Impersonation
Introduction
Impersonation allows administrators and partners to view Duvo from a user's perspective. This is essential for providing support, diagnosing issues, and understanding what users experience.
What is Impersonation?
When you impersonate a user, you can:
See their assignments and configurations
View their job history and results
Understand their workspace setup
Diagnose issues from their point of view
This helps you provide better support without requiring users to share screenshots or describe their setup in detail.
When to Use Impersonation
Troubleshooting User Issues
When a user reports a problem:
Impersonate to see exactly what they see
Reproduce the issue in their context
Identify the root cause
Provide specific guidance
Onboarding Support
When helping new users:
Review their initial setup
Check their first assignments
Identify configuration issues
Guide them to best practices
Configuration Review
When auditing or optimizing:
Review how assignments are configured
Check connections
Verify settings are appropriate
Recommend improvements
How Impersonation Works
Starting an Impersonation Session
Access the impersonation feature from admin tools
Select the user you need to support
A temporary session is created
You now see Duvo from their perspective
During Impersonation
While impersonating:
You see the user's assignments and runs
You can view their configurations
Actions may be limited to viewing only
The session is logged for security
Ending Impersonation
When finished:
End the impersonation session
Return to your normal view
Document any findings
Follow up with the user as needed
Best Practices
Before Impersonating
Have a clear reason for the impersonation
Inform the user if appropriate
Know what you're looking for
Document the support request
During Impersonation
Focus on the specific issue
Don't browse unnecessarily
Note relevant findings
Respect user privacy
After Impersonating
Document what you found
Communicate findings to the user
Implement or recommend fixes
Update support records
Security and Privacy
Audit Trail
All impersonation sessions are logged:
Who impersonated whom
When the session occurred
Duration of the session
This ensures accountability
Appropriate Use
Impersonation should only be used for:
Responding to support requests
Diagnosing reported issues
Authorized audits and reviews
Onboarding assistance
User Notification
Depending on your organization's policies:
Users may be notified of impersonation
Or impersonation may be logged silently
Follow your organization's guidelines
Limitations
What You Can't Do
During impersonation, you typically cannot:
Make permanent changes to user accounts
Access sensitive credentials
Run assignments on behalf of users
Modify billing or subscription settings
View-Only Access
Impersonation is primarily for viewing:
See what users see
Diagnose issues
Understand configurations
But not make changes for them
Things to Know
Impersonation requires administrator privileges
All sessions are logged for security
Use impersonation responsibly and purposefully
Follow your organization's policies on user privacy
Document findings to improve future support
Last updated