If an administrator has an additional role with sufficient rights, then he can impersonate users for testing purposes. When doing this, the administrator has access to exactly what that user can access in the system. His roles and groups are equal to the roles and groups of the user impersonated, including the same UI layout. The instance records all the impersonator's activities while impersonating another user as having been done by another user (with the caveat that it was within the impersonation session).
Role required: impersonator. |
To impersonate a user, please complete the steps below:
When you try to impersonate a user who is locked out or is inactive, the system generates a warning message and interrupts a process. To go on, you need to activate this user first. |
Impersonations are logged in the System History storage, like any other user activity. But the system point that the action was made within the impersonation session, so the impersonated user name will be specified in the Username column, and impersonator username will be specified near it in brackets like displayed on screenshot below.