This command lets you manually add a user to the local provider and, optionally, grant S3 permissions to the users.
Tip
The newly created user needs an S3 access key pair to be able to create or access S3 buckets. Run
user generate-keyto generate a key pair. To enable the key pair, runuser modify-key.
Usage
user add --name NAME --uid UID --local-provider-id ID [--leading-group-gid LEADING_GID] [--groups-gids GIDs] [--allow-create-bucket|--disallow-create-bucket] [--allow-delete-bucket|--disallow-delete-bucket] [--s3-superuser|--not-s3-superuser] [--identity-policies-ids IDs] [--local-provider-id ID] [--password PASSWORD]
Required Parameters
| Sets the user's name. |
| Specifies a local provider with which the tenant is associated. |
Options
| Specifies the user's POSIX (NFS) UID attribute. |
| The group ID (GID) of the user's leading group. The leading group is the owning group of any files created by the user. If no local group with the specified GID exists, it is created. For example: |
| The group IDs (GIDs) of groups to which the user belongs. Enter the GIDs as a comma-separated list. The first group listed is the default leading group. For example: |
| Allows the user to create buckets when connecting to the cluster via S3. |
| Prohibits the user to create buckets when connecting to the cluster via S3. |
| Allows the user to delete buckets when connecting to the cluster via S3. |
| Prohibits the user to delete buckets when connecting to the cluster via S3. |
| Grants the user S3 super user permission, which enables the user to override S3 ACLs. |
| Removes S3 super user permission from the user. |
| Assigns one or more S3 identity policies to the user. Specify a comma-separated list of policy IDs. |
| Set a temporary initial password for the user to PASSWORD. The user will be requested to change this password on the first login. The password must meet the requirements configured in the VMS settings. |