Skip to main content
Version: Developer

Groups

Groups are used to define roles for specific sets of users in Kasm Workspaces. By default there are two groups created by the system, the Administrators group and the All Users group, the All Users group is the default group for every user where statewide settings can be set.

Groups can be used to specify Kasm images and settings for different sets of users. For example, you may have a custom image for developers with pre-installed developer tools. You can tie that image to a group. You can define settings for that group, such as enabling bi-directional clipboard.

Create Group

Steps to create individual groups for sections of users.

  • Select Access Management > Groups tab from navigation menu
  • Select Add Group from the top right of the table
  • Specify Group properties listed below

Group Properties

NameProvides the name of the group
DescriptionProvides the description of the group
PrioritySets the priority of the settings over other groups
Is SystemSystem level group that cannot be deleted

Note that group name and priority number must be unique. For help identifying what group priority numbers are available, use the Filters tool in the Group view to sort by Priority.

Sort by Priority
Sort by Priority

There is a Users tab in the edit group page that allows for the selection of its users.

Users in Group
Users in Group

Group Settings

Group settings may be changed for the specific group by selecting the groups tab, clicking the edit icon on the desired group and the Add Settings button in the Group Settings card. There are delete setting and edit setting icons to the right of the Setting. If a user belongs to mulitple groups, the setting on the group with the lowest priority takes effect. For settings like volume_mapping, all settings are combined from all groups a user is a member of.

Here is a video that has an overview Groups and Group settings.

To configure group settings:

  • Log into the UI as an administrator.
  • Select Groups
  • Next to the desired group select View from the actions menu.
Edit Group
Edit Group
  • Scroll down to the Group Settings panel. Update settings as desired.
Group Settings
Group Settings
Variable NameDescription
allow_2fa_self_enrollmentAllow users to self enroll two factor devices in the profile settings page when enabled.
allow_kasm_audioAllow audio streaming for a Kasm.
allow_kasm_clipboard_downAllows users to paste text from the Kasm to their local computer.
allow_kasm_clipboard_seamlessAllows users to copy and paste text without using Kasm control panel. This feature is only available on Chrome and Chromium-based client browsers
allow_kasm_clipboard_upAllow users to paste from their local computer to the Kasm.
allow_kasm_deleteIf enabled, users are allowed to delete their running sessions.
allow_kasm_downloadsAllow users to download files from a Kasm. On RDP local client workspaces this has no effect see allow_kasm_rdp_client_file_transfer_clipboard.
allow_kasm_gamepadAllow users to pass local gamepads into the Kasm session. See Gamepad Passthrough for more details.
allow_kasm_microphoneAllow microphone passthrough to a Kasm. When enabled, users can pass their local microphone through to the Kasm session. On RDP local client workspaces this only works with desktop editions of Windows.
allow_kasm_rdp_client_file_transfer_clipboardThis setting only applies to RDP client Kasm sessions. In RDP file transfers are part of the clipboard and independent directional control of file transfers is not possible. This setting will enable file transfer in the directions that text clipboard has been enabled via allow_kasm_clipboard_down and allow_kasm_clipboard_up.
allow_kasm_rdp_map_local_drivesAllow sessions using the RDP Gateway to map client local drives into the RDP target. This setting is an all or nothing setting. When enabled it will map all client drives into the rdp session.
allow_kasm_smart_card_passthroughAllow sessions to pass smart cards through for authentication and signing. Supports RDP sessions via RDP Gateway or web native client, and container workspaces with the Kasm Native Smartcard Client. See Smart Card Passthrough for details.
allow_kasm_rdp_webauthn_passthroughAllow sessions using the RDP Gateway to pass webauthn requests from the RDP target to the client. This only works for Windows clients running the builtin mstsc.exe RDP client.
allow_kasm_webcamAllow webcam passthrough to a Kasm. When enabled, users can pass their local webcam through to the Kasm session. On RDP local client workspaces this only works with desktop editions of Windows.
allow_kasm_printingAllow printing of documents using local printers
allow_kasm_pauseIf enabled, users are allowed to pause their running sessions.
allow_kasm_sharingAllow the user to share access to their session with other users. See Session Sharing for more details.
allow_kasm_stopIf enabled, users are allowed to stop their running sessions.
allow_kasm_uploadsAllow users to upload files to a Kasm. On RDP local client workspaces this has no effect see allow_kasm_rdp_client_file_transfer_clipboard.
allow_persistent_profileAllow the use of persistent profiles if configured on the Workspace. See Persistent Profiles for details
allow_point_of_presenceAllow the user to use point of presence features for certain Workspaces.
allow_totp_2faAllow for TOTP tokens (e.g.: Google Authenticator) to be used as a two factor authentication method for the group.
allow_user_storage_mappingWhen enabled the user is allowed to configure their own Storage Mappings via their profile. When disabled, new user configurations will not be allowed, nor will using any previously configured mappings be allowed when new sessions are created.
allow_webauthn_2faAllow for WebAuthn devices (e.g. YubiKeys) to be used as a two factor authentication method for the group.
allow_zone_selectionAllow the user to specify the deployment zone when creating a session. A dropdown will appear on the user dashboard with the available Zones. Auto represents the default behavior which is to provision in current Zone. If a Zone is specified, the request will not search alternate zones if no resources are available in the requested Zone.
auto_add_local_userWhen enabled, local users will automatically be added to this group when created and upon each authentication.
auto_login_to_kasmSends users directly to kasm using default workspace after login
control_panel. advanced_settings. show_game_modeWhether the game mode option is present in the advanced menu on the Kasm Session control panel.
control_panel. advanced_settings. show_ime_input_modeWhether the ime input mode option is present in the advanced menu on the Kasm Session control panel.
control_panel. advanced_settings. show_keyboard_controlsWhether the keyboard controls option is present in the advanced menu on the Kasm Session control panel.
control_panel. advanced_settings. show_pointer_lockWhether the pointer lock option is present in the advanced menu on the Kasm Session control panel.
control_panel. advanced_settings. show_prefer_local_cursorWhether the prefer local cursor option is present in the advanced menu on the Kasm Session control panel.
control_panel.show_fullscreenWhether the fullscreen option is present on the Kasm Session control panel.
control_panel. show_delete_sessionWhether the delete session option is present on the Kasm Session control panel.
control_panel. show_display_managerWhether the display manager is present on the Kasm Session control panel. The display manager allows the user to add and remove additional displays.
control_panel.show_logoutWhether the logout option is present on the Kasm Session control panel.
control_panel. show_return_to_workspacesWhether the return to workspaces option is present on the Kasm Session control panel.
control_panel. show_streaming_qualityWhether the show streaming quality workspaces option is present on the Kasm Session control panel.
control_panel.pwa_install_optionWhether the user must be presented with the option to install per-workspace PWAs.
dashboard_redirectIf configured, standard users will be redirected to the defined external website instead of being shown the main dashboard screen.
default_imageThe default Workspace used when the /go url is called. This is also used for the auto_login_to_kasm setting. The system will create a Workspace if one does not exist. If the user already has a Workspace, the session is resumed
default_ui_languageThe default UI language to set for the group. This is applied at next user login and is also overridden if the user sets the language in their profile.
display_ui_errorsIf enabled, detailed information will be displayed on the client browser in the event of an error.
enable_container_loggingIf enabled, each workspace container will log to the database.
enable_ui_server_loggingIf enabled, log messages will be sent from client browser to the Kasm Workspaces server.
expose_user_environment_varsExpose KASM_USER and KASM_USER_ID environment variables inside the Kasm.
idle_disconnectDisconnect the Kasm connection if idle for this long. Time specified in minutes.
inject_ssh_keysWhen enabled the system will inject the user's SSH public and private keys into new sessions automatically. Users can update their keys via the Profile.
kasm_audio_default_onDefault to audio enabled on Kasm start
kasm_ime_mode_default_onDefault to IME enabled on Kasm start
keepalive_expirationThe number of seconds a Kasm will stay alive unless a keeplive request is sent from the client.
keepalive_expiration_actionThe action the system should take when a session expires according to the keepalive_expiration. Valid options are delete, stop, and pause. stop and pause actions are only valid for container based Workspaces. All other Workspaces will utilize delete regardless of what is defined.
keepalive_intervalThe number of seconds in between keepalive requests from the client when the user is actively in a session.
lock_sharing_video_modeLocks video quality to static resolution of 720p when sharing is enabled. Recommended for best performance.
max_kasms_per_userThe maximum number of simultaneous sessions a users is allowed to provision.
max_user_storage_mappingsThe maximum number of Storage Mappings a user is allowed to have registered to their account.
read_only_user_storage_mappingsWhen enabled, any storage mappings configured on the user account will be forced to read-only.
require_2faEnables two factor authentication for group. Users will be prompted to set Key on next log on.
run_configSpecify arbitrary docker run params. The settings for run_config on a group will override the run_config settings on an image. See Docker Run Config for more details
session_time_limitThe amount of time (in seconds) a session will automatically expire. A countdown timer will be displayed to the user.
staged_session_language_and _timezone_preference_overrideWhen launching a workspace Kasm will by default try to match the user language and timezone to a staged session. If a staged session does not exist that has the matching language and timezone then Kasm will create a new session with the specified language and timezone. If the override is set to true then Kasm will use a staged session for the selected workspace even if the language and timezone do not match. This overrides the user setting in the user profile.
usage_limitLimits the total number of hours a user or group can have running sessions. See the usage_limit_ documentation below for more details. Type - Per User - Each user of the group has their own limit. - Per Group - All members share the usage limit. Interval - Daily , Weekly , Monthly , Total. Hours - The number of hours allowed during each interval.
volume_mappingMap a local server directory to Kasm. Details available in the Volume Mapping Guide
web_filter_policyEnabled web filtering and sets the Web Filter Policy to be used. Policies can also be set or force disabled on Workspaces. Policies assigned to Workspaces take priority over those defined via Group Settings.

Session Time Limits

There are a multiple settings in the table above that control Kasm session lifetime. We will go into more detail about them and their relationship to each other below:

keepalive_expiration

This can also be described as the session timeout. This value determines how long Kasm will wait before destroying, stopping or pausing a session if no keepalive is received from the client. Keepalives are sent whenever a user is connected to a Kasm session even if the user is not actively using the Kasm Session. This value should be at least twice the keepalive_interval. This setting is 1 hour by default in the "All Users Group". The action taken is determined by the keepalive_expiration_action Group Setting.

keepalive_expiration_action

Administrators can decide what happens to sessions once they expire. Valid options are:

  • delete - The session is destroyed.
  • pause - The session is paused, preserving the disk, process and memory state. Paused sessions will still consume resources in physical memory and/or swap. Sessions resumed from a paused state will still have the previous programs launched and active. This action is valid for container-based sessions only. All other types will utilize the delete action.
  • stop - The session is stopped, preserving the disk state. Sessions resumed from a stopped state will have the previous files intact, but previously running programs will need to be restarted. This action is valid for container-based sessions only. All other types will utilize the delete action.
Note

When sessions are stopped or paused, the CPU/RAM resources on the Agent become available for other requests to create new sessions. This may lead to a user not being able to resume a paused/stopped session if the Agent's resources become consumed by other running sessions. When using Cloud Autoscaling, the system will not destroy Agents that have stopped/paused sessions and will similarly allow other sessions to be provisioned on the Agent. If this is undesirable, the admin can ensure users are not given the allow_kasm_pause and allow_kasm_stop permissions.

keepalive_interval

The keepalive_interval is how often the client will send a keepalive request to Kasm when the user is actively using a session. This setting is 300 seconds by default for the "All Users Group".

idle_disconnect

This setting is the number of minutes Kasm will wait when the user is idle before taking an action. This action will depend on the user context. If the user is in a Kasm session when the idle timeout expires the user is disconnected from the Kasm session and sent back to the dashboard. Any Kasm sessions that the user was connected to will be disconnected and those sessions will be subject to the keepalive_expiration. If the user is at the dashboard when the idle timeout expires the user is logged out of Kasm. This setting is set to 20 minutes by default in the "All Users Group". This setting must be higher than the keepalive_interval setting to function properly.

usage_limit

The usage_limit setting is a highly flexible option allowing the administrator to configure a maximum usage number of hours either for each user in the group or for the entire group collectively to use over a set time period. This setting is a decimal value. When using the usage_limit setting all time that a Kasm session is running is counted against the total, this includes when the user is not actively connected to the session but the session is still running. This setting is for use cases where user workspace access should be metered. This setting is not enabled by default.

Note

Accounting for paused/stopped sessions are left as is. Users are "charged" for the full duration of the session, even if the session is paused or stopped.

The user can see how much time they have used/have remaining on the user dashboard:

Session Time Usage
Session Time Usage

Clicking on this icon will bring up a more detailed display.

Detailed Session Time Usage
Detailed Session Time Usage

session_time_limit

The session_time_limit is a set amount of time that a workspace will be allowed to run once that workspace is created. This time limit is irrespective of whether the user is actively using the session or if the session is disconnected and running in the background. When session_time_limit is configured, the keepalive_expiration setting is not used. This setting is not enabled by default

Session Time Limit Countdown
Session Time Limit Countdown

Group Permissions

Groups have an optional list of permissions attached to them. When a user logs in, all permissions across all groups the user is a member of are aggregated and determine what actions a user is authorized for. There are two built in groups, Administrators and All Users. The Administrators group has the Global Admin permission while the built-in All Users group has the User permission. All users are automatically a member of the All Users group.

To configure group settings:

  • Log into the UI as an administrator.
  • Select Groups
  • Next to the desired group select Edit from the actions menu.
Edit Group
Edit Group
  • Select the Permissions tab to view and edit the permissions applied to the group.
Group Settings
Group Settings

The following table lists the permissions and descriptions of each permission.

NameDescription
UserDefault level of permissions for normal users.
Global AdminGlobal Administrator with all permissions.
Users ViewView users and user information.
Users ModifyModify existing users.
Users CreateCreate new users.
Users DeleteDelete exiting users.
Users Modify AdminModify users with Global Admin permissions.
Users Auth SessionLogin and logout on behalf of another user.
Groups ViewView groups, group members, and group settings.
Groups ModifyModify group members and settings.
Groups CreateCreate new groups.
Groups DeleteDelete existing groups.
Groups View IfMemberView groups you are a member of, excluding system groups.
Groups Modify IfMemberModify groups you are a member of, excluding system groups.
Groups View SystemView groups, group members and group settings of system defined groups.
Groups Modify SystemModify group members and settings of system groups.
Groups Delete SystemDelete a system group.
Agents ViewView agents and agent settings.
Agents ModifyModify agent settings.
Agents CreateCreate agents.
Agents DeleteDelete existing agents.
Staging ViewView staging list and stage configuration settings.
Staging ModifyModify existing staging settings.
Staging CreateCreate new staging configurations.
Staging DeleteDelete existing staging configurations.
Casting ViewView casting list and casting configuration settings.
Casting ModifyModify existing casting settings.
Casting CreateCreate new casting configurations.
Casting DeleteDelete existing casting configurations.
Sessions ViewView all user sessions.
Sessions ModifyPerform modifications to a session of another user.
Sessions DeleteDelete the session of another user.
Session Recordings ViewView user session recordings.
Images ViewView images
Images ModifyModify image configurations.
Images CreateCreate new images.
Images DeleteDelete existing images.
Images Modify ResourcesModify image resource settings, such as CPU and Memory settings.
DevAPI ViewView developer API list.
DevAPI ModifyModify developer API configurations.
DevAPI CreateCreate a new developer API key.
DevAPI DeleteDelete an existing developer API key.
Webfilters ViewView webfilters
Webfilters ModifyModify existing webfilters
Webfilters CreateCreate a new webfilter.
Webfilters DeleteDelete an existing webfilter
Brandings ViewView branding configurations.
Brandings ModifyModify existing branding configurations.
Brandings CreateCreate new branding configurations.
Brandings DeleteDelete existing branding configurations.
Settings ViewView global settings.
Settings ModifyModify global settings in all categories.
Settings Modify AuthModify global settings in the authentication category.
Settings Modify Auth CaptchaModify global settings in the authentication captcha category.
Settings Modify CastModify global settings in the casting category.
Settings Modify ImagesModify global settings in the images category.
Settings Modify LicenseModify global settings in the license category.
Settings Modify LoggingModify global settings in the logging category.
Settings Modify ManagerModify global settings in the manager category.
Settings Modify ScaleModify global settings in the scale category.
Settings Modify SubscriptionModify global settings in the subscription category.
Settings Modify FilterModify global settings in the filter category.
Settings Modify StorageModify global settings in the storage category.
Settings Modify ConnectionsModify global settings in the connections category.
Settings Modify ThemeModify global settings in the theme category.
Auth ViewView LDAP/OIDC/SAML configurations.
Auth ModifyModify LDAP/OIDC/SAML configurations.
Auth CreateCreate LDAP/OIDC/SAML configurations.
Auth DeleteDelete LDAP/OIDC/SAML configurations.
Licenses ViewView licenses.
Licenses CreateAdd new licenses.
Licenses DeleteDelete licenses.
System ViewView system information.
System Export SchemaExport system schema.
System Import DataImport system data.
System Export DataExport system data.
Reports ViewView system reports and logging. Warning: Providing access to logs can provide a lot of potentially sensitive information.
Managers ViewView the managers.
Managers ModifyModify existing managers.
Managers CreateCreate a new manager.
Managers DeleteDelete existing managers.
Zones ViewView Zones and Zone settings.
Zones ModifyModify Zone settings.
Zones CreateCreate new Zones.
Zones DeleteDelete existing Zones.
Companies ViewView companies.
Companies ModifyModify existing company.
Companies CreateCreate a new company.
Companies DeleteDelete an existing company.
Connection Proxy ViewView connection proxies.
Connection Proxy ModifyModify connection proxies.
Connection Proxy CreateCreate a connection proxy.
Connection Proxy DeleteDelete an existing connection proxy.
Physical Tokens ViewView physical 2FA tokens.
Physical Tokens ModifyAssign/Unassign physical 2FA tokens.
Physical Tokens CreateImport or create physical 2FA tokens.
Physical Tokens DeleteDelete a physical 2FA token.
Servers ViewView servers.
Servers ModifyModify existing servers.
Servers CreateCreate new servers.
Servers DeleteDelete servers.
Server Pools ViewView server pools.
Server Pools ModifyModify server pools.
Server Pools CreateCreate a new server pool.
Server Pools DeleteDelete a server pool.
Autoscale ViewView auto scale configurations.
Autoscale ModifyModify an existing auto scale configuration.
Autoscale CreateCreate a new auto scale configuration.
Autoscale DeleteDelete auto scale configurations.
VM Provider ViewView VM Provider configurations.
VM Provider ModifyModify VM Provider configurations.
VM Provider CreateCreate new VM Provider configurations.
VM Provider DeleteDelete VM Provider configurations.
Autoscale Schedule ViewView an auto scale schedule.
Autoscale Schedule ModifyModify an auto scale schedule.
Autoscale Schedule CreateCreate an auto scale schedule.
Autoscale Schedule DeleteDelete an auto scale schedule.
DNS Providers ViewView DNS provider configurations.
DNS Providers ModifyModify DNS provider configurations.
DNS Providers CreateCreate new DNS Provider configurations.
DNS Providers DeleteDelete DNS Provider configurations.
Registries ViewView Workspace Registries.
Registries ModifyModify existing Workspace Registries.
Registries CreateAdd new Workspace Registries
Registries DeleteDelete a Workspace Registry
Storage Providers ViewView Storage Providers.
Storage Providers ModifyModify existing Storage Providers.
Storage Providers CreateCreate new Storage Providers.
Storage Providers DeleteDelete an existing Storage Provider.
Egress Providers ViewView Egress Providers.
Egress Providers ModifyModify existing Egress Providers.
Egress Providers CreateCreate new Egress Providers.
Egress Providers DeleteDelete an existing Egress Provider.
Egress Gateways ViewView Egress Gateways.
Egress Gateways ModifyModify existing Egress Gateways.
Egress Gateways CreateCreate new Egress Gateways.
Egress Gateways DeleteDelete an existing Egress Gateway.
Egress Credentials ViewView Egress Credentials.
Egress Credentials ModifyModify existing Egress Credentials.
Egress Credentials CreateCreate new Egress Credentials.
Egress Credentials DeleteDelete an existing Egress Credential.
Banners ViewView banners.
Banners ModifyModify existing banners.
Banners CreateCreate new banners.
Banners DeleteDelete an existing banner.
AD User Management ViewView AD User Management Configurations.
AD User Management ModifyModify existing AD User Management Configurations.
AD User Management CreateCreate new AD User Management Configurations.
AD User Management DeleteDelete an existing AD User Management Configuration.

Permission Changes

A user's permissions are embedded in their session token, which is generated on login. A user's token lifetime is controlled by the Session Lifetime global setting. The UI will get a new session token every 5 minutes. The fastest way to get new permissions to apply, is to have the user log out and log back in, otherwise, the change will apply generally within 5 minutes.

Permission Dependencies

While most permissions can stand alone, there are dependencies between some permissions. Generally, a Modify, Create, and/or Delete permission will need the corresponding View permission. The following are additional permission dependencies, which means you will need to grant multiple permissions to have the desired effect.

  • Licenses View requires System View
  • Permissions View requires Groups View
  • Registries View requires Images View, System View, and Agents View
  • Autoscale View requires Server Pools View
  • Autoscale Schedule View requires Server Pools View
  • DNS Providers View requires Server Pools View
  • VM Providers View requires Server Pools View and Autoscale View
  • Users Delete requires Sessions Delete if the target user has running sessions and Users Modify
  • Users Delete requires Users Modify Admin to delete a user that has the Global Admin permission
  • Egress Gateways Create, Egress Gateways Modify, Egress Gateways Delete, Egress Credentials Create, Egress Credentials Modify and Egress Credentials Delete require Egress Providers Modify.
  • Servers View and Server Templates View requires Server Pools View and Zones View

There are many cases where multiple permissions are not required, however, certain UI elements will be hidden if the user does not have the permissions to view them. For example, a user may have permissions to View Images, however, they may not have permissions to View Servers. If the user goes to view an individual Workspace Image that targets a Server, they will not see the drop down to view or edit the server the image is targeting.

Special Permissions

There are more available permissions around groups, beyond the basic View, Create, Modify, and Delete. The Groups View IfMember and Groups Modify IfMember allow a user to view or modify a group if they are a member of that group. This does not extend to built-in system groups (All Users and Administrator). To edit or view System groups, they will also need the Groups View/Modify System permission.

There is an additional permission that protects modification of users with the Global Admin permission. In order to modify a Global Admin, the user requesting the modification must themselves be a Global Admin or have the User Modify Admin permission.

There are two permissions that allow modifications to Workspace Images, Images Modify and Images Modify Resources. The Images Modify allows modification of all Image settings except those that would modify the physical/virtual compute resources. The following settings require the Images Modify Resources permission to edit:

  • GPU Count
  • Cores
  • Memory
  • CPU Allocation Method
  • Uncompressed Image Size
  • Docker Registry
  • Docker Registry Username
  • Docker Registry Password
  • Hash
  • Volume Mappings
  • Docker Run Config Override
  • Docker Exec Config

Group Workspaces

Administrators can define which Workspaces are available to each group. By default newly created workspaces are automatically assigned to the All Users group. This behavior can be changed by modifying the Add Images To Default Group global Settings.

Group Workspaces
Group Workspaces

SSO Group Mappings

Administrators can configure the system to automatically map users that authenticate with an SSO provider (e.g SAML, OpenID, LDAP) into Kasm Groups.

If Assign All Users is selected, any user that authenticates with the defined SSO provider will be added to the Kasm group. Otherwise, only users that have the defined Group Attributes passed in by the SSO provider will be added to the group.

These group mappings are evaluated and updated at each user login. If a mapping is defined and a user does not have the group attributes listed, the user will be removed from the group.

SSO Group Mappings
SSO Group Mappings
SSO Group Mappings Config
SSO Group Mappings Config

Group File Mappings

File Mappings allow the administrator to manage files to be mapped to the inside of a user's container based Workspace session. File Mappings can be defined on a User, Group, and/or Workspace. See the primary documentation on File mappings for more details.

Note

When a user belongs to multiple Groups that define a File Mapping with the same destination, the group with the lowest priority value gets mapped into the user's container.

File Mappings Table
File Mappings Table

The following is an example File Mapping of a Chrome Managed Policy to define bookmarks in Chrome.

File Mapping Definition
File Mapping Definition