Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »

Impersonation allows a site admin access to all the folders on the platform, including those that belong to other users.  A connection can be created using the username and password of the site admin. This then allows a data source to be created to access a different user’s account without ever having the username or password of that user. This is done by enabling the Run as user option when creating a data source to assign to a policy. When enabled, the Choose a user list displays all the available accounts on the connection available for impersonation. Simply select the account you want to impersonate.

Impersonating Read-Only or Disabled User

When you select to use impersonation when setting up a data source, you can select from any user that displays in the list; however, selecting a read-only or disabled user may cause your scan not to perform as expected.

In this situation, you have several options:

  • Select a different user: Maybe you selected the read-only or disable user by mistake. Simply select a different user to continue unimpeded.

  • Update the user within the platform: Someone may be able to log into the platform and update the user.

  • Continue with the selected user: The scan may perform properly with the selected user. You can attempt to continue with the selected user.

Note that different platforms treat read-only and disabled users differently. For example, if Syncplicity is your source platform and you set up your data source to impersonate a read-only user, the scan will not run because Syncplicity will throw an error as soon as SkySync tries to access any data. If you set up the data source impersonating a disabled Syncplicity user, the scan will run since SkySync will be able to access the data.

  • No labels