Impersonation is used to test changes in system configuration settings and in access rights. Impersonation is also used to demonstrate the implementation of automated processes in different roles.
Role required: impersonator. |
Two following parties are engaged in the Impersonation process:
If a user has the impersonator role, they can impersonate other users. If an administrator has an impersonator role, they can impersonate users and administrators. The impersonator has access to what the user can access in the system, including the same tools, UI layout, etc. The instance records impersonator's activities on behalf of the impersonated user but specifies that it was within the impersonation session.
To impersonate a user, please complete the steps below:
To return to your original login session, please do the following steps:
|
Impersonations are logged in the System History storage, like any other user activity. The system points that the action was made within the impersonation session. The impersonated user name will be specified in the Username column, and the impersonator username will be specified near it in brackets like displayed on the screenshot below.