Shadow user

Source: Internet
Author: User
Keywords Jianshu
Tags configuration developers function internal internal system no fruit open to portal

Recently, in some internal systems, I saw a playful "shadow user" (another system called "Avatar Butterfly"). Baidu on the "shadow user" explanation and I am going to write today is not a thing, I also searched some I want to write this thing has a more widely known term, but no fruit. I wonder what you guys saw here?

"Shadow user" means a portal that is open to the system administrator for the status of other users in the system.

Obviously this feature is definitely intended for system developers and is typically used to troubleshoot specific user-related issues.

As a functional platform within the company, you often encounter problems like this:

User: Hello I can't see the XXX node here

Admin: You cut a picture and show me what you saw.

User: "screenshot one"

admin: No, no, no, not here.

User: Embarrassing ... "A screenshot."

Admin: No ... We have to open one more layer and then take a screenshot ...

User: Very complicated ... Why don't I come see you?

admin: OK, I'm in the mansion f2-aw274

User: You are in Beijing ... I am in Shanghai ...

At this time, if the system has "shadow user" function, the administrator only need "Avatar" into the question of the user to operate, you can quickly determine whether the user is not using the correct or the system is really out of the bug.

In addition, in addition to identifying some problems, the "shadow user" function can also quickly incarnate you into a specific user, you can easily observe the configuration preferences of some specific users. (Of course, these configuration preferences will be recorded in the database, but not so intuitive to see the convenience of it)

One more step, jump out of the internal system, take "Renren" to lift a chestnut. First of all I can be sure that the "Renren" of the specific administrator must have the highest privileges of the full web content. But this only says you can see and edit the whole Web content, but you can't be a specific user. Assuming the function of "shadow user", you can be more specific to look at the individual user's configuration preferences, habits and so on. (Here I believe that the user's password information should not be known to the administrator)

The above is only a few points I think of, if you think of "shadow users" can also play a wonderful role in other where, welcome message exchange ~ ~ ~

Finally, I'm just a product of the internal system dog ~ Wang ~

==========update==========

This article to the great program ape eldest brother @duyue looked, told me "Django Userswitch, add a line to achieve the goal." That is to say, "Shadow user" the implementation cost is very low, it seems that the other program ape elder brother can not realize the high cost to reject me ~ ~ ~

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.