3. The problem
You need to run something as someone
other than yourself
4. The problem
You need to run something as someone
other than yourself
You want to maintain control over who
has privileges.
5. The problem
You need to run something as someone
other than yourself
You want to maintain control over who
has privileges.
You’d like auditing of who’s doing what.