The Impersonate User capability allows someone with proper credentials to impersonate another user to carry out EnterWorks tasks with the impersonated user's security credentials. The actions of the impersonator are logged and auditable.
Users are securable objects, so someone impersonating a user must have read access for that user. Also, for security reasons, users who belong to the system administration group are prevented from being able to impersonate the EnterWorks system user.
To configure user impersonation: