This command lets you manually add a user to the local provider and, optionally, grant S3 permissions to the users.
Tip
The newly created user needs an S3 access key pair to be able to create or access S3 buckets. Run user generate-key
to generate a key pair. To enable the key pair, run user modify-key
.
Usage
user add --name NAME --uid UID [--leading-group-gid LEADING_GID] [--groups-gids GIDs] [--allow-create-bucket|--disallow-create-bucket] [--allow-delete-bucket|--disallow-delete-bucket] [--s3-superuser|--not-s3-superuser] [--s3-policies-ids IDs]
Required Parameters
Options
|
The group ID (GID) of the user's leading group. The leading group is the owning group of any files created by the user. If no local group with the specified GID exists, it is created. For example: |
|
The group IDs (GIDs) of groups to which the user belongs. Enter the GIDs as a comma-separated list. The first group listed is the default leading group. For example: |
|
Allows the user to create buckets when connecting to the cluster via S3. |
|
Prohibits the user to create buckets when connecting to the cluster via S3. |
|
Allows the user to delete buckets when connecting to the cluster via S3. |
|
Prohibits the user to delete buckets when connecting to the cluster via S3. |
|
Grants the user S3 super user permission, which enables the user to override S3 ACLs. |
|
Removes S3 super user permission from the user. |
|
Assigns one or more S3 identity policies to the user. Specify a comma-separated list of policy IDs. |
Comments
0 comments
Article is closed for comments.