Impersonate User

Platform managers (with the impersonate user security task enabled) can impersonate other users to see what they see while logged in and to complete actions on another user's behalf. However, some things are off limits:

  • Users with a cloned platform manager role cannot impersonate a user with the original platform manager role.

  • Social security numbers (SSN), credit cards, medical, and other highly secured information is hidden from the impersonator.

  • Some authentication settings are not accessible while impersonating. To set up authentication for your school, log in as the platform manager who has organization admin rights instead of impersonating one.

To impersonate another user, use the People Finder to go to the user's profile in Core. Select Access and then select Impersonate. (See Access.)

Alternatively, select your name in the top menu and then select Impersonate user. Select someone you've recently impersonated (their names appear on the right side), or use Search in plus the Role or Grad year filter options to find and select a user to impersonate.

A blue “banner” appears across the top of the user interface and reminds you who you're acting as. It also highlights the navigational areas which “belong” to the impersonated user versus to you. When you're done, select Stop impersonating.

To view a history of which users have impersonated others, who they impersonated, and when navigate to Core, select Security, then select Impersonation history. For details, see Impersonation history.

If you're testing changes to roles and tasks, consider impersonating a user with the affected role. Remind any real users affected by the changes to sign out and then back in to see the updates.

Tip: Need to take a screen shot or record a video? When you select an area to capture with your recording tool, select the area below the banner or crop the banner out when you edit.

Note: Data regarding which platform managers impersonated another user, who they impersonated, and when, is stored for two years. After two years, the impersonation data history is purged. This data is removed when it is no longer relevant, in accordance with our data retention and security policies.