Restricting Sensitive Data Access During Impersonation in VR and SIR
We want to limit users with the impersonate role (which includes admins and certain non-admins) from accessing sensitive data in VR and/or SIR applications when impersonating other users. Use Case:A remediation owner is assigned a critical, exploitab...
