Impersonation
Introduction
What is Impersonation?
When to Use Impersonation
Troubleshooting Issues
Reviewing Setup
Configuration Review
How Impersonation Works
Starting an Impersonation Session
During Impersonation
Ending Impersonation
Best Practices
Before Impersonating
During Impersonation
After Impersonating
Security and Privacy
Audit Trail
Appropriate Use
User Notification
Limitations
What You Can't Do
View-Only Access
Things to Know
Last updated