Key questions about this property
The answers below summarize the purpose, scope, default effect, and review scenarios for this property.
| What does it do? |
This property, when set to true, restricts impersonated users from accessing HR data, ensuring that sensitive information remains protected. |
| What area does it affect? |
Human Resources: Core |
| What does the default mean? |
The default value is "false", which means this behavior is disabled by default. |
| When should you review it? |
Review this property when configuring user access to sensitive HR information or during security audits. |
Out of the box property record
Raw metadata from the property record.
| Property name |
sn_hr_core.impersonateCheck |
| Sys ID |
7a5330019f22120047a2d126c42e70f0 |
| Type |
boolean |
| Application |
Human Resources: Core |
| Default value |
false |
| Description |
If true, ACLs check if the user is being impersonated. |
| Updated |
2017-09-14 17:43:00 |
Sources
Official references and nearby text excerpts where this property appears.
Context preview
Snippet 1
... number of attempts allowed before the application exits when creating a user. sn_hr_core.hr_vip_default_priority The default priority on cases that the Opened for and/or Subject person is tagged as a VIP. sn_hr_core.impersonateCheck Check Yes (true) to prevent any user impersonating another user from viewing HR information. Note: Even if the logged in user has HR access and impersonates another HR user with ...
Context preview
Snippet 2
... an account. This permission can be set at the application level by creating a system property specific to the application. These system properties use the .impersonateCheck naming format (for example sn_hr_core.impersonateCheck. Create a system property with a value of true to prevent users from accessing the application-specific data belonging to another user when impersonating an account. NOTE: Not all applications are ...
Related properties