What rights do Proxy users have?
Proxy users' rights are not elevated from their standard user rights. There is not a specific Proxy Authentication process, Proxy User password, or even a temporary password for accessing the system.
Proxy User accounts will function exactly as they did when not assigned as a proxy.
We suggest if you are in a position where you're required to complete tasks requiring elevated access, users should choose either a manager, supervisor, or someone with matching access levels.
What can Proxy users do?
There are no specific Proxy user Permissions so they are limited to the ability to accomplish any task that would have otherwise been assigned to the original Destination User they are standing for.
They will utilize the regular client connections and basic login procedures to access their non-proxy accounts as normal.
There is not a specific proxy login process or proxy passwords, so users will be able to use their basic direct logins.
The most common scenarios for using a proxy would be for things like approving access for someone or carrying out a service request task which would have been required by the original user such as, updating a physical document, gathering physical equipment, modifying a user, or fulfilling a step in the provisioning process.
What are common reason someone would use a Proxy?
One of the additional features of assigning a proxy is that you can change it at any time, and set it to only be active for a specific range of time.
Having the flexibility to choose who and when you would like someone to act as your proxy makes them the perfect solution for things like vacations, offsite meetings, or any other scheduling conflict.
In addition, when not designated for a specific event, they are perfect to have a built-in contingency plan in the event of a sudden departure from employment with the company for any reason.