If an administrator has an additional role with sufficient rights, then he can impersonate users for testing purposes. When doing this, the administrator has access to exactly what that user can access in the system. His roles and groups are equal to the roles and groups of the user impersonated, including the same UI layout. The instance records all the impersonator's activities while impersonating another user as having been done by another user (with the caveat that it was within the impersonation session).
Impersonate a user
Tip |
---|
Before you begin Role required: impersonator |
To impersonate a user, please complete the steps below:
- Start typing the name of the user you need to impersonate; once it appears in the selection field, select it.
- To return to your original login session, follow the same steps then select your name in the field.
Impersonation logs
Impersonations are logged in the System History storage, like any other user activity. But the system point that the action was made within the impersonation session, so the impersonated user name will be specified in the Username column, and impersonator username will be specified near it in brackets like displayed on screenshot below.