User Impersonation#

ICE ClusterWare™ users with the AdminWrite permission can impersonate another user, which allows them to complete actions like creating a ticket that appears to originate from another user. See Role-Based Access Control System for details about default roles and permissions.

Run the following command to generate a token for the user you want to impersonate:

scyld-adminctl -i <otheruser> token

Where <otheruser> is replaced by the user ID of the user you want to impersonate.

For example, if user admin1 runs the following command, a token will be generated for user user1:

scyld-adminctl -i user1 token

Note

To use this feature with Keycloak, you first need to enable fine-grained permissions and the "impersonate" feature. Contact Penguin Computing for assistance.