The following is a list ofuser groups in the Wikimedia Foundation projects. It is organized in approximate descending order of permissions. Note that the order is not directly correlated to power in the proper sense of the word, but rather refers to technical access in the MediaWiki software. Be aware that, though the technical abilities are the same on all Foundation projects, certain groups' definitions and roles differ from wiki to wiki.
Theabuse filter helpers global group was created to allow its users global access to view the contents ofabuse filters marked as private and their corresponding abuse log entries.
Abuse filter maintainer is aglobal user group assigned bystewards that permits trusted users access to view, and where appropriate, edit abuse filters. This permission is enabled on every public Wikimedia wiki that shares access viaCentralAuth andSUL, and is only to be used for non-controversial maintenance, or by request of the local community. Since users in this group can seriously disrupt Wikimedia wikis if used incorrectly, the abuse filter maintainer permission is only assigned to users who have a strong track record in maintaining abuse filters.
Users within theAPI high limit requestors global user group could have a higher API query limit.
This group offers theapihighlimits user right, and enables a maximum 5000 results when querying via API. Normally, bots and sysops automatically have this right.
Users within theCAPTCHA exemptions global user group won't be prompted toenter CAPTCHAs byExtension:ConfirmEdit, for example when saving a page with new external links in it. This permission is only assigned to users that have demonstrated a need for it. Users may request access to captcha-exempt atSteward requests/Global permissions.
Accepted rationales for granting this right:
Global bots havebot access on all wikis where global bots are enabled (see the list of wikis). Global bots are subject to thestandard bot policy, which limits these bots to specific tasks.
See:
Global deleters help users transition toglobal user pages or manage their user pages crosswiki via theSynchbot service. The group lets members delete and undelete pages on all wikis, and complements theinterface editor group.
Interface editors is a global group that allows its members to modify interface pages and protected templates on all Wikimedia projects. A user may be given this permission if they are a highly experienced js/css/template coder. It should be used only to perform non-controversial tasks. As a rule this permission is assigned for a finite duration—up to a year.
Theglobal IP block exemption is a global group that allows users to bypassglobal IP blocks and rangeblocks.
Users withglobal rollback can revert a series of edits by one user with one click on any wiki, primarily intended for vandalism and nonsense. Users must be demonstrably active in crosswiki counter-vandalism for access.
Global sysops are users with sysop access on multiple small wikis, mainly for the purpose of fighting vandalism in the absence of local administrators. They are appointed after a lengthy discussion onSteward requests/Global permissions.
See:
Global temporary account IP viewers are users with the ability to see temporary account IP addresses on all wikis.
See:
New wikis importers are users who regularly deal with theimport of pages to the new wikis created per thelanguage proposal policy, from their respective test wikis (Incubator,BetaWikiversity orOldWikisource). This is a merely technical routine task that should be done by experienced importers (seethe log of past imports).
Stewards have complete access to the wiki interface, and perform technical implementation of community consensus, deal with emergencies, and intervene against crosswiki vandalism. Stewards are elected annually with participation from all wikis.
See:
VRT permissions agents are users who have access tothe permissions queues of the Wikimedia VRTS. The global group is used primarily for identification purposes, andthe only user right it contains is the ability to activatetwo factor authentication.