| 262 | {{{ |
| 263 | root$ vi /etc/libvirt/libvirtd.conf |
| 264 | # |
| 265 | # UNIX socket access controls |
| 266 | # |
| 267 | |
| 268 | # Set the UNIX domain socket group ownership. This can be used to |
| 269 | # allow a 'trusted' set of users access to management capabilities |
| 270 | # without becoming root. |
| 271 | # |
| 272 | # This is restricted to 'root' by default. |
| 273 | unix_sock_group = "kvm" (81 line) |
| 274 | |
| 275 | # Set the UNIX socket permissions for the R/O socket. This is used |
| 276 | # for monitoring VM status only |
| 277 | # |
| 278 | # Default allows any user. If setting group ownership may want to |
| 279 | # restrict this to: |
| 280 | unix_sock_ro_perms = "0777" (88 line) |
| 281 | |
| 282 | # Set the UNIX socket permissions for the R/W socket. This is used |
| 283 | # for full management of VMs |
| 284 | # |
| 285 | # Default allows only root. If PolicyKit is enabled on the socket, |
| 286 | # the default will change to allow everyone (eg, 0777) |
| 287 | # |
| 288 | # If not using PolicyKit and setting group own/etc/init.d/libvirtd startership for access |
| 289 | # control then you may want to relax this to: |
| 290 | unix_sock_rw_perms = "0770" (98 line) |
| 291 | |
| 292 | # Set the name of the directory in which sockets will be found/createdwget http://www.sqlite.org/sqlite-amalgamation-3.6.17.tar.gz -P /tmp. |
| 293 | unix_sock_dir = "/var/run/libvirt" (101 line) |
| 294 | |
| 295 | }}} |
| 296 | |