User Impersonation and View Permissions in 15Five

At 15Five, protecting employee data is a top priority. While admins and leaders may need to see information as another person for troubleshooting or support, 15Five does not allow user impersonation. Instead, the platform provides secure tools for previewing or viewing specific data, always scoped to the appropriate permissions.

In this article, you will learn:


What is user impersonation?

User impersonation would mean logging in or acting as another user—submitting Check-ins, changing account settings, or accessing their account with full control.

➡️ This is not possible in 15Five.

To protect privacy and ensure compliance, no admin or user can impersonate another account.


What does 15Five support instead?

Rather than impersonation, 15Five provides controlled preview and view permissions so authorized users can safely access relevant data. These preview and view features are designed to support organizational needs while protecting data.

  • Privacy: Employee data is never exposed beyond authorized roles.

  • Accuracy: You see exactly what the intended user would see.

  • Compliance: Access stays aligned with organizational permissions and security standards.

Preview Review Template from Participant's Perspectives

  • Who has access? Review Admins

  • What it does: See what a participants’s Best-Self Review® questions will look like from the reviewer’s side, before the review is submitted. This helps you ensure clarity and consistency in how review questions appear to different types of participants. To understand more about how to do this, see the View question templates from employee perspectives article.

View Engagement Survey Results As Another User

  • Who has access? HR Admins

  • What it does: The View Results As tool lets you see Engagement survey results from the perspective of another user (e.g., a Limited Access Leader). This ensures accuracy before results are shared. To understand more about this, see the Preview Engagement results as another person article.

Permission-Based Access

  • Who has access? Depends on assigned roles and permissions

  • What it does: Sensitive data, including Engagement results, is always limited to the access level defined by your role. Any broader visibility requires explicit permissions or role assignment. To understand more about the different roles and permissions within 15Five, see this article.


💡 Tip: If you’re unsure whether you should have access to a specific view or dataset, reach out to your company’s HR Admin or Account Administrator.

Was this article helpful?

We're sorry to hear that.

Please tell us why →