User Impersonation#
ICE ClusterWare™ users with the AdminWrite permission can impersonate another user, which allows them to complete actions like creating a ticket that appears to originate from another user. See Role-Based Access Control System for details about default roles and permissions.
Run the following command to generate a token for the user you want to impersonate:
scyld-adminctl -i <otheruser> token
Where <otheruser>
is replaced by the user ID of the user you want to
impersonate.
For example, if user admin1
runs the following command, a token will be
generated for user user1
:
scyld-adminctl -i user1 token
Note
To use this feature with Keycloak, you first need to enable fine-grained permissions and the "impersonate" feature. Contact Penguin Computing for assistance.