Impersonation enables a help desk user to perform certain actions on behalf of users without knowing their credentials. The help desk user can login on behalf of the user and troubleshoot an issue. This helps the help desk user gain access to the user’s existing configuration and perform the necessary actions required for troubleshooting.
With the help of audit events, the user can view the impersonated logs. This will also help determine the details of the impersonator and impersonatee along with the session details.
Example: Let’s suppose Alice encounters an issue and is unable to access a target application. She reaches out to the help desk user seeking for help. Joe, from the help desk, logs in to Access Manager with his credentials and sends a request to Alice to access her system. When Alice receives the request from Joe, she grants permission. Joe initiates an impersonated session and troubleshoots the issue.