Feature request: Support for controlling PVE Authentication Server password hashes
See original GitHub issueSetting the initial password via Ansible might not be desireable in all situations.
In some situations, it might be preferable to provide the contents of the SHA-256 crypt directly.
This should probably work so that current password
parameter is completely ignored if the hash is provided. Unsure if this would mean big or small changes for create_user()
. For any of this to work, /etc/pve/priv/shadow.cfg
would probably need to be taken under control of this role.
Issue Analytics
- State:
- Created a year ago
- Comments:13 (12 by maintainers)
Top Results From Across the Web
User Management - Proxmox VE
Proxmox VE supports multiple authentication sources, e.g. Linux PAM, an integrated ... Password are encrypted using the SHA-256 hash method.
Read more >Enable login-specific dual authentication or master password ...
Hello. I cannot find the feature that allows me to enable dual authentication or a re-prompt of a master password for specific logins...
Read more >[META] Feature Requests · Issue #246 · dani-garcia/vaultwarden
When available, I've linked a related issue or comment to add context to the request. Authentication. Support official LDAP directory-connector.
Read more >Azure Active Directory Pass-through Authentication: Quickstart
This article describes how to get started with Azure Active Directory (Azure AD) Pass-through Authentication.
Read more >AXIS P3807-PVE Network Camera - Axis documentation
Both applications are free and can be downloaded from axis.com/support. ... Leave this field empty if the mail server does not require authentication....
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
For posterity: https://bugzilla.proxmox.com/show_bug.cgi?id=4312
The main reason for this ticket is to have a PVE integrated user management. I wondered myself, why I don‘t had the problem before and maybe I just want to give a hint: I‘m using the PAM users. This users are managed via Ansible too, they cannot login via SSH but have a physical user account on the host. Together with the Proxmox groups and roles a useful ACL management is already present via pvesh. I don‘t know if the PVE integrated access management is something, that will be developed in the future. I would expect, that they wanna switch more to LDAP, OAuth or something like that, which is more an enterprise feature. And use PAM for community solutions. But - you should ask them as proposed. From my perspective - use PAM. Am 24.10.2022 um 13:14 schrieb Musee Ullah @.***>: I think you should be able to open a feature request on their issue tracker (my memory is hazy but I think it was public somewhere?) or post on the pve-user mailing list. Developers have been pretty responsive in my experience.
—Reply to this email directly, view it on GitHub, or unsubscribe.You are receiving this because you were mentioned.Message ID: @.***>