Support Account Settings
Set Support accounts and use impersonation for remote access
From time to time, you may want to have a support representative log on to your tenant for troubleshooting, configuration assistance, or other activities.
To control access to your tenant, the system includes several levels of support, which you lock or unlock as needed, for example:
- Support-Level1— Reserved for Integration Consultants
- Support-Level2— The medium level of support
- Support-Level3— The highest level of support
Depending on your needs, you unlock a specific level and the appropriate support representative logs on to your tenant, enters a reason ticket number for the access, and addresses the issue. When the issue is resolved, you can lock the support level.
In some cases, customer support requests require assistance from Engineering. Because of this, the following Engineering support levels are also available:
- Engineering Support User 2— The same as Support-Level1 in addition to read-only access to Setup pages with View option
- Engineering Support User 3— The highest level of support with full access
If you do not want any outside access, you can lock all levels.
Lock and unlock a support level
To lock and unlock a support level
- From the Main Menu, navigate to .
-
From the Support Account Settings page, select a support level and click
Edit
. - On the Editing page, select Locked or Unlocked from the Status box.
- Click Save.
Allow proxy access for remote assistance
Sometimes the best way to resolve an issue is for the user to allow Support Personnel to access the user's environment. With the user's permission, Support Personnel (Support-Level as well as local administrators with the Super Access Function Access Profile) can use a proxy access to get first-hand experience of the user's issue and provide a resolution. Complete the following steps:
- The ability for your tenant to use proxy access functionality is activated by Tenant Administration and a Support-Level account must be unlocked.
- Proxy access can only be used for WFM.
- The local administrator who can use proxy access must have the Super-Access Function Access Profile.
- There are no different levels of access in proxy access.
Complete the following steps:
Step 1: Enable the proxy access functionality
If your environment is configured to allow this functionality, complete the following steps:
- From the Main Menu, select .
- From the Application Setup page, expand System Configuration and select System Settings.
- Select the Security tab.
- Set the site.security.impersonation.allowed setting to true.
- Click Save.
Step 2: Modify Function Access Profile of employees who can grant access
Set the Impersonation access control point (ACP) for employees who can grant access to their environment. This ACP is set automatically for administrators with Super Access.
- From the Main Menu, select .
- Expand Access Profiles and select Function Access Profiles.
-
On the Function Access Profiles page, select the profile of the user who needs to grant proxy access and click
Edit.Note: To identify an employee's Function Access Profile, select from the Main Menu. Select an employee and expand Access Profiles in the Employee section.
- On the Edit Function Access Profile page, expand Employee and set Impersonation to "Allowed."
- Click Save.
Step 3: Employee grants access to Support or Administrator
The employee can now grant access to Support or a local system administrator by doing the following:
- Log on to the system.
-
At the top of the Main Menu, click
Settings
Edit Profile. -
Expand
CustomerSupport Access and select one of the following options:
My System Administrator
- No access
- Allow for one day
- Allow for three days
Global Support
- No access
- Allow for one day
- Allow for three days
- Click Save.
Step 4: Administrator or Support person accesses the user's environment
Depending on who the user granted access, the system administrator or Support personnel can now access the user's environment. The user must log off and the Support person or administrator does the following:
- Log on to the system with your logon credentials — Support-Level user or administrator with Super Access.
-
Enter the reason for your access in the
Reason field.
Your home page opens and the names of the people who granted you proxy access are now listed in the Edit Profile area at the top of the Main Menu,
-
Select the name of the person to access. The name of that person displays immediately below your name at the top of the Main Menu, for example:
Sean Ivan Acting as Tina Edwards
- At this point, you are looking at environment of the end user and can work to resolve the issue.
- When finished, log off. Any changes you made to the user's environment remain effective when user logs on.
Audit trail
The following Audit Reports track all access made by the impersonator, for example:
Action |
Audit Report |
Audit Type Listed in Report |
---|---|---|
Lock/unlock Support-Level accounts |
Configuration Audit Report |
System Settings |
Grant access |
People Audit Report |
Impersonation |
Initiate proxy access |
Security Audit Report |
Impersonation |
Actions performed while using proxy access |
Applicable report for proxy access |
Proxy Access person's name as User name |