Product SiteDocumentation Site

6.2. Impersonation

Users with sufficient access (controlled by the $g_impersonate_user_threshold configuration option, default: ADMINISTRATOR) can make REST API calls on behalf of another user. Typical use cases include:
To impersonate a user, include the X-Mantis-Username HTTP request header with the username of the target user. The following constraints apply:

6.2.1. Response Headers

Every REST API response includes the following informational headers:
X-Mantis-Username
The username under which the request was executed. When impersonation is active, this reflects the impersonated user's username rather than the caller's.
X-Mantis-LoginMethod
The authentication method used for the request. Possible values are api-token, cookie, and anonymous.