Overview
User management in ITSM-NG handles user accounts, authentication, profiles, and permissions across entities.Creating Users
Enter user details
Fill in the required information:
- Login: Unique username (required)
- First name: User’s first name
- Surname: User’s last name
- Email: Primary email address
- Password: Set initial password (for local authentication)
Set authentication
Choose the authentication type:
- Local database: ITSM-NG authentication
- LDAP directory: External LDAP authentication
- Email server: Email-based authentication
- External: SSO or other external authentication
Assign profile and entity
- Profile: Select the user’s role (e.g., Technician, Admin)
- Entity: Choose the entity
- Recursive: Check to include child entities
User Profile
Personal Information
Authentication Settings
Authentication type
View or modify (if authorized):
- Type: Local, LDAP, Mail, External
- Authentication source: Specific LDAP server (if applicable)
Password management
For local users:
- Change password (requires current password)
- Password must meet complexity requirements
- Password expiration tracking
Multiple Emails
Users can have multiple email addresses:User Preferences
Interface Customization
Display Preferences
- Go to created item: Navigate to item after creation
- Show count on tabs: Display item counts in tabs
- Display counters in menu: Show numbers in navigation menu
- Use flat tree dropdowns: Display complete names in hierarchical dropdowns
Remote Access
Personal token
Generate a personal token for API or CLI access:
- Used for authentication in automation scripts
- Can be reset if compromised
Profile Assignment
Assigning Profiles
Users can have multiple profile-entity combinations:Add authorization
Click Add an authorization:
- Entity: Select entity
- Profile: Choose profile
- Recursive: Include child entities
Dynamic Rights
When using LDAP authentication with rules:- Rights are automatically assigned based on LDAP groups
- Dynamic rights are marked with a special indicator
- Manual rights can coexist with dynamic rights
- Dynamic rights are updated on each login
Dynamic rights are determined by rules configured in Setup > Rules > Rules for assigning authorizations to users.
Group Membership
Assign users to groups:LDAP Group Synchronization
For LDAP users:- Groups are synchronized automatically based on LDAP attributes
- Dynamic groups are marked and updated on login
- Manual group assignments remain separate
/inc/user.class.php:1199-1264 for LDAP group synchronization logic.
User Account States
Active/Inactive
- Active: User can log in and use the system
- Inactive: User account is disabled (cannot log in)
Valid Dates
Deleted
- Deleted users are hidden from normal views
- Can be restored from the trash
- Permanent deletion removes the user completely
Password Management
Password Policy
Configured in Setup > General > Password security policy:Password Reset
User-initiated reset
Users can reset their password via “Forgot password” link if:
- Email is configured
- Password reset is enabled
Admin reset
Administrators can set a new password:
- Enter new password twice
- User must meet password requirements
- Password expiration is reset
User Import and Synchronization
Manual Import
Import users from authentication sources:Automatic Synchronization
Configure automatic user import:Configure behavior
Set options:
- Add user without accreditation: Import users even without profile
- Action when user deleted from LDAP:
- Preserve: Keep account active
- Put in trashbin: Mark as deleted
- Withdraw rights: Remove dynamic authorizations
- Disable: Deactivate account
- Disable and withdraw: Combine both
/inc/authldap.class.php:64-88 for deleted user action constants.
User Picture Management
Uploading Picture
LDAP synchronization
For LDAP users with configured picture field:
- Picture is synchronized from LDAP on login
- Stored in
GLPI_PICTURE_DIR/[subdirectory]/[userid]_[hash].jpg - Thumbnail generated automatically
User Search and Filters
Search for users with advanced criteria:Best Practices
User Management Recommendations
- Use LDAP when possible: Centralize user management
- Regular audits: Review user accounts and rights periodically
- Disable vs delete: Disable inactive users rather than deleting
- Complex passwords: Enforce strong password policies
- Default profile: Set appropriate default profile for auto-created users
- Email validation: Ensure users have valid email addresses
- Document procedures: Maintain user lifecycle documentation
- Separation of duties: Don’t assign excessive rights
Troubleshooting
Cannot Login
Check:- Account is active (
is_active = 1) - Account is not deleted (
is_deleted = 0) - Current date is within valid date range
- Password is correct and not expired
- User has at least one profile-entity assignment
LDAP Synchronization Issues
Verify:- LDAP server is configured and accessible
- User exists in LDAP directory
- LDAP attributes are mapped correctly
- Synchronization field matches LDAP attribute
- User DN is correct
/inc/user.class.php:1274-1352 for LDAP photo synchronization implementation.