User Impersonation
  • 01 Jul 2024
  • 2 Minutes to read
  • Dark
    Light
  • PDF

User Impersonation

  • Dark
    Light
  • PDF

Article summary

This article reviews the User Impersonation feature. User Impersonation is used to verify a specific User's permissions and access within the system.


Impersonation Overview

User Impersonation allows Users to navigate through the system with the same accesses as another active User. This tool is frequently used to check a specific User's Permissions and confirm that their accesses are properly assigned. 

The start of each Impersonation Session is logged in the Audit Log. During an Impersonation Session, the Impersonating User will be able to perform any action the User being impersonated could. All actions performed during the Impersonation Session will be recorded as being performed by the Impersonating User and not the User being Impersonated. 

Only Users with the following Permission will be able to initiate User Impersonation:

  • Administration → Users → Create & Impersonate Users

It is not possible to Impersonate Users that have accesses that the Impersonating User does not have, including Permissions, Locations, and Reports. An error message will indicate why the Impersonation Session was not initiated.


Impersonation Sessions

Initiating Impersonation

Impersonation is initiated from User Records

Only active Users can be impersonated

Follow these steps to initiate a User Impersonation Session:

  1. Open the User Record for the desired User

  2. Close all other R365 tabs. If any open tabs are not accessible by the User being impersonated, the Impersonating User will be automatically logged out.

  3. Click 'Impersonate' on the right side of the User Record header.

    It is not possible to Impersonate Users that have accesses that the Impersonating User does not have, including Permissions, Locations, and Reports.
     

  4. Confirm that Impersonation is intended


    The system will refresh and log in as the Impersonated User. Impersonation Sessions are indicated with a yellow bar at the top of the page.

Exiting Impersonation

To exit an Impersonation Session, click 'Exit Impersonation' in the yellow bar at the top of the page.

The system will refresh and log back in with the Impersonating User's original credentials.


Impersonation Audit Log

The start and end of each Impersonation Session is logged in the Audit Log. 

Selecting the Record Type 'User' and the Event Type 'Impersonated' will list all Impersonation Sessions.

The User who initiated the Impersonation Session is listed in the 'User' column, and the User who was impersonated is listed in the 'Description' column.

During Impersonation Sessions, the Impersonating User will be able to perform any action the User being impersonated could. All actions performed during the Impersonation Session will be recorded in the Audit Log as being performed by the Impersonating User and not the User being impersonated.


Was this article helpful?