Turn User Impersonation Capability On or Off

The Impersonation capability allows a user to assume the identity of another user and navigate throughout PSA as such.

In order to use the feature, it must first be turned on at the organization level by the Master Administrator.

Upon completion of the steps provided in this article, you can:

  • Grant the Can impersonate others Right to a Security Profile. Which allows the Users belonging to the Security Profile the right to impersonate any other Security Profile within the organization. For further details refer to Turning the User Impersonation capability on or off.
  • Then further limit the Security Profiles' impersonation right from the Impersonation Access control. Which gives you granular control over the Approval Group, Functional Group, Master Site, Security Profile and/or User that the Users belonging to the Security Profile can impersonate. For further details refer to Limiting a Security Profiles' impersonation right.

This article details how to turn on the User Impersonation feature for your organization.

Caution:

  • The change(s) made on this page will only be visible upon the User's next login.
  • Only the Master Administrator User Profile has access to the System Configuration page.
  1. From the Icon Bar click Setup .
  2. From the Navigation Menu click Organization.
  3. From the menu click System.
  4. From the System page click the System Setup button to access the System Setup page.
  5. From the System Setup page, click the System Config button.
  6. You can turn off the User Impersonation capability by clearing the box or turn it on by selecting it.
  7. Upon enabling the feature, you can now:
    1. Grant the Can impersonate others right to a Security Profile. for further details refer to Granting the right to impersonate another User.

      Note: When the Enable User Impersonation option is turned on, the Master Administrator and the Administrator profiles can impersonate, while every other security profile have to be granted the security right to do so.

    2. Then further limit the Security Profiles' impersonation right from the Impersonation Access control.
  8. Click Back to return to the previous page.