Impersonation
  • 1 minute to read
  • Dark
    Light
  • PDF

Impersonation

  • Dark
    Light
  • PDF

Article summary

This feature allows you to choose a credential in your access group to perform the elevation. Impersonation eliminates any need to use the selected credential password in the process, preventing password leaks.

Caution

The credential must exist and be usable on the workstation.


Impersonate a credential

  1. Access the workstation desktop of the user.
  2. Start the Core application.
  3. Click on the Run menu.
  4. Select one of the applications from the application list.
  5. Right-click and select Run as user.
  6. Click Select after choosing the credential you want to impersonate.

Was this article helpful?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.