Impersonate users
Available in versions: 6.3.4
To facilitate troubleshooting, Deployment Automation enables you to impersonate other users and view information on behalf of those users.
Requirements and limitations
Consider the following requirements and limitations for user impersonation:
-
To impersonate a user, you need the Impersonate user permission. Administrators have this permission by default. For details, see Server roles and system security.
-
While impersonating a user, you can view information but cannot perform tasks or make changes on behalf of that user.
-
While impersonating a user, you can view only the elements and functions that are enabled for the user's role.
-
You can open one impersonation session at a time. To impersonate several users, open Deployment Automation in a private browsing mode or in different browsers.
Set up impersonation
You set up impersonation in your Deployment Automation user profile.
To impersonate a user:
-
In Deployment Automation, click the User Profile icon at the top right.
-
Click Impersonate.
Note: If you do not have permission to impersonate users, the Impersonate button is not displayed. As an administrator, you can grant permission in Administration > Security > Role Configuration > DA Server. Edit the relevant role and add the Impersonate user permission. For details, see Create and edit roles.
-
In the Impersonate dialog box, select the user to impersonate, and click Submit.
The User Profile icon with an asterisk and a red outline indicates that you have started the impersonation session.
To close the impersonation session, click the User Profile icon and then click End Impersonation.
See also: