This article reviews the User Impersonation feature. User Impersonation is used to verify a specific User's permissions and access within the system.



Article Topics:


Impersonation Overview


User Impersonation allows Users to navigate through the system with the same accesses as another active User. This tool is frequently used to check a specific User's Permissions and confirm that their accesses are properly assigned. 


The start of each Impersonation Session is logged in the Audit Log. During an Impersonation Session, the Impersonating User will be able to perform any action the User being impersonated could. All actions performed during the Impersonation Session will be recorded as being performed by the Impersonating User and not the User being Impersonated. 


Only Users with the following Permission will be able to initiate User Impersonation:

  • Administration → Users → Create & Impersonate Users


It is not possible to Impersonate Users that have accesses that the Impersonating User does not have, including Permissions, Locations, and Reports. An error message will indicate why the Impersonation Session was not initiated.


Impersonation Sessions


Initiating Impersonation


Impersonation is initiated from User Records

  • Note: Only active Users can be impersonated


Follow these steps to initiate a User Impersonation Session:


  1. Open the User Record for the desired User

  2. Close all other R365 tabs. If any open tabs are not accessible by the User being impersonated, the Impersonating User will be automatically logged out.

  3. Click 'Impersonate' on the right side of the User Record header.
    • Note: It is not possible to Impersonate Users that have accesses that the Impersonating User does not have, including Permissions, Locations, and Reports.



  4. Confirm that Impersonation is intended



    The system will refresh and log in as the Impersonated User. Impersonation Sessions are indicated with a yellow bar at the top of the page.



Exiting Impersonation


To exit an Impersonation Session, click 'Exit Impersonation' in the yellow bar at the top of the page.


The system will refresh and log back in with the Impersonating User's original credentials.


Impersonation Audit Log


The start and end of each Impersonation Session is logged in the Audit Log. 


Selecting the Record Type 'User' and the Event Type 'Impersonated' will list all Impersonation Sessions.




The User who initiated the Impersonation Session is listed in the 'User' column, and the User who was impersonated is listed in the 'Description' column.



During Impersonation Sessions, the Impersonating User will be able to perform any action the User being impersonated could. All actions performed during the Impersonation Session will be recorded in the Audit Log as being performed by the Impersonating User and not the User being impersonated.