# Authentication Profile

The Authentication Profile module manages user authentication for accessing network devices via CLI (Command Line Interface) sessions. It ensures that only authorized users can establish CLI sessions with network devices by verifying their identity before granting access.

This is a **privilege-based feature**: Users can only view, add, edit, delete, execute, or export authentication profiles if they have the necessary permissions assigned by the administrator.

## **What do you see on the screen**

**Basic Details |** Authentication Profile

| **Label**             | **Action**                                                        | **Description/Example**                                                                                                                                                              |
| --------------------- | ----------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| **Search**            | Enter keywords to search for a specific profile.                  | Example: "Admin Profile"                                                                                                                                                             |
| **Filter**            | Apply filters based on predefined fields and conditions.          | <p><strong>Fields:</strong> Profile Name, Status, User Tag, Asset Tag, Device IP Address, Device Credential.<br><strong>Conditions:</strong> In, Not In, Equal To, Not Equal To.</p> |
| **CLI Jobs**          | Click to navigate to the **CLI Jobs** module.                     | CLI Jobs establish direct CLI sessions (**SSH or Telnet**) between a device and a user via the **NCCM** application, allowing users to execute commands similar to **PuTTY**.        |
| **Add**               | Click to create a new **Authentication Profile**.                 | Example: Add a profile for network administrators with specific device access.                                                                                                       |
| **Profile Name**      | View-only field.                                                  | <p>A unique identifier for the authentication profile is used to distinguish different access configurations.</p><p>Example: "Admin-Access"</p>                                      |
| **IP Address**        | View-only field.                                                  | <p>The IP address of the network device associated with this profile.<br></p><p>Example: "192.168.1.1"</p>                                                                           |
| **Asset Tag**         | View-only field.                                                  | <p>A unique tag is assigned to a device for tracking and identification within the inventory.<br></p><p>Example: "Router-001"</p>                                                    |
| **User Name(s)**      | View-only field.                                                  | <p>The list of users associated with the profile authorized to access the device.</p><p>Example: "admin, user1"</p>                                                                  |
| **Device Credential** | View-only field.                                                  | <p>The authentication method used for accessing the device, such as SSH keys, passwords, or certificates.</p><p>Example: "SSH Key - Admin"</p>                                       |
| **Protocol**          | View-only field.                                                  | <p>The communication protocol used for CLI access. Supported options include SSH and Telnet.</p><p>Example: "SSH" or "Telnet"</p>                                                    |
| **Description**       | View-only field.                                                  | <p>A brief note explaining the purpose or function of the profile.</p><p>Example: "Admin profile for core routers."</p>                                                              |
| **Status**            | View-only field.                                                  | <p>Indicates whether the profile is active or inactive.</p><p>Example: "Active" or "Inactive"</p>                                                                                    |
| **Visibility**        | View-only field.                                                  | <p>Defines whether the profile is Public (accessible to all authorized users) or Private (restricted access).</p><p>Example: "Public" or "Private"</p>                               |
| **Action Icons**      |                                                                   |                                                                                                                                                                                      |
| **Edit**              | Select a profile, make necessary modifications, and save changes. | Editing follows the same procedure as the **Add** operation.                                                                                                                         |
| **Clone**             | Duplicate an existing profile with minor modifications.           | Select a profile and click **Clone**. The **Add Authentication Profile** page appears with pre-filled details—modify as needed and save.                                             |
| **Delete**            | Remove a selected authentication profile.                         | Example: Delete an obsolete profile no longer in use.                                                                                                                                |
| **Detail View**       | Open a pop-up with detailed profile information.                  | Displays **User Name(s), Email, Profile Name, IP Address, and Status**.                                                                                                              |
| **Bulk Actions**      |                                                                   |                                                                                                                                                                                      |
| **Enable**            | Select multiple profiles and enable them in bulk.                 | Enabled profiles will be marked as **Active**.                                                                                                                                       |
| **Disable**           | Select multiple profiles and disable them in bulk.                | Disabled profiles will be marked as **Inactive**.                                                                                                                                    |
| **Delete**            | Remove multiple authentication profiles at once.                  | Example: Bulk-delete outdated or unnecessary profiles.                                                                                                                               |

## **Add Authentication Profile**

To add a new authentication profile, click on the **Add** option located at the top right corner of the page. Fill in the required details as outlined in the table below:

**Add Details |** Authentication Profile

| **Label**             | **Action**                                                                                                                   | **Description/Example**                                                                               |
| --------------------- | ---------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- |
| **Profile Name**\*    | Enter a unique name for the authentication profile.                                                                          | Example: "Admin-Access"                                                                               |
| **Description**\*     | Provide a brief description of the authentication profile.                                                                   | Example: "Admin profile for critical network devices."                                                |
| **Status**            | Toggle between **ON** (Active) or **OFF** (Inactive) to enable or disable the profile.                                       | Default: "ON"                                                                                         |
| **IP Address**        | Enter the device management IP address. Accepts a single IP o**r** a list of IPs separated by commas, semicolons, or spaces. | **Example:** "192.168.1.1; 192.168.1.2, 192.168.1.3"                                                  |
|                       | Alternatively, import IP addresses from a CSV file. Click the Download icon to get a sample CSV template.                    | **Example CSV:** "Device Name, IP Address"                                                            |
| **Asset Tag**         | Select from the drop-down.                                                                                                   | <p>Choose the appropriate asset tags for device grouping.</p><p>Example: "Router-001, Switch-002"</p> |
| **User**              | Select a user from the drop-down list.                                                                                       | **Example:** "admin, user1"                                                                           |
| **User Tag**          | Select a predefined user group from the drop-down list.                                                                      | **Example:** "Network Admins, IT Support"                                                             |
| **Protocol**          | Select the access protocol from the drop-down.                                                                               | **Options:** "SSH, TELNET"                                                                            |
| **Device Credential** | Select the appropriate credential method for authentication.                                                                 | **Example:** "SSH Key - Admin, Password Auth"                                                         |
| **Visibility**        | Choose profile visibility.                                                                                                   | Public (accessible to authorized users) or Private (restricted access).                               |

{% hint style="info" %}
**Note:**

* You can add devices using either **IP Address** or **Asset Tag**.
* You can select **individual users** or assign a **User Tag** to group users under a common profile.
  {% endhint %}

Once all details are entered, click **Submit** to save and add the authentication profile to the inventory.
