A feature that is often requested is the ability for a privileged user to impersonate another user’s account. If you aren’t familiar with that, it just means that the privileged account wants to be able to see exactly what that other user sees on the same screens when they logon. It is primarily used for support purposes to assist the impersonated account. We’ve designed this feature in different iterations but it comes with a lot of education and security risks that must be addressed.
I share some observations and thoughts on how to be successful when adopting Mendix into your SAP shop!
Last week, I along with other leaders in our Rapid App Dev practice joined Mendix in Rotterdam for their #MxWorld2019 event. If you’ve read my other posts, you’ll get a more play by play take on the event and the activities my teammates and I participated in leading up to, during, and after the event. I’ve had a few days to step back and reflect on the event and wanted to share my Top 5 takeaways with you. Let me know if you agree or had a different key takeaway (not surprising if you did as there were many announcements!)
It’s been a few months since I posted anything and I need to change that. So first order of business it to talk about the exciting travel planned for later this week! #MendixWorld2019
When I reach out and ask the community what they would like me to share, I primarily get asked for Best Practices. For a time I have rejected the idea of sharing those in too much detail as I consider Best Practices to be part of the value proposition of a consultant practice. It's taken years to forge and sharpen those practices and they therefore have value. We continue to challenge those and update as new scenarios, tools, and skills evolve over time. But I continued to think about this and have had a change of opinion.