mirror of
https://github.com/adminsyspro/proxcenter-ui.git
synced 2026-04-25 22:45:55 +03:00
[GH-ISSUE #9] Permission Issue #119
Labels
No labels
bug
enhancement
feature-request
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/proxcenter-ui#119
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @tep1997 on GitHub (Feb 18, 2026).
Original GitHub issue: https://github.com/adminsyspro/proxcenter-ui/issues/9
I've successfully added 3 nodes to Proxcenter and I can see and interact with them properly. However, if I try to restart, stop, or power-off a VM, I get the below error.
@adminsyspro commented on GitHub (Feb 18, 2026):
Hi,
You need to adjust you PVE permissions. You can either give ProxCenter full admin/root rights, or you can give them whatever you want.
In you example, it's the VM.PowerMgmt which is missing.
Regards.
@tep1997 commented on GitHub (Feb 18, 2026):
So, I gave both the Proxcenter User and API Audit permissions. Does that give enough permissions?
@adminsyspro commented on GitHub (Feb 18, 2026):
I think you need to put permission at / without privileges separation.
@tep1997 commented on GitHub (Feb 18, 2026):
That's how it was setup, at /.
@turnipy commented on GitHub (Feb 18, 2026):
For me nothing worked until I linked the token to my root superuser account in proxmox cluster using this in proxmox cli:
pveum user token add root@pam proxcenter --privsep 0
Trying to attach to a seperate api-user account even when giving admin, still gave me those errors:
eg. This didnt work - giving admin to both user and token
pveum aclmod / --user api-user@pve --roles PVEAdmin
pveum aclmod / --token 'api-user@pve!proxcenter' --roles PVEAdmin
@adminsyspro commented on GitHub (Feb 19, 2026):
Thanks for the detailed troubleshooting, this is a common Proxmox gotcha related to API token privilege separation.
The issue
By default, Proxmox API tokens are created with
privsep=1(privilege separation enabled). This means the token has its own separate permissions, independent from the user it's attached to — even if the user isroot@pamor hasPVEAdmin.So even if your user has full admin rights, the token itself starts with zero permissions unless you explicitly assign them to the token.
The fix
Option A — Disable privilege separation (simplest):
This makes the token inherit all permissions from the user account.
Option B — Keep privsep but assign permissions to the token:
Note: you must assign the role to the token (
user!tokenid), not just the user.Why it works for viewing but not for actions
GETrequests to list nodes/VMs typically require onlySys.AuditorVM.Audit, which may be partially granted. But actions like start/stop/reboot requireVM.PowerMgmt,VM.Console, etc. — which are missing when the token has no explicit permissions.We'll improve the UX in a future update by validating token permissions when adding a connection, so this kind of issue is caught early. For now, using
--privsep 0on a dedicated user (or root) is the easiest path.@tep1997 commented on GitHub (Feb 19, 2026):
Went with Option A, but still seeing the same error message. Output from the command: