Please check if the feature has not already been requested.
If not, please describe it
copy closed ticket
It would be usefull to have the possibility to copy a closed ticket for technician without change status manually.
Get the PC name in a ticket
Is it possible get or associate the PC that send the ticket to the ticket?
Thank you.
Plugin news choisir la page d'affichage
Pretty URLs with htaccess
The URL at today is: http://myurl.com/front/funtionality.php?id=XXX or http://myurl.com/plugin/funtionality.php the idea it's change this trough htaccess for http://myrul.com/funtionality/ID I mean the URL change to this: Example the URL for projects it is:http://myurl.com/plugins/projet/front/projet.php the htaccess change just for /project/ and when you chooose a project appear form this must be changed too so: form + ID it's reduced so the final it's http://myurl.com/projet/01 or ticket case Example the ticket URL it's: http://myurl.com/front/ticket.form.php?id=000000 the htaccess change just for /ticket/ and when you chooose a ticket appear form this must be changed too so: form + ID it's reduced so the final it's http://myurl.com/Ticket/20153001
Integrate Talk plugin to the project section.
I'm falling in love with the talk plugins
http://plugins.glpi-project.org/#/plugin/talk
it's very usefull, so, is it possible to have the same plugin for the project?
Thx!
DO NOT clear fields when a mandatory field is missing
When you try to close a ticket and you missed to fill a mandatory field (eg category), the response field you took time to fill is TOTALLY EMPTY after clicking on save...
Restricting Asset Visibility in Tickets and Enabling Auto-Assignment of User Assets in GLPI 11
I am part of the Development Team. While configuring GLPI version 11, I noticed that as a normal user, I am able to view the asset details of all users in the ticket section.
I would like to restrict this functionality. My requirement is:
-
When a user creates a ticket, they should only be able to view their own asset details.
-
If a ticket is raised on behalf of another user, the corresponding user’s asset details should be automatically linked or assigned to that ticket.
Is this configuration possible in GLPI? Could someone please guide me on how to achieve this?
Limit profiles for users to create other users with
Our situation is probably a less common one. I'm testing GLPI in our organisation to see if it's a good fit for us.
I haven't seen this option to be available elsewhere, but we would definitely benefit if an option as the following would be implemented.
Our IT Helpdesk mostly helps existing clients, but sometimes an unknown person asks our Helpdesk for help. It would be great if the Helpdesk could create users. I can already give them create users permissions, but if I give them this permission, they are also allowed to create other Helpdesk users, which is something I don't want. I've created a Profile specifically for SSP users and my Helpdesk colleagues get an account with the Helpdesk Profile. I would like to limit helpdesk employees to only be able to create users with the SSP profile.
If this is already possible, I can't find the option.
Edited because there was something wrong in my earlier statement.
Console command to encrypt a secret
When using Ops tools such as Ansible to install/manage GLPI we can use the Console (`bin/console`) to perform some configuration using the "config:set" command.
But when, setting a secret such as the inventory credentials ("basic_auth_password" key in "inventory" context) we must provide it encrypted because the console will store it as-is in database and application expect it to be encrypted when it'll fetch it from there.
For example the following command:
bin/console \
config:set \
--context=inventory \
basic_auth_password \
secret_password
Will create/update the following row in `glpi_configs` table:
+-----+-----------+---------------------+-----------------+
| id | context | name | value |
+-----+-----------+---------------------+-----------------+
| 420 | inventory | basic_auth_password | secret_password |
+-----+-----------+---------------------+-----------------+
SQL query:
SELECT * FROM `glpi_configs` WHERE `context` = 'inventory' and `name` = 'basic_auth_password';
While setting this password via the GUI (path = "/Inventory/Configuration") creates/updates the following row in `glpi_configs` table:
+-----+-----------+---------------------+---------------------------------------------------------------------------+
| id | context | name | value |
+-----+-----------+---------------------+---------------------------------------------------------------------------+
| 420 | inventory | basic_auth_password | abcdefghijklmnopqrstuvwxyz0123456789+abcdefghijklmnopqrstuvwxyz0123456789 |
+-----+-----------+---------------------+---------------------------------------------------------------------------+
Having a new command to call GLPIKey::encrypt() directly such as, for example:
bin/console security:encrypt secret_password # Returns: # abcdefghijklmnopqrstuvwxyz0123456789+abcdefghijklmnopqrstuvwxyz0123456789
We could use it like this:
bin/console \
config:set \
--context=inventory \
basic_auth_password \
"$(bin/console security:encrypt secret_password)"Servicio de atención al cliente por UserEcho