MENU
    User Impersonation
    • 01 Jul 2024
    • 2 Minutes to read
    • Dark
    • PDF

    User Impersonation

    • Dark
    • PDF

    Article summary

    This article reviews the User Impersonation feature. User Impersonation is used to verify a specific User's permissions and access within the system.


    Impersonation Overview

    User Impersonation allows Users to navigate through the system with the same accesses as another active User. This tool is frequently used to check a specific User's Permissions and confirm that their accesses are properly assigned. 

    The start of each Impersonation Session is logged in the Audit Log. During an Impersonation Session, the Impersonating User will be able to perform any action the User being impersonated could. All actions performed during the Impersonation Session will be recorded as being performed by the Impersonating User and not the User being Impersonated. 

    Only Users with the following Permission will be able to initiate User Impersonation:

    • Administration → Users → Create & Impersonate Users

    It is not possible to Impersonate Users that have accesses that the Impersonating User does not have, including Permissions, Locations, and Reports. An error message will indicate why the Impersonation Session was not initiated.


    Impersonation Sessions

    Initiating Impersonation

    Impersonation is initiated from User Records

    Only active Users can be impersonated

    Follow these steps to initiate a User Impersonation Session:

    1. Open the User Record for the desired User

    2. Close all other R365 tabs. If any open tabs are not accessible by the User being impersonated, the Impersonating User will be automatically logged out.

    3. Click 'Impersonate' on the right side of the User Record header.

      It is not possible to Impersonate Users that have accesses that the Impersonating User does not have, including Permissions, Locations, and Reports.
       

    4. Confirm that Impersonation is intended


      The system will refresh and log in as the Impersonated User. Impersonation Sessions are indicated with a yellow bar at the top of the page.

    Exiting Impersonation

    To exit an Impersonation Session, click 'Exit Impersonation' in the yellow bar at the top of the page.

    The system will refresh and log back in with the Impersonating User's original credentials.


    Impersonation Audit Log

    The start and end of each Impersonation Session is logged in the Audit Log. 

    Selecting the Record Type 'User' and the Event Type 'Impersonated' will list all Impersonation Sessions.

    The User who initiated the Impersonation Session is listed in the 'User' column, and the User who was impersonated is listed in the 'Description' column.

    During Impersonation Sessions, the Impersonating User will be able to perform any action the User being impersonated could. All actions performed during the Impersonation Session will be recorded in the Audit Log as being performed by the Impersonating User and not the User being impersonated.


    Was this article helpful?