Impersonate User
Platform managers (with the impersonate user security task enabled) can impersonate other users to see what they see while logged in and to complete actions on another user's behalf. However, some things are off limits:
-
Users with a cloned platform manager role cannot impersonate a user with the original platform manager role.
-
Social security numbers (SSN), credit cards, medical, and other highly secured information is hidden from the impersonator.
-
Some authentication settings are not accessible while impersonating. To set up authentication for your school, log in as the platform manager who has organization admin rights instead of impersonating one.
To impersonate another user, use the People Finder to go to the user's profile in Core. Select Access and then select Impersonate. (See Access.)
Alternatively, select your name in the top menu and then select Impersonate user. Select someone you've recently impersonated (their names appear on the right side), or use Search in plus the Role or Grad year filter options to find and select a user to impersonate.
A blue “banner” appears across the top of the user interface and reminds you who you're acting as. It also highlights the navigational areas which “belong” to the impersonated user versus to you. When you're done, select select Stop impersonating.
Need to take a screenshot or record a video? When you select an area to capture with your recording tool, select the area below the banner or crop the banner out when you edit.
If you're testing changes to roles and tasks, consider impersonating a user with the affected role. Remind any real users affected by the changes to sign out and then back in to see the updates.
View a history of impersonations
To view a history of
-
which users have impersonated other users,
-
who they have impersonated,
-
and when they impersonated the other users
navigate to Core, select Security, then select Impersonation history.
Filter the history by time and search by name. Then use it to review impersonation activity for security or managerial purposes.
For example, identify users who may need their roles and tasks adjusted (to grant them access to features), investigate whether an important action could have been completed by an impersonator, and more.