3 Replies Latest reply on Feb 20, 2015 3:04 AM by Bernd Alheit

    Impersonating another user


      In a business environment, how it is possible to stop a staff member impersonating another staff member?


      For example, it is possible for staff X to create a signature specifying staff Y's details (Name, email address). Then staff X could sign the document using the signature that impersonates staff Y.