To facilitate troubleshooting, Deployment Automation enables you to impersonate other users and view information on behalf of those users.
Requirements and limitations
The following requirements and limitations apply to user impersonation:
To impersonate a user, you need the Impersonate user permission. Administrators have this permission by default. For details, see Server roles and system security.
While impersonating a user, you can view information but cannot perform tasks or make changes on behalf of that user.
While impersonating a user, you can view only the elements and functions that are enabled for the user's role.
You can open one impersonation session at a time. To impersonate several users, open Deployment Automation in a private browsing mode or in different browsers.
Set up impersonation
You set up impersonation in your Deployment Automation user profile.
To impersonate a user:
In Deployment Automation, click the User Profile icon at the top right.
Note: If you do not have permission to impersonate users, the Impersonate button is not displayed. As an administrator, you can grant permission in Administration > Security > Role Configuration > DA Server. Edit the relevant role and add the Impersonate user permission. For details, see Create and edit roles.
In the Impersonate dialog box, select the user to impersonate, and click Submit.
The User Profile icon with an asterisk and a red outline indicates that you have started the impersonation session.
To close the impersonation session, click the User Profile icon and then click End Impersonation.