Impersonation
  • 1 minute to read
  • Dark
    Light
  • PDF

Impersonation

  • Dark
    Light
  • PDF

Article Summary

This feature allows you to choose a credential in your access group to perform the elevation. Impersonation eliminates any need to use the selected credential password in the process, preventing password leaks.

Caution

The credential must exist and be usable on the workstation.


Impersonate a credential

  1. Access the workstation desktop of the user.
  2. Start the Core application.
  3. Click on the Run menu.
  4. Select one of the applications from the application list.
  5. Right-click and select Run as user.
  6. Click Select after choosing the credential you want to impersonate.

Was this article helpful?

What's Next