Skip to main content

User Impersonation

Feature availability

User Impersonation is a Beta feature and is currently behind the PL_ENABLE_USER_IMPERSONATION feature flag. Contact Harness Support to enable the feature.

User Impersonation allows account administrators to temporarily act as another user in the account, including other admins without needing their password. This feature is especially useful for troubleshooting, and verifying if a user has the intended set of permissions.

By impersonating a user, Account admins can see exactly what that user sees and perform actions on their behalf.

Prerequisite

How to Impersonate a User

  1. Navigate to Account Settings, Access Control and select Users.

  2. For the user you want to impersonate, click the vertical ellipsis icon (:) on the right, and select Impersonate User.

    impersonate-user

  3. For each impersonation session, you must provide a valid reason. Once entered, click Start Impersonation to begin the session.

    impersonate-reason

  4. The impersonation session lasts 30 minutes. A banner at the top of the screen shows the remaining time for the session.

    impersonate-popup

  5. To end the impersonation session midway, click the End Session button on the top banner.

  6. When the session ends, a prompt appears giving you the option to either Restart Session or Quit.

    end-impersonate-session

Impersonation session audit events

The Start impersonation audit event is triggered at the beginning of an impersonation session, while the End impersonation audit event occurs when the session concludes or times out.

All audit events fired during the impersonation session are tagged with the impersonator and impersonated user details. These can be viewed in the Audit Trail page.

The Action column shows the activity, while the User column indicates who was impersonated and by whom.

audit-trail

Important Note
  1. The Impersonate User option is available only at the Account scope.
  2. Only users that have logged in at least once can be impersonated.
  3. The following are not supported during an impersonation session: