diff --git a/Cargo.lock b/Cargo.lock
index 085a315eb2888d6ff50a8c1ca73204a577a7cdf1..d8b36fb54209ceb8b1e7988b365877d08f5654dd 100644
--- a/Cargo.lock
+++ b/Cargo.lock
@@ -1958,6 +1958,7 @@ dependencies = [
  "rstest",
  "serde",
  "ssh-key",
+ "strum",
  "testdir",
  "testresult",
  "thiserror 2.0.11",
diff --git a/Cargo.toml b/Cargo.toml
index 94dd3cb4ae8c60318fac35136abcb4ee9dfd8102..1fd969e3fa7471b51aa1050377117c1424b5c1ec 100644
--- a/Cargo.toml
+++ b/Cargo.toml
@@ -13,6 +13,7 @@ members = [
 [workspace.dependencies]
 chrono = "0.4.38"
 clap = { version = "4.5.23", features = ["derive", "env"] }
+confy = "0.6.1"
 ed25519-dalek = "2.1.1"
 nethsm = { path = "nethsm", version = "0.7.3" }
 nethsm-backup = { path = "nethsm-backup", version = "0.1.0" }
@@ -38,6 +39,7 @@ thiserror = "2.0.4"
 tokio = { version = "1.42.0", features = ["macros"] }
 ureq = "2.12.1"
 uuid = { version = "1.11.0", features = ["v7"] }
+zeroize = { version = "1.8.1", features = ["zeroize_derive", "serde"] }
 
 [workspace.package]
 authors = [
diff --git a/nethsm-config/Cargo.toml b/nethsm-config/Cargo.toml
index c76a3a7730efe51f60a7fd75d45b2765d414acff..4d08c3582276bb0f612f1af8595f735c3e67ca2c 100644
--- a/nethsm-config/Cargo.toml
+++ b/nethsm-config/Cargo.toml
@@ -10,14 +10,15 @@ repository.workspace = true
 version = "0.2.2"
 
 [dependencies]
-confy = "0.6.1"
+confy.workspace = true
 nethsm.workspace = true
 rpassword = "7.3.1"
 rprompt = "2.1.1"
 serde.workspace = true
 ssh-key = "0.6.7"
+strum.workspace = true
 thiserror.workspace = true
-zeroize = { version = "1.8.1", features = ["zeroize_derive", "serde"] }
+zeroize.workspace = true
 
 [dev-dependencies]
 dirs = "6.0.0"
diff --git a/nethsm-config/src/config.rs b/nethsm-config/src/config.rs
index 3612a9b95f03ce427b1d331529ed817c94e7fd6b..58e5ef96d871139f8bdaf9f4b78ad0891d245c3b 100644
--- a/nethsm-config/src/config.rs
+++ b/nethsm-config/src/config.rs
@@ -10,7 +10,14 @@ use std::{
 use nethsm::{ConnectionSecurity, Credentials, KeyId, NetHsm, Passphrase, Url, UserId, UserRole};
 use serde::{Deserialize, Serialize};
 
-use crate::{ConfigCredentials, PassphrasePrompt, SystemUserId, UserMapping, UserPrompt};
+use crate::{
+    ConfigCredentials,
+    ExtendedUserMapping,
+    PassphrasePrompt,
+    SystemUserId,
+    UserMapping,
+    UserPrompt,
+};
 
 /// Errors related to configuration
 #[derive(Debug, thiserror::Error)]
@@ -54,6 +61,10 @@ pub enum Error {
     #[error("No user matching one of the requested roles ({0:?}) exists")]
     NoMatchingCredentials(Vec<UserRole>),
 
+    /// There is no mapping for a provided system user name.
+    #[error("No mapping found where a system user matches the name {name}")]
+    NoMatchingMappingForSystemUser { name: String },
+
     /// Shamir's Secret Sharing (SSS) is not used for administrative secret handling, but users for
     /// handling of secret shares are defined
     #[error(
@@ -1521,8 +1532,20 @@ pub enum AdministrativeSecretHandling {
 ///
 /// Non-administrative secrets represent passphrases for (non-Administrator) NetHSM users and may be
 /// handled in different ways (e.g. encrypted or not encrypted).
-#[derive(Clone, Copy, Debug, Default, Deserialize, Eq, PartialEq, Serialize)]
+#[derive(
+    Clone,
+    Copy,
+    Debug,
+    Default,
+    Deserialize,
+    strum::Display,
+    strum::EnumString,
+    Eq,
+    PartialEq,
+    Serialize,
+)]
 #[serde(rename_all = "kebab-case")]
+#[strum(serialize_all = "kebab-case")]
 pub enum NonAdministrativeSecretHandling {
     /// Each non-administrative secret is handled in a plaintext file in a non-volatile
     /// directory.
@@ -2137,6 +2160,40 @@ impl HermeticParallelConfig {
         self.users.iter()
     }
 
+    /// Returns the [`AdministrativeSecretHandling`].
+    pub fn get_administrative_secret_handling(&self) -> AdministrativeSecretHandling {
+        self.admin_secret_handling
+    }
+
+    /// Returns the [`NonAdministrativeSecretHandling`].
+    pub fn get_non_administrative_secret_handling(&self) -> NonAdministrativeSecretHandling {
+        self.non_admin_secret_handling
+    }
+
+    /// Returns an [`ExtendedUserMapping`] for a system user of `name` if it exists.
+    ///
+    /// # Errors
+    ///
+    /// Returns an error if no [`UserMapping`] with a [`SystemUserId`] matching `name` is found.
+    pub fn get_extended_mapping_for_user(&self, name: &str) -> Result<ExtendedUserMapping, Error> {
+        for user_mapping in self.users.iter() {
+            if user_mapping
+                .get_system_user()
+                .is_some_and(|system_user| system_user.as_ref() == name)
+            {
+                return Ok(ExtendedUserMapping::new(
+                    self.admin_secret_handling,
+                    self.non_admin_secret_handling,
+                    self.connections.clone(),
+                    user_mapping.clone(),
+                ));
+            }
+        }
+        Err(Error::NoMatchingMappingForSystemUser {
+            name: name.to_string(),
+        })
+    }
+
     /// Validates the components of the [`HermeticParallelConfig`].
     fn validate(&self) -> Result<(), Error> {
         // ensure there are no duplicate system users
diff --git a/nethsm-config/src/lib.rs b/nethsm-config/src/lib.rs
index 1c8e7d43bcf762f8dff8c3d383c0cb9e8e1f2d1e..ccccf4a8050ba75a75a78ee04175221cd130ef1e 100644
--- a/nethsm-config/src/lib.rs
+++ b/nethsm-config/src/lib.rs
@@ -73,5 +73,5 @@ pub use credentials::{
     SystemUserId,
     SystemWideUserId,
 };
-pub use mapping::{NetHsmMetricsUsers, UserMapping};
+pub use mapping::{ExtendedUserMapping, NetHsmMetricsUsers, UserMapping};
 pub use prompt::{PassphrasePrompt, UserPrompt};
diff --git a/nethsm-config/src/mapping.rs b/nethsm-config/src/mapping.rs
index 777ad4161de6af94e2942dee70b632406701ef1b..a1c893f3e549adadbbd5b5842ff9338aa125dbbd 100644
--- a/nethsm-config/src/mapping.rs
+++ b/nethsm-config/src/mapping.rs
@@ -1,7 +1,20 @@
+use std::collections::HashSet;
+
+#[cfg(doc)]
+use nethsm::NetHsm;
 use nethsm::{KeyId, SigningKeySetup, UserId};
 use serde::{Deserialize, Serialize};
 
-use crate::{AuthorizedKeyEntry, AuthorizedKeyEntryList, SystemUserId, SystemWideUserId};
+use crate::{
+    AdministrativeSecretHandling,
+    AuthorizedKeyEntry,
+    AuthorizedKeyEntryList,
+    Connection,
+    HermeticParallelConfig,
+    NonAdministrativeSecretHandling,
+    SystemUserId,
+    SystemWideUserId,
+};
 
 /// Errors related to mapping
 #[derive(Debug, thiserror::Error)]
@@ -616,4 +629,122 @@ impl UserMapping {
             } => vec![],
         }
     }
+
+    /// Returns whether the mapping has both system and [`NetHsm`] users.
+    ///
+    /// Returns `true` if the `self` has at least one system and one [`NetHsm`] user, and `false`
+    /// otherwise.
+    pub fn has_system_and_nethsm_user(&self) -> bool {
+        match self {
+            UserMapping::SystemNetHsmOperatorSigning {
+                nethsm_user: _,
+                nethsm_key_setup: _,
+                system_user: _,
+                ssh_authorized_key: _,
+                tag: _,
+            }
+            | UserMapping::HermeticSystemNetHsmMetrics {
+                nethsm_users: _,
+                system_user: _,
+            }
+            | UserMapping::SystemNetHsmMetrics {
+                nethsm_users: _,
+                system_user: _,
+                ssh_authorized_key: _,
+            }
+            | UserMapping::SystemNetHsmBackup {
+                nethsm_user: _,
+                system_user: _,
+                ssh_authorized_key: _,
+            } => true,
+            UserMapping::SystemOnlyShareDownload {
+                system_user: _,
+                ssh_authorized_keys: _,
+            }
+            | UserMapping::SystemOnlyShareUpload {
+                system_user: _,
+                ssh_authorized_keys: _,
+            }
+            | UserMapping::SystemOnlyWireGuardDownload {
+                system_user: _,
+                ssh_authorized_keys: _,
+            }
+            | UserMapping::NetHsmOnlyAdmin(_) => false,
+        }
+    }
+}
+
+/// A [`UserMapping`] centric view of a [`HermeticParallelConfig`].
+///
+/// Wraps a single [`UserMapping`], as well as the system-wide [`AdministrativeSecretHandling`],
+/// [`NonAdministrativeSecretHandling`] and [`Connection`]s.
+#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
+pub struct ExtendedUserMapping {
+    admin_secret_handling: AdministrativeSecretHandling,
+    non_admin_secret_handling: NonAdministrativeSecretHandling,
+    connections: HashSet<Connection>,
+    user_mapping: UserMapping,
+}
+
+impl ExtendedUserMapping {
+    /// Creates a new [`ExtendedUserMapping`].
+    pub fn new(
+        admin_secret_handling: AdministrativeSecretHandling,
+        non_admin_secret_handling: NonAdministrativeSecretHandling,
+        connections: HashSet<Connection>,
+        user_mapping: UserMapping,
+    ) -> Self {
+        Self {
+            admin_secret_handling,
+            non_admin_secret_handling,
+            connections,
+            user_mapping,
+        }
+    }
+
+    /// Returns the [`AdministrativeSecretHandling`].
+    pub fn get_admin_secret_handling(&self) -> AdministrativeSecretHandling {
+        self.admin_secret_handling
+    }
+
+    /// Returns the [`Connection`]s.
+    pub fn get_connections(&self) -> HashSet<Connection> {
+        self.connections.clone()
+    }
+
+    /// Returns the [`NonAdministrativeSecretHandling`].
+    pub fn get_non_admin_secret_handling(&self) -> NonAdministrativeSecretHandling {
+        self.non_admin_secret_handling
+    }
+
+    /// Returns the [`UserMapping`].
+    pub fn get_user_mapping(&self) -> &UserMapping {
+        &self.user_mapping
+    }
+}
+
+impl From<HermeticParallelConfig> for Vec<ExtendedUserMapping> {
+    /// Creates a `Vec` of [`ExtendedUserMapping`] from a [`HermeticParallelConfig`].
+    ///
+    /// A [`UserMapping`] can not be aware of credentials if it does not track at least one
+    /// [`SystemUserId`] and one [`UserId`]. Therefore only those [`UserMapping`]s for which
+    /// [`has_system_and_nethsm_user`](UserMapping::has_system_and_nethsm_user) returns `true` are
+    /// returned.
+    fn from(value: HermeticParallelConfig) -> Self {
+        value
+            .iter_user_mappings()
+            .filter_map(|mapping| {
+                if mapping.has_system_and_nethsm_user() {
+                    Some(ExtendedUserMapping {
+                        admin_secret_handling: value.get_administrative_secret_handling(),
+                        non_admin_secret_handling: value.get_non_administrative_secret_handling(),
+                        connections: value.iter_connections().cloned().collect(),
+                        user_mapping: mapping.clone(),
+                    })
+                } else {
+                    None
+                }
+            })
+            .collect()
+    }
 }