Often times when configuring security roles for user groups or when
troubleshooting issues for end users, we would need to mimic the security of the
user. While this works, it's time consuming and requires manual steps and
verification to make sure all the security of our user record