| Availability |
Odoo Online
Odoo.sh
On Premise
|
| Lines of code | 711 |
| Technical Name |
user_impersonation |
| License | LGPL-3 |
| Website | https://stonerstudios.com/en/ |
| Availability |
Odoo Online
Odoo.sh
On Premise
|
| Lines of code | 711 |
| Technical Name |
user_impersonation |
| License | LGPL-3 |
| Website | https://stonerstudios.com/en/ |
User Impersonation
Secure user impersonation for support and debugging
Overview
User Impersonation enables system administrators to temporarily log in as other users for customer support, debugging, and testing purposes. Every impersonation session requires a mandatory audit reason and is fully logged with IP address tracking.
Key Features
- 🔐 Secure Access Control — Only system administrators can impersonate users
- 📝 Mandatory Audit Reasons — Every session requires a documented reason
- 🛡️ Rate Limiting — Maximum 5 attempts per minute to prevent abuse
- ⏱️ Session Timeout — Automatic logout after 1 hour
- 📊 Complete Audit Trail — All sessions logged with timestamps, IP address, and reason
- 🎯 Visual Indicators — Orange banner and systray icon during impersonation
- 🌍 Multilingual — Available in English and Spanish
How to Use
Starting Impersonation
- Navigate to Settings → Users & Companies → Users
- Select any user (except administrators or yourself)
- Click the "Impersonate User" button
- Enter a mandatory reason for the audit trail
- Click Confirm
💡 Tip: You can also start impersonation from the user list view for quick access.
During Impersonation
- An orange banner appears at the top showing current impersonation status
- A systray indicator displays in the top-right corner
- All actions are performed as the impersonated user
- Session automatically expires after 1 hour
Stopping Impersonation
Click the "Stop Impersonation" button in either:
- The orange banner at the top of the screen, or
- The systray indicator dropdown in the top-right corner
Viewing Audit Logs
Access complete impersonation history at:
Settings → Technical → User Impersonation → Logs
Each log entry includes:
- Administrator who performed the impersonation
- Target user who was impersonated
- Start and stop timestamps
- Session duration
- Reason for impersonation
- IP address for forensic analysis
Security & Permissions
Security Features
- ✓ Only users with Administration / Settings permissions can impersonate
- ✓ Cannot impersonate other administrators (system protection)
- ✓ Cannot impersonate yourself
- ✓ Rate limiting: Maximum 5 attempts per minute
- ✓ Session timeout: Automatic logout after 1 hour
- ✓ IP address logging for forensic analysis
- ✓ Mandatory audit reasons for compliance
⚠️ Best Practices
- Always document the reason for impersonation
- Inform users when accessing their account for support
- Minimize impersonation time — only stay as long as necessary
- Review audit logs regularly to ensure proper usage
Support
This module is developed and maintained by Stoner Studios.
📧 For support, contact us at support@stonerstudios.com
Please log in to comment on this module