Hi Karthik,



Yes , I have gone through this article .


I just wants to clear my doubt :


Does the Impersonated User will also have the readonly access to table?