Every system user must have a user identity before they can sign on to and use a system. This user identity is called a user profile.
A user identity is a string of characters that uniquely identifies a user to a system. Only an administrator with appropriate system authority can create a user profile for a user.
A user profile controls what the user can do and customizes the way the system appears to the user. A user profile contains the information that i5/OS™ requires to allow users to sign on to a system, to access their own customized session, including their own message and output queue, and to access functions and objects to which they have been granted authority. Designing user profiles well can help you protect your system and customize it for your users. Every system user must have a user profile and a system administrator must create the user profile for the user.
You can include a user profile in group profiles. In this way, all group members share access to specific objects and share ownership of objects. Group profiles can simplify many user administration tasks by allowing you to apply a single change to many users.
For more information on user profiles, see "Chapter 4. User Profiles" in the iSeries™ Security Reference.