User impersonation allows authorized users to experience the platform exactly as another user would. When you impersonate another user, you see their exact view and can perform actions as them. This goes beyond simply viewing their work or acting "on
Why It Matters
Enterprise administrators often struggle to help users because they can't see what their users see. Imagine trying to guide someone through a maze while blindfolded – that's the challenge admins face without impersonation. This feature removes that blindfold, letting admins see and interact with exactly what their users see.
Marketing and administrative staff who create content for others also benefit. Instead of creating content and hoping it appears correctly in each user's account, they can verify the presentation and functionality directly from the user's perspective, including actions like social media sharing and print ordering.
Setting Up User Impersonation
Enabling the Feature
- Contact Marq Support of your Customer Success Manager to enable it on your account
- Go to Admin Settings> Team settings, and enable it there.
If you don't have admin access, contact your account representative to enable this feature.
Granting Access
You can grant impersonation privileges in two ways:
Through admin settings:
- Choose which admin roles (Team, Group, or Template Admins) can impersonate users
- These admins automatically receive impersonation rights within their scope
Through individual access:
- Go to a user's profile
- Enable the User Impersonation role in their permissions
Understanding Limitations and Responsibilities
User impersonation comes with significant power and responsibility. Actions taken while impersonating another user can have lasting effects, including irreversible changes like deletions or external communications. The feature intentionally starts with certain restrictions to ensure safe adoption.
Essential practices for responsible use:
- Grant access only to users who truly need it
- Document impersonation usage
- Review access permissions regularly
- Inform users when impersonation features are active
Implementation Guide
Start with these steps for successful implementation:
Begin with a small, trusted group of users to establish good practices. Create clear guidelines about when impersonation should be used – whether for troubleshooting, content creation, or other specific scenarios. Establish clear communication so users know when someone might be impersonating them.
As your organization becomes comfortable with the basic functionality, you can expand both the user base and use cases. Remember that the feature will evolve based on organizational needs and security considerations.
Support
Contact your account representative or support team for:
- Detailed feature availability for your organization
- Help with setup and configuration
- Guidance on best practices
- Troubleshooting assistance
Note: Available features may vary based on your organization's plan and settings.