Often times when configuring security roles for user groups or when troubleshooting issues for end users, we would need to mimic the security of the user. While this works, it's time consuming and requires manual steps and verification to make sure all the security of our user record matches to