>
>
> any hint on fast-user-switching or
> applications-interacting-with-container-based-authentication are very
> welcome.
>

Dirk,

We had an app where support staff can login, and then on a special form
enter the username of the person to impersonate and their own password (to
prevent abuse), and the system then allows them to impersonate the user.
Worked well for viewing exactly what the user was seeing when reporting
issues. To do this we used acegi security - has built in support for
impersonation.

HTH

Chris

Reply via email to