Proxmox
The following example variables are used, and should be replaced with your actual URLs.
proxmox.example.com
(The URL of your Proxmox instance.)id.example.com
(The URL of your Pocket ID instance.)
Pocket ID Setup
- In Pocket ID create a new OIDC Client, name it, for example,
Proxmox
. - Set a logo for this OIDC Client if you would like to.
- Set the callback URL to:
https://proxmox.example.com
. - Copy the
Client ID
, and theClient Secret
for use in the next steps.
Proxmox Setup
- Open the Proxmox console and navigate to:
Datacenter
->Permissions
->Realms
. - Add a new
OpenID Connect Server
Realm. - Enter
https://id.example.com
for theIssuer URL
. - Enter a name for the realm of your choice, for example,
PocketID
. - Paste the
Client ID
from Pocket ID into theClient ID
field in Proxmox. - Paste the
Client Secret
from Pocket ID into theClient Key
field in Proxmox. - You can check the
Default
box if you want this to be the default realm Proxmox uses when signing in. - Check the
Autocreate Users
checkbox. (This will automatically create users in Proxmox if they don't exist). - Select
username
for theUsername Claim
dropdown. (This is a personal preference and controls how the username is shown, for example:username = username@PocketID
oremail = username@example@PocketID
). - Leave the rest as defaults and click
OK
to save the new realm. - Sign in to Proxmox with a Pocket ID user to autocreate the user account.
User Permissions
For individual standalone user management (without groups):
- Navigate to
Datacenter
->Permissions
. - Click on
Add
and selectUser Permission
. - Set the
Path
to/
for the entire datacenter or specify a specific VM or container path. - Select the newly created
YourPocketUsername@PocketID
account. - Set the
Role
toAdministrator
for this account.
Group Permissions
warning
This is just an example of how to setup RBAC based on OIDC Groups. You may want to adjust the roles and permissions based on your specific needs.
This part is optional, but if you want to restrict access to specific groups and allow specific roles based on user groups, you can do so by following these steps:
Pocket ID Setup
- In Pocket ID create two new
User Groups
for example:Proxmox Users
andProxmox Admins
. - Add the users you want to allow access to Proxmox to these groups.
- Under the
Proxmox
OIDC Client, select the checkbox forProxmox Users
andProxmox Admins
groups in theAllowed User Groups
table andSave
.
Proxmox Setup
- In Proxmox, Edit the
PocketID
realm you created earlier. - Set the
Scope
toopenid profile email groups
. - Set the
Group Claim
togroups
andSave
the realm. - Set the
Autocreate Groups
checkbox to have Proxmox automatically create groups based on the groups in Pocket ID. - Sign in to Proxmox with a user that is in the
Proxmox Users
orProxmox Admins
group. - You should now see the user groups in Proxmox, and you can assign permissions:
- Navigate to
Datacenter
->Permissions
. - Click on
Add
and selectGroup Permission
. - Set the
Path
to/
for the entire datacenter or specify a specific VM or container path. - Select the
Proxmox Users@PocketID
orProxmox Admins@PocketID
group. - Set the
Role
toPVEAudit
forProxmox Users@PocketID
, andAdministrator
forProxmox Admins@PocketID
.
- Navigate to