Some complex software systems I have used in the past allow users with higher privileges to impersonate a user with lower privileges without having to know their password. This would be a useful feature in Rhythmyx, especially when using LDAP to authenticate users, as we do.