Account Impersonation
  • 04 Nov 2021
  • 1 Minute to read
  • Dark
    Light

Account Impersonation

  • Dark
    Light

Article Summary

Overview

An administrator can configure accounts in a Decisions environment with account impersonation privileges. Doing this would allow account one to impersonate account two, including permission levels and access, while still using the credentials of account one. This could be helpful in a situation where a user with base-level account access has tasks that require administrator privileges. An administrator could grant access within their account settings to allow impersonation from another account in the Decisions environment, either indefinitely or for a specified amount of time.

Deactivated accounts cannot be subject to account impersonation.

Example

  1. Login to the Decisions environment as an administrator account. 
  2. In the FOLDERS tree on the left, navigate to System > Security > Accounts. 
  3. In the Accounts list, right-click the name of the account that is going to be impersonated and select Edit Account from the Action Menu.
  4. When the Edit Entity window appears, find the IMPERSONATION INFORMATION section.
  5. Under the Allowed Impersonations box, select ADD NEW.
  6. When the Add Allowed Impersonation window appears, enter the email address of the impersonating account in the Impersonation From Account box.
  7. Use the Set Impersonation To Never Expire to allow indefinite impersonation access.
  8. Use the Start Date/End Date pickers to specify a timeframe with which the account will be allowed impersonation access.
  9. Save the settings once complete and logout of the Decisions environment as the administrator account.
  10. Login to the Decisions environment with the base-level account that was granted impersonation access.
  11. Select the Person icon in the top-right corner of the Portal and choose Login As... from the menu.
  12. When the window appears, select which account should be impersonated (based on the configurations made in the previous steps) and select IMPERSONATE.
  13. After the interface refreshes, a black bar will appear at the top of the environment to signify which account the user is impersonating. At this point, granted permissions will be accessible in the environment.



Was this article helpful?