Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. In the banner frame, click your user name to open the user menu.
  2. Select ImpersonateThe Impersonate dialog box appears.
  3. Start typing the name of the user you need to impersonate; once it appears in the selection field, select it.
  4. To return to your original login session, follow the same steps then select your name in the field.
Info

When you try to impersonate a user who is locked out or is inactive, the system generates a warning message and interrupts a process. To go on, you need to activate this user An inactive or locked-out user will be unavailable for impersonation. To impersonate this user, activate or unlock him first.

Impersonation logs

...

Impersonations are logged in the System History storage, like any other user activity. But the system point that the action was made within the impersonation session, so the impersonated user name will be specified in the Username column, and impersonator username will be specified near it in brackets like displayed on the screenshot below.