and it worked. But this wasn't desirable cause the account could see the actual 'student1' resource pool, and also all the other capabilities of this role. I believe the 'Pool.Audit' permission makes this possible.
Thank you for any assistance you can provide. I greatly appreciate your time.
Jim
I have a use case that I am unable to get working as I had hoped. I have a user account 'student1' in the group 'student'. I also have a resource pool called 'student1'. The pool ACL is configured to use the '@student' group.
I have several VMs in the 'student1' resource pool. The problem I am having is that the 'student1' user cannot clone any VMs. I get an Error 'Permission check failed (403)'. I think the source of the problem, or at least my observation, is that the Resource Pool cannot be selected in the Clone VM input box (due to role permissions).
Should a user constrained by a resource pool be able to clone a VM? I wanted to give these users the abilities to use and manage VMs, but do so without seeing other students.
Here is the listing from my /etc/pve/user.cfg file:
Code:
user:root@pam:1:0::::::
user:student1@pve:1:0::::::
user:student2@pve:1:0::::::
group:student:student1@pve,student2@pve::
pool:student1::100,101:local:
role:student:Datastore.AllocateSpace,Datastore.Audit,VM.Allocate,VM.Audit,VM.Clone,VM.Config.CDROM,VM.Console,VM.PowerMgmt:
acl:1:/pool/student1:student1@pve:student:
To test, I added a new resource pool ACL where the 'student1' user was a 'PVEAdmin' role and it worked. But this wasn't desirable cause the account could see the actual 'student1' resource pool, and also all the other capabilities of this role. I believe the 'Pool.Audit' permission makes this possible.
Thank you for any assistance you can provide. I greatly appreciate your time.
Jim
Last edited: