# User profiles

Profile is central in GLPI configuration: profile is the key for users permissions granting and for securing and isolating data.

A profile is associated with :

* a user
* an entity, in a **recursive** or **dynamic** manner

In order to enable permissions to be passed to child entities, the profile must be associated recursively.

## Default profiles

Different profiles can be associated with the same user, based on entities and whatever the relation between these entities: this can be achieved by adding the profile to the user for each entity where user profile must be different.

By default, 7 profiles are pre-registered in GLPI:

* **Super-Admin**: This profile is granted **all** permissions

{% hint style="danger" %}
if the super-admin profile is deleted or if the **simplified interface** is associated with this profile, access to the GLPI configuration may be permanently lost.
{% endhint %}

* **Admin**: This profile has administration rights for all GLPI. Some restrictions are applied to it at the level of the configuration of rules, entities as well as other items which may alter the behavior of GLPI.
* **Supervisor**: This profile incorporates the elements of the *Technician* profile by adding elements allowing management of a team and its organization (allocation of tickets, etc.).
* **Technician**: This profile corresponds to the one used for a maintenance technician, having read access to the inventory and to the help desk in order to process tickets.
* **Hotliner**: This profile corresponds to the one that could be given for a hotline service; it allows to open tickets and follow them but not to be in charge of them as a *Technician* can be.
* **Observer**: This profile has read permission to all inventory and management data. In terms of assistance, it can open a ticket or be assigned one, but cannot administer this section (assign a ticket, steal a ticket...).
* **Self-Service**: This profile is the most limited. It is also the only one to have a different interface, the [simplified interface](/documentation/readme-1-1/interfaces.md), as opposed to the **standard interface**. However, it can declare a ticket, add a follow-up, consult the FAQ or reserve asset. This profile is set as the default profile.
* **Read-only** : This profile, as the name suggests, only has read-only access. It's a profile dedicated to those who will monitor not only the service cycle, but also the entire administration and configuration of the system, without adding or changing any parameters."

## Permissions description

When creating your profile, you will first be asked to select the basic options :

* **Name**
* **Default profile**: the profile that will be assigned by default when a new user logs in (unless a specific authorisation rule applies, see [rules](/documentation/modules/administration/rules/rulesmanagement.md#rules-for-assigning-authorizations-to-a-user))
* **Profile's interface**: Standard of simplified (see more [default profiles](#default-profiles))
* **Update own password**
* **Ticket creation form on login**

<figure><img src="/files/L0na9qBRMpCYJKgUPP02" alt=""><figcaption></figcaption></figure>

Once the profile has been created, it will be possible to establish the permissions on the various functionalities of GLPI. Eight tabs corresponding to the different menus of GLPI are then available to manage this set of permissions and are described below.

The different permissions of an object are listed on the line of its name. To activate an permission, the corresponding box must be checked and vice versa to delete an permission the box must be unchecked.

{% hint style="warning" %}
No permission deduction is done; for example in order to be able to modify an object, read permission must also be granted.
{% endhint %}

Permissions after migration: migration takes over old permissions in full, regardless of the purpose, and activates the corresponding values in the new system. Previous *Write* permission is transformed into *Read*, *Update*, *Create*, *Delete* and *Purge* for most objects and must then be refined if needed. For others, the permissions are grouped by object, for example, FAQ permission are permissions of the Knowledge Base object.

Some permissions are standards for all objects:

* **Read**: allows to display an object, it is also often this permission which displays or not the object in the different menus
* **Update**: allows to display an object data
* **Create**: allows to create a new element of the type of the object
* **Delete**: allows you to place the object in the trash bin. If this permission is not present, it means that the object does not have a trash bin.
* **Purge**: deletes the object from the trash bin and therefore permanently from the database. The permissions can therefore be refined between temporary deletion (placing in the trash bin) and permanent deletion (purging the trash bin)
* **Read notes**: allows to display the *Notes* tab, if object has one
* **Update notes**: allows to modify the content of a note or to delete it

## The different tabs

{% hint style="info" %}
The display of profile management depends on the profile of connected user. It can therefore vary depending on the profile.
{% endhint %}

### Assets

The 7 standard permissions described above apply to the elements of tab **Assets**.

<figure><img src="/files/OK9KemMGJB9UWtuu2CZT" alt="../images/assets.png"><figcaption><p>Assets authorizations</p></figcaption></figure>

The **Internet** permission applies to:

* IP field of a network port
* association or disassociation of a network name to a network port
* Internet part of dropdowns (IP networks, internet domains, WiFi networks, network names)

### Assistance

This tab manages permissions on tickets, follow-ups, tasks, validations, associations, problems and changes. It also manages the visibility of statistics and schedules as well as the assignment of a template to the profile.

<a href="/pages/BdqvCC0Pi4E8x0ckMAmh" class="button secondary">Go to Assistance tab</a>

### Life cycle

This tab manages the permissions on the status life cyle of tickets, problems and changes.

<a href="/pages/vY5Vw27oqwSxhvpTf2Iv" class="button secondary">Go to Life cycle</a>

### Management

The 7 standard permissions described above apply to the elements of tab **Management**.

<figure><img src="/files/ECuJ04rvjORzn3U9q43F" alt="../images/management.png"><figcaption><p>Permissions on management</p></figcaption></figure>

{% hint style="warning" %}
The permissions on **Financial and administrative information** applies also to objects containing financial information; for instance it is not allowed to purge a computer containing financial information if profile is not granted with *Purge* permission on financial information.
{% endhint %}

### Tools

This tab manages permissions on notes, RSS feeds, public bookmarks, reports, reservations, knowledge base as well as projects and tasks of a project.

<a href="/pages/UZQ1rX1UWoQImndVjb5P" class="button secondary">Go to Tools tab</a>

### Administration

This tab manages permissions on users, entities and business rules on tickets.

<a href="/pages/09MPsyIJnSp3QFa006D9" class="button secondary">Go to Administration tab</a>

### Setup

This tab manages permissions on setup (dropdowns, personnalization, OAuth clients, etc.)

<a href="/pages/XOM87lCLPVEbzdUnm8zM" class="button secondary">Go to Setup tab</a>

### Security

This tab allows you to enforce 2FA[^1] for certain profiles.

<figure><img src="/files/Txa9XBPtNw5UfDgKkRBd" alt=""><figcaption></figcaption></figure>

* **Enforce 2FA**: To force the use of 2FA globally;
* **2FA Suffix**: Text that will be added in parentheses after the issuer name on display (**`Setup`** > **`General`** > **`Security`**).

<figure><img src="/files/O80PZG2M1RrZhNVw5PEn" alt=""><figcaption></figcaption></figure>

### Users

This tab lists all users and the entities in which they are positioned.

* *"D"* means the permissions have been assigned dynamically;
* *"R"* means the permissions are recursive from the assignment entity.

You can remove a user from the profile using the **`Actions`** button.

### Historical

<a href="/pages/BFVWmEUXubM5TkrSlU0e" class="button secondary">Go to Historical</a>

### All

<a href="/pages/GaxHCghUhbnO3A8Juqd5" class="button secondary">Go to All</a>

[^1]: Two-factor authentication


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://help.glpi-project.org/documentation/modules/administration/profiles/profiles.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
