How to confine users to specific projects

You restrict users or clients to specific projects. Projects can be configured with features, limits, and restrictions to prevent misuse. See Instances grouping with projects for more information.

How to confine users to specific projects depends on whether LXD is accessible via the HTTPS API, or via the Unix socket.

Confine users to specific projects on the HTTPS API

You can confine access to specific projects by restricting the TLS client certificate that is used to connect to the LXD server. See Restricted TLS certificates for more information. Only certificates returned by lxc config trust list can be managed in this way.

Note

The UI does not currently support configuring project confinement for certificates of this type. Use the CLI or API to set up confinement.

You can also confine access to specific projects via group membership and Fine-grained authorization. The permissions of OIDC clients and fine-grained TLS identities must be managed with lxc auth subcommands and the /1.0/auth API.

To create a TLS client and restrict the client to a single project, follow these instructions:

Create a restricted trust store entry with access to a project

If you’re using token authentication:

lxc config trust add --projects <project_name> --restricted

To add the client certificate directly:

lxc config trust add <certificate_file> --projects <project_name> --restricted

The client can then add the server as a remote in the usual way (lxc remote add <server_name> <token> or lxc remote add <server_name> <server_address>) and can only access the project or projects that have been specified.

Note

You can specify the --project flag when adding a remote. This configuration pre-selects the specified project. However, it does not confine the client to this project.

Create a fine-grained TLS identity with access to a project

First create a group and grant the group the operator entitlement on the project.

lxc auth group create <group_name>
lxc auth group permission add <group_name> project <project_name> operator

The operator entitlement grants members of the group permission to create and edit resources belonging to that project, but does not grant permission to delete the project or edit its configuration. See Fine-grained authorization for more details.

Next create a TLS identity and add the identity to the group:

lxc auth identity create tls/<client_name> [<certificate_file>] --group <group_name>

If <certificate_file> is provided the identity will be created directly. Otherwise, a token will be returned that the client can use to add the LXD server as a remote:

# Client machine
lxc remote add <remote_name> <token>

The client will be prompted with a list of projects to use as their default project. Only the configured project will be presented to the client.

To confine access for an existing certificate:

Trust store entry

Use the following command:

lxc config trust edit <fingerprint>

Make sure that restricted is set to true and specify the projects that the certificate should give access to under projects.

Fine-grained TLS or OIDC identity

Create a group with the operator entitlement on the project:

lxc auth group create <group_name>
lxc auth group permission add <group_name> project <project_name> operator

Then add the group to the identity. For TLS identities run:

lxc auth identity group add tls/<client_name> <group_name>

The <client_name> must be unique. If it is not, the certificate fingerprint of the client can be used.

For OIDC identities, run:

lxc auth identity group add oidc/<client_name> <group_name>

The <client_name> must be unique. If it is not, the email address of the client can be used.

Confine users to specific LXD projects via Unix socket

If you use the LXD snap, you can configure the multi-user LXD daemon contained in the snap to dynamically create projects for all users in a specific user group.

To do so, set the daemon.user.group configuration option to the corresponding user group:

sudo snap set lxd daemon.user.group=<user_group>

Make sure that all user accounts that you want to be able to use LXD are a member of this group.

Once a member of the group issues a LXD command, LXD creates a confined project for this user and switches to this project. If LXD has not been initialized at this point, it is automatically initialized (with the default settings).

If you want to customize the project settings, for example, to impose limits or restrictions, you can do so after the project has been created. To modify the project configuration, you must have full access to LXD, which means you must be part of the lxd group and not only the group that you configured as the LXD user group.