This command modifies a user entry in the local provider. You can use this command to assign S3 permissions to a local provider user.
Note
For users on external providers, use user query to grant and remove S3 user permissions.
Usage
user modify --id ID [--uid UID] [--leading-group-gid LEADING_GID] [--groups-gids GIDs] [--allow-create-bucket|--disallow-create-bucket] [--allow-delete-bucket|--disallow-delete-bucket] [--s3-superuser|--not-s3-superuser] [--identity-policies-ids IDs] [--local-provider-id ID]
Required Parameters
| Specify the VAST ID of the user to be modified. |
Options
| Changes the UID associated with the user.
|
| Changes the leading group for the user. The leading group is the owning group of any files created by the user. If no local group with the specified GID exists, it is created. For example: |
| Alters the list of groups to which the user belongs. Enter the groups IDs (GIDs) as a comma-separated list. Include all GIDs that should be associated with the user entry.
For example: |
| Allows the user to create buckets when connecting to the cluster via S3. |
| Prohibits the user to create buckets when connecting to the cluster via S3. |
| Allows the user to delete buckets when connecting to the cluster via S3. |
| Prohibits the user to delete buckets when connecting to the cluster via S3. |
| Grants the user S3 super user permission, which enables the user to override S3 ACLs. |
| Removes S3 super user permission from the user. |
| Assigns one or more S3 identity policies to the user. Specify a comma-separated list of policy IDs. |
| Specifies a local provider with which the tenant is associated. |