Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Next »

Impersonation allows a site admin access to all the folders on the platform, including those that belong to other users.  A connection can be created using the username and password of the site admin. This then allows a data source to be created to access a different user’s account without ever having the username or password of that user. This is done by enabling the Run as user option when creating a data source to assign to a policy. When enabled, the Choose a user list displays all the available accounts on the connection available for impersonation. Simply select the account you want to impersonate.

Impersonating Read-Only or Disabled User

When you select to use impersonation when setting up a data source, you can select from any user that displays in the list; however, selecting a read-only or disabled user may cause your scan not to perform as expected.

In this situation, you have several options:

  • Select a different user: Maybe you selected the read-only or disable user by mistake. Simply select a different user to continue unimpeded.

  • Update the user within the platform: Someone may be able to log into the platform and update the user.

  • Continue with the selected user: The scan may perform properly with the selected user. You can attempt to continue with the selected user.

Note that different platforms treat read-only and disabled users differently. For example, some platforms will throw an error when SkySync tries to access the content on a data source set up to impersonate a read-only user. This prevents the scan from running. For the same platform, the scan may work if you set up the data source to impersonate a disabled user since SkySync will be able to access the data.

  • No labels