Recently, in some internal systems, I saw a playful "shadow user" (another system called "Avatar Butterfly"). Baidu on the "shadow user" explanation and I am going to write today is not a thing, I also searched some I want to write this thing has a more widely known term, but no fruit. I wonder what you guys saw here?
"Shadow user" means a portal that is open to the system administrator for the status of other users in the system.
Obviously this feature is definitely intended for system developers and is typically used to troubleshoot specific user-related issues.
As a functional platform within the company, you often encounter problems like this:
User: Hello I can't see the XXX node here
Admin: You cut a picture and show me what you saw.
User: "screenshot one"
admin: No, no, no, not here.
User: Embarrassing ... "A screenshot."
Admin: No ... We have to open one more layer and then take a screenshot ...
User: Very complicated ... Why don't I come see you?
admin: OK, I'm in the mansion f2-aw274
User: You are in Beijing ... I am in Shanghai ...
At this time, if the system has "shadow user" function, the administrator only need "Avatar" into the question of the user to operate, you can quickly determine whether the user is not using the correct or the system is really out of the bug.
In addition, in addition to identifying some problems, the "shadow user" function can also quickly incarnate you into a specific user, you can easily observe the configuration preferences of some specific users. (Of course, these configuration preferences will be recorded in the database, but not so intuitive to see the convenience of it)
One more step, jump out of the internal system, take "Renren" to lift a chestnut. First of all I can be sure that the "Renren" of the specific administrator must have the highest privileges of the full web content. But this only says you can see and edit the whole Web content, but you can't be a specific user. Assuming the function of "shadow user", you can be more specific to look at the individual user's configuration preferences, habits and so on. (Here I believe that the user's password information should not be known to the administrator)
The above is only a few points I think of, if you think of "shadow users" can also play a wonderful role in other where, welcome message exchange ~ ~ ~
Finally, I'm just a product of the internal system dog ~ Wang ~
==========update==========
This article to the great program ape eldest brother @duyue looked, told me "Django Userswitch, add a line to achieve the goal." That is to say, "Shadow user" the implementation cost is very low, it seems that the other program ape elder brother can not realize the high cost to reject me ~ ~ ~