...
- Start typing the name of the user you need to impersonate; once it appears in the selection field, select it.
- To return to your original login session, follow the same steps then select your name in the field.
Impersonation logs
...
Impersonations are logged in the System History storage.