To enhance both security and accountability, we introduced Impersonation Logs in the Admin Center. This new feature provides full visibility into all impersonation activities performed within your organization.
Detailed View of Impersonation Activities
User Being Impersonated
Initiating Admin or Account
Exact Timestamp of Impersonation
This allows administrators to monitor impersonation activity in real time and maintain a detailed audit trail for compliance, internal reviews, or troubleshooting purposes.
By logging and surfacing these actions, we aim to ensure that all administrative access remains transparent, traceable, and secure, helping your organization uphold strong governance standards and build user trust.
Accessing Impersonation Logs
Navigate to Impersonation Logs: Go to your Admin Center > Security > Impersonation Logs.
2. View Detailed Logs: You will see entries for:
User Being Impersonated
User Email (Impersonated)
Impersonation Date and Time
Impersonator Name
Impersonator Email
Impersonation Logs will only display activity from the last 90 days.
Key Benefits
Full Visibility for Support: If a user reports an issue or confusion, Admins can step into their shoes to see exactly what they're experiencing to check and assist.
Audit Trails & Accountability: Every impersonation session can (and should) be logged—who impersonated whom, when, and what actions were taken. This transparency helps prevent abuse.
Compliance & Governance: For organizations bound by regulations (like GDPR or HIPAA), having impersonation features with audit logs helps demonstrate good data governance and compliance readiness.