Impersonation
- 1 minute to read
- Print
- DarkLight
- PDF
Impersonation
- 1 minute to read
- Print
- DarkLight
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
This feature allows you to choose a credential in your access group to perform the elevation. Impersonation eliminates any need to use the selected credential password in the process, preventing password leaks.
Caution
The credential must exist and be usable on the workstation.
Impersonate a credential
- Access the workstation desktop of the user.
- Start the Core application.
- Click on the Run menu.
- Select one of the applications from the application list.
- Right-click and select Run as user.
- Click Select after choosing the credential you want to impersonate.
Was this article helpful?