IBM Support

How to import new users in Maximo Application Suite 9.1

How To


Summary

As part of the new Authorization Service, the Maximo Application Suite (MAS) user import feature has been seamlessly integrated with the MANAGE import functionality in 9.1. Previously, importing multiple users in MAS required navigating to a separate UI screen to complete additional configuration for those users. With this integration, you now have a single source of truth that effectively communicates with both MANAGE and MAS. This streamlined approach simplifies the user import process, reduces redundant steps, and ensures a more cohesive experience across platforms. The purpose of this documentation is to describe the steps to import new users and highlight the changes between the deprecated CSV fields and the new ones, ensuring a smooth transition to the updated system.

Steps

1. Login into Maximo Application Suite 9.1;
 
2. Go to Suite > Security > Users:
 
image-20251006113713-1
 
3. Click Import data option:
 
image-20251006142116-1
 
4. Download the new template and complete the columns:
 
 
 
About the new template csv file:
 
  • In MAS 9.1, for one particular user, there are distinct rows which represent: contact information, different authentication types and different security groups;
  • Security groups are optional. If they are not added to csv file, Maximo will add the user automatically to DEFLTREG and EVERYONE groups by default;
  • The object MASUSERIDP was included with new columns regarding authentication method;
  • Custom attributes need to be added to the template;
  • There are deprecated csv fields and new ones, as mentioned in the table below:
DescriptionDeprecated field from 9.0New field
Unique user identifieridUSERID
Username (login credential)usernameLOGINID
Display namedisplayNameDISPLAYNAME
First namegivenNameFIRSTNAME
Last name (surname)familyNameLASTNAME
Title (e.g., Mr., Ms.)titleTITLE

For local users, enter local.

For external users, specifies the identity provider for the user:
- If configured for Security Assertion Markup Language (SAML) authentication, enter default-saml.
- If configured for Lightweight Directory Access Protocol (LDAP) authentication, enter default-ldap.
- If configured for OpenID Connect (OIDC) authentication, enter default-oidc.

- For local users, the field is equivalent to local_user= True
- identities_saml
- identities_ldap
- Not applicable for OIDC
IDPID

For local users, identifies that the user account is local within the system. 

For external users, identifies the IdP authentication type. Enter one of the following values: local, ldap, saml, or oidc.

For local user, the field is equivalent to local_user= TrueIDPTYPE

For local users, the login ID for the local user.

For external users,  links the user’s login credentials of the identity provider with their system identity:
- If configured for SAML-based login credentials, enter <user SAML ID>.
- If configured for LDAP-based login credentials, enter <user LDAP ID>.
- If configured for OIDC-based login credentials, enter <user OIDC ID>. The login ID for the local user.

- For local, username
- identities_saml
- identities_ldap
- Not applicable for OIDC
IDPLOGINID

Automatically generate passwords for new users.

Enter one of the following values:

  • 1 = Automatically generate passwords for new users.
  • 0 = Do not automatically generate passwords for new users.

If you are creating custom passwords in the IDPPASSWORDINPUT field, you do not need to enter a value in this field.

generatePasswordIDPAUTOPASSWORD

Automatically email the password credentials to the user after the user record is created.
Enter one of the following values:

   1 = Email the password credentials to the user.
   0 = Do not automatically email the password credentials to the user.

sendPasswordtoEmailIDPEMAILPASSWORD

Specify a custom password if you are not automatically generating passwords.

If you specify to automatically create passwords in the IDPAUTOPASSWORD, you do not need to enter a value in this field.

passwordIDPPASSWORDINPUT

The password change setting for the user.
Enter one of the following values:

   1 = The user must change their password on the next login.
   0 = The user is not required to change their password.

If you do not specify a value, the value from the forcePasswordChange flag in the password policy settings is used.

forcePasswordChangeFORCEPASSWORDCHANGE
Email address (up to 100 characters)emails__valuePRIMARYEMAIL
Email type (HOME or WORK)emails__typePRIMARYEMAILTYPE
Phone number (up to 20 characters)phoneNumbers__valuePRIMARYPHONE
Phone type (WORK or MOBILE)phoneNumbers__typePRIMARYPHONETYPE
Street address (up to 169 charactersaddresses__streetAddressSTREETADDRESS
City (up to 36 characters)addresses__localityCITY
Region (up to 36 characters)addresses__regionREGIONDISTRICT
Postal code (up to 12 characters)addresses__postalCodePOSTALCODE
Country (up to 36 characters)addresses__countryCOUNTRY
 
 
5. Save the csv file and upload it to Maximo:
 
image-20251006142459-2
 
6. Click Import:
 
image-20251006142528-3
 
 
Important: To update existing users using import functionality, please follow the documentation How to update users data using import functionality in MAS 9.1.
 

Document Location

Worldwide

[{"Type":"MASTER","Line of Business":{"code":"LOB77","label":"Automation Platform"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSRHPA","label":"IBM Maximo Application Suite"},"ARM Category":[{"code":"a8m50000000CbFGAA0","label":"Integration"}],"ARM Case Number":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"9.1.0"}]

Document Information

Modified date:
29 October 2025

UID

ibm17247213