Impersonation

The Impersonation capability allows a user to assume the identity of another user and navigate throughout PSA as such. This will facilitate in the configuring of access rights, going through use-cases as different user profiles, and improving the troubleshooting of reported problems experienced by an organization's user base.

  1. The Impersonation feature must first be turned on at the system level. For further details refer to Turning the User Impersonation capability on or off.
  2. You can then grant the Can impersonate others Right to a Security Profile. Which allows the Users belonging to the Security Profile the right to impersonate any other Security Profile within the organization. For further details refer to Granting the right to impersonate another User.
  3. Furthermore, you can limit the Security Profiles' impersonation right from the Impersonation Access control. Which gives you granular control over the Approval Group, Functional Group, Master Site, Security Profile and/or User that the Users belonging to the Security Profile can impersonate. For further details refer to Limiting a Security Profiles' impersonation right.

For further details refer to: