Understanding and Using User Impersonation

User impersonation allows authorized users to experience the platform exactly as another user would. When you impersonate another user, you see their exact view and can perform actions as them. This goes beyond simply viewing their work or acting "on

Why It Matters

Enterprise administrators often struggle to help users because they can't see what their users see. Imagine trying to guide someone through a maze while blindfolded – that's the challenge admins face without impersonation. This feature removes that blindfold, letting admins see and interact with exactly what their users see.

Marketing and administrative staff who create content for others also benefit. Instead of creating content and hoping it appears correctly in each user's account, they can verify the presentation and functionality directly from the user's perspective, including actions like social media sharing and print ordering.

Setting Up User Impersonation

Enabling the Feature

  1. Contact Marq Support of your Customer Success Manager to enable it on your account
  2. Go to Admin Settings> Team settings, and enable it there. 

If you don't have admin access, contact your account representative to enable this feature.

Granting Access

You can grant impersonation privileges in two ways:

Through admin settings:

  • Choose which admin roles (Team, Group, or Template Admins) can impersonate users
  • These admins automatically receive impersonation rights within their scope

Through individual access:

  • Go to a user's profile
  • Enable the User Impersonation role in their permissions

Understanding Limitations and Responsibilities

User impersonation comes with significant power and responsibility. Actions taken while impersonating another user can have lasting effects, including irreversible changes like deletions or external communications. The feature intentionally starts with certain restrictions to ensure safe adoption.

Essential practices for responsible use:

  1. Grant access only to users who truly need it
  2. Document impersonation usage
  3. Review access permissions regularly
  4. Inform users when impersonation features are active

Implementation Guide

Start with these steps for successful implementation:

Begin with a small, trusted group of users to establish good practices. Create clear guidelines about when impersonation should be used – whether for troubleshooting, content creation, or other specific scenarios. Establish clear communication so users know when someone might be impersonating them.

As your organization becomes comfortable with the basic functionality, you can expand both the user base and use cases. Remember that the feature will evolve based on organizational needs and security considerations.

Support

Contact your account representative or support team for:

  • Detailed feature availability for your organization
  • Help with setup and configuration
  • Guidance on best practices
  • Troubleshooting assistance

Note: Available features may vary based on your organization's plan and settings.