Getting the current user that is impersonating another user
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-07-2024 10:50 PM
Is there a way besides going to the System Logs mentioned in the below article to identify if the user who is viewing the form is being impersonated by another user?
https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB0717055
So for example, if Beth Anglin is impersonating Abel Tuter and have viewed INCXXXXXXXX. Is there a way in getting Beth Anglin's Sys ID?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-07-2024 11:17 PM
OOB apart from what you see, there is no other way, although you can always create a metric definition around it, but just curious what is the use case, that you want to track impersonations?
Aman Kumar
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-07-2024 11:58 PM
I have a requirement wherein if a fulfiller doesn't have an access to view the catalog item but impersonated another fulfiller, they still shouldn't be able to see the catalog item.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
03-08-2024 01:06 AM
Impersonation means you are logging as other user from your instance, it will not change any thing else. Its like proxy from own machine.
Rest as @Jan Raphael Caa what you shared is the OOTB & available..
If my response proves useful, please indicate its helpfulness by selecting " Accept as Solution" and " Helpful." This action benefits both the community and me.
Regards
Dr. Atul G. - Learn N Grow Together
ServiceNow Techno - Functional Trainer
LinkedIn: https://www.linkedin.com/in/dratulgrover
YouTube: https://www.youtube.com/@LearnNGrowTogetherwithAtulG
Topmate: https://topmate.io/atul_grover_lng [ Connect for 1-1 Session]
****************************************************************************************************************
