29.0 Impersonation

Impersonation enables a help desk user to perform certain actions on behalf of users without knowing their credentials. The help desk user can log in on behalf of a user and troubleshoot an issue. This helps the help desk user gain access to the user’s existing configuration and perform the necessary actions required for troubleshooting.

With the help of audit events, the user can view the impersonated logs. This also helps determine the details of the impersonator and impersonatee along with the session details.

Example: Let’s suppose Alice encounters an issue and is unable to access a target application. She contacts the help desk user for help. Joe, from the help desk, logs in to Access Manager with his credentials and sends a request to Alice to access her system. When Alice receives the request from Joe, she grants permission. Joe initiates an impersonated session and troubleshoots the issue.

Impersonation Terminology

  • Impersonator: A help desk user authorized to perform impersonation on a user’s setup.

  • Impersonatee: A user whose identity is being impersonated by the help desk user.

  • Impersonated Session: A user session created for an impersonator to perform impersonation.

Topics include: