Impersonating System Users
In this article, we'll review Impersonating System Users. For your convenience, three resource types are available:
Click here to download this Quick Reference section as a printable PDF.
Click here or the image below to view a guided demonstration regarding impersonating a user (opens in new tab).
For a complete video overview on impersonating a user, watch the video below.