3 Replies Latest reply on Feb 20, 2015 3:04 AM by Bernd Alheit

    Impersonating another user

    frankiem20444946

      In a business environment, how it is possible to stop a staff member impersonating another staff member?

       

      For example, it is possible for staff X to create a signature specifying staff Y's details (Name, email address). Then staff X could sign the document using the signature that impersonates staff Y.