Impersonation

In this article, you will learn how to perform a change of identity and log in to a user's account.

Finn Wesseloh avatar
Written by Finn Wesseloh
Updated over a week ago

Which permissions are required?

Hub Owner


This article answers the following questions:

What is impersonation?

How do I perform an impersonation?

What happens during impersonation?


What is impersonation?

Impersonation, also known as identity switching, allows an administrator to log in to another user's account in the hub without knowing the user's password. This enables the administrator to understand the user experience, diagnose issues, and provide real-time support without the user needing to disclose their password. The administrator has full access to the user's functions and corresponding authorizations and can make changes on the user's behalf. The user account of the user is excluded from this. For example, it is not possible to change the MFA settings or an e-mail address.

Impersonation can be useful in various scenarios, for example:

  1. Technical Support: Administrators can resolve issues and assist users by logging into their accounts directly to identify and resolve problems.

  2. Training: Administrators can experience Falcon from the users' perspective to tailor training and provide assistance.

  3. Authorization Management: Administrators can conduct audits and ensure that users have the correct access rights by reviewing their accounts.


How do I perform an impersonation?

  1. Open the administration via the cogwheel in the lower-left corner.

  2. Right-click on the corresponding user.

  3. Select "Sign in as (User)".

    Once you have completed these steps, you have successfully logged in as the corresponding user. To exit impersonation, follow these steps:

  4. Click on the user management in the lower-left corner.

  5. Select "Leave Impersonation"

    This will successfully exit the impersonation, and you will be logged back into your own account in Falcon.


    โ€‹


What happens during impersonation?

During impersonation, you directly enter the user's profile and can make changes on behalf of the user. All mails that are triggered during the identity change are also sent to the impersonated user, e.g. reports or created exports. The user will once be notified of the impersonation via email in the following standardized format:



Did this answer your question?