Issue
- Impersonation is a powerful feature of Liferay. This article serves to answer the following questions regarding its security.
-
Who triggers the impersonation request?
-
How long that kind of access will be used?
-
What audit controls are in place for the use of this feature?
- How you control and assure the feature is just used by the authorized person?
Environment
- DXP 7.2+
Resolution
-
Who can trigger the impersonation request?
How we control and assure the feature is just used by the authorized person for the authorized ends?
This feature is only available for users that have the correct permissions. You can find out what roles have permission to use this feature underControl panel -> Users and Organizations -> Roles -> Select a role you want to review -> Define permissions
From the categories selectControl panel -> Users and Organizations -> Users
and under Resource permissionsImpersonate
should be there. Users who use a role that allows them to impersonate will be able to use this feature. -
What audit controls are in place for the use of this feature?
Control Panel -> Configuration -> Audit
you can see if anIMPERSONATION
request has been sent. If you click on this event you will be able to see the user that initiated the impersonation request and the impersonated user's username and id in the additional information field. -
How long that kind of access will be used?