Configure User Impersonation - EnterWorks - EnterWorks Process Exchange (EPX) - Precisely EnterWorks - 10.5

EnterWorks Classic Administration Guide

Product type
Software
Portfolio
Verify
Product family
EnterWorks
Product
Precisely EnterWorks > EnterWorks
Precisely EnterWorks
Precisely EnterWorks > EnterWorks Process Exchange (EPX)
Version
10.5
Language
English
Product name
Precisely EnterWorks
Title
EnterWorks Classic Administration Guide
First publish date
2007
Last updated
2023-08-02
Published on
2023-09-20T17:55:59.992423

The Impersonate User capability allows a user with proper credentials to impersonate another user to carry out EnterWorks tasks using the user's security credentials. The actions of the impersonator are logged and auditable.

Note that the impersonator must have read access for the users they impersonate.

Also, for security reasons, users who belong to the system administration group are prevented from being able to impersonate the EnterWorks system user.

The Classic UI is used to give the impersonator the ability to impersonate a user. To enable this feature:

Log into the Classic UI.

  1. Open the Users tab: from the Feature Bar, open Users and Groups, and select Users.

  2. Select the user who will be able to impersonate, open the Action drop-down, and select Impersonate Config.

  3. An Impersonate Config window will appear. Check the Impersonate Enabled checkbox.

  4. After the Impersonate Enabled checkbox is checked, the Available Users by Group and Selected Users can be Impersonated lists will appear. Select a user group the member belongs to.

If the user belongs to the System Administration group, the Impersonate Config window will not include the Available Users by Group and Selected Users can be Impersonated lists because system administrators can impersonate any user.

  1. To add a user who can be impersonated, select their name from the Available Users list and click the right-arrow icon to move the user to the Selected Users can be Impersonated list.

To remove a user who can be impersonated, select their name from Selected Users can be Impersonated list and click the left-arrow icon to move the user to the Available Users list.

  1. Select OK to save your changes and exit, or select Cancel to exit the dialog without saving your changes.