Impersonation allows a site admin access to all the folders on the platform, including those that belong to other users. A connection can be created using the username and password of the site admin. This then allows a data source to be created to access a different user’s account without ever having the username or password of that user. This is done by enabling the Run as user option when creating a data source to assign to a policy. When enabled, the Choose a user list displays all the available accounts on the connection available for impersonation. Simply select the account you want to impersonate.
Impersonating Read-Only or Disabled User
When you select to use impersonation when setting up a data source, you can select from any user that displays in the list; however, selecting a read-only or disabled user may cause your scan not to perform as expected.
In this situation, you have several options:
Select a different user: Maybe you selected the read-only or disable user by mistake. Simply select a different user to continue unimpeded.
Update the user within the platform: Someone may be able to log into the platform and update the user.
Continue with the selected user: The scan may perform properly with the selected user. You can attempt to continue with the selected user.
Note that different platforms treat read-only and disabled users differently. For example, if Syncplicity is your source platform and you set up your data source to impersonate a read-only user, the scan will not run because Syncplicity will throw an error as soon as SkySync tries to access any data. If you set up the data source impersonating a disabled Syncplicity user, the scan will run since SkySync will be able to access the data.