User profiles
Profile is central in GLPI configuration: profile is the key for users permissions granting and for securing and isolating data.
A profile is associated with :
a user
an entity, in a recursive or dynamic manner
In order to enable permissions to be passed to child entities, the profile must be associated recursively.
Default profiles
Different profiles can be associated with the same user, based on entities and whatever the relation between these entities: this can be achieved by adding the profile to the user for each entity where user profile must be different.
By default, 7 profiles are pre-registered in GLPI:
Super-Admin: This profile is granted all permissions
if the super-admin profile is deleted or if the simplified interface is associated with this profile, access to the GLPI configuration may be permanently lost.
Admin: This profile has administration rights for all GLPI. Some restrictions are applied to it at the level of the configuration of rules, entities as well as other items which may alter the behavior of GLPI.
Supervisor: This profile incorporates the elements of the Technician profile by adding elements allowing management of a team and its organization (allocation of tickets, etc.).
Technician: This profile corresponds to the one used for a maintenance technician, having read access to the inventory and to the help desk in order to process tickets.
Hotliner: This profile corresponds to the one that could be given for a hotline service; it allows to open tickets and follow them but not to be in charge of them as a Technician can be.
Observer: This profile has read permission to all inventory and management data. In terms of assistance, it can open a ticket or be assigned one, but cannot administer this section (assign a ticket, steal a ticket...).
Self-Service: This profile is the most limited. It is also the only one to have a different interface, the simplified interface, as opposed to the standard interface. However, it can declare a ticket, add a follow-up, consult the FAQ or reserve asset. This profile is set as the default profile.
Permissions description
When creating your profile, you will first be asked to select the basic options :
Name
Default profile: the profile that will be assigned by default when a new user logs in (unless a specific authorisation rule applies, see rules)
Profile's interface: Standard of simplified (see more default profiles)
Update own password
Ticket creation form on login

Once the profile has been created, it will be possible to establish the permissions on the various functionalities of GLPI. Eight tabs corresponding to the different menus of GLPI are then available to manage this set of permissions and are described below.
The different permissions of an object are listed on the line of its name. To activate an permission, the corresponding box must be checked and vice versa to delete an permission the box must be unchecked.
No permission deduction is done; for example in order to be able to modify an object, read permission must also be granted.
Permissions after migration: migration takes over old permissions in full, regardless of the purpose, and activates the corresponding values in the new system. Previous Write permission is transformed into Read, Update, Create, Delete and Purge for most objects and must then be refined if needed. For others, the permissions are grouped by object, for example, FAQ permission are permissions of the Knowledge Base object.
Some permissions are standards for all objects:
Read: allows to display an object, it is also often this permission which displays or not the object in the different menus
Update: allows to display an object data
Create: allows to create a new element of the type of the object
Delete: allows you to place the object in the trash bin. If this permission is not present, it means that the object does not have a trash bin.
Purge: deletes the object from the trash bin and therefore permanently from the database. The permissions can therefore be refined between temporary deletion (placing in the trash bin) and permanent deletion (purging the trash bin)
Read notes: allows to display the Notes tab, if object has one
Update notes: allows to modify the content of a note or to delete it
The different tabs
Assets
The 7 standard permissions described above apply to the elements of tab Assets.

The Internet permission applies to:
IP field of a network port
association or disassociation of a network name to a network port
Internet part of dropdowns (IP networks, internet domains, WiFi networks, network names)
Assistance
This tab manages permissions on tickets, follow-ups, tasks, validations, associations, problems and changes. It also manages the visibility of statistics and schedules as well as the assignment of a template to the profile.
Life cycle
This tab manages the permissions on the status life cyle of tickets, problems and changes.
Management
The 7 standard permissions described above apply to the elements of tab Management.

The permissions on Financial and administrative information applies also to objects containing financial information; for instance it is not allowed to purge a computer containing financial information if profile is not granted with Purge permission on financial information.
Tools
This tab manages permissions on notes, RSS feeds, public bookmarks, reports, reservations, knowledge base as well as projects and tasks of a project.
Administration
This tab manages permissions on users, entities and business rules on tickets.
Setup
This tab manages permissions on setup (dropdowns, personnalization, OAuth clients, etc.)
Security
This tab allows you to enforce for certain profiles.

Enforce 2FA: To force the use of 2FA globally;
2FA Suffix: Text that will be added in parentheses after the issuer name on display (
Setup>General>Security).

Users
This tab lists all users and the entities in which they are positioned.
"D" means the permissions have been assigned dynamically;
"R" means the permissions are recursive from the assignment entity.
You can remove a user from the profile using the Actions button.
Historical
All
Last updated