...
- Start typing the name of the user you need to impersonate; once it appears in the selection field, select it.
- To return to your original login session, follow the same steps then select your name in the field.
Info |
---|
When you try to impersonate a user who is locked out or is inactive, the system generates a warning message and interrupts a process. To go on, you need to activate this user An inactive or locked-out user will be unavailable for impersonation. To impersonate this user, activate or unlock him first. |
Impersonation logs
...
Impersonations are logged in the System History storage, like any other user activity. But the system point that the action was made within the impersonation session, so the impersonated user name will be specified in the Username column, and impersonator username will be specified near it in brackets like displayed on the screenshot below.