When you contact Truthlocks support and troubleshooting requires access to your tenant, support staff use impersonation sessions — time-limited, scope-restricted sessions that are fully recorded in your audit log.Documentation Index
Fetch the complete documentation index at: https://docs.truthlocks.com/llms.txt
Use this file to discover all available pages before exploring further.
How it works
Support creates a session
A support staff member creates an impersonation session specifying your
tenant, the required permission scopes, a TTL, and a reason for access.
Sessions can optionally be scoped to a specific organization within your
tenant.
Session is time-limited
Every session has a configurable time-to-live (TTL) between 1 and 60
minutes (defaults to 15 minutes). When the TTL expires, access is revoked
immediately — no manual action required.
Actions are recorded
Every HTTP request the support staff member makes during the session is
recorded in a dedicated access log with the method, path, status code,
and request ID. These events also appear in your tenant’s
audit log.
Session properties
| Property | Description |
|---|---|
| Tenant | The tenant the session grants access to. |
| Organization | (optional) A specific organization within the tenant. When set, access is restricted to that organization’s data only. |
| Scopes | The permissions granted for the session. Defaults to read_only if none are specified. |
| TTL | Time-to-live in minutes (1–60, defaults to 15). |
| Reason | A human-readable explanation of why the session was created (minimum 10 characters). |
| Status | ACTIVE (in use), EXPIRED (TTL reached), or REVOKED (manually ended). |
| IP address | The IP address of the support staff member who created the session. |
| User-Agent | The browser or client used by support staff. |
| Issued at | When the session was created. |
| Expires at | When the session automatically expires, based on the TTL. |
Session lifecycle
- Active — the session is in use and the support staff member has access to the granted scopes.
- Expired — the TTL has been reached and access is automatically revoked.
- Revoked — a platform administrator ended the session early. The administrator’s identity and an optional revocation reason are recorded.
Reviewing support activity
Audit log
All support session activity appears in your tenant’s audit log. Filter by thesupport_session event category to see exactly what was accessed and when.
Per-session access logs
You can also retrieve a detailed access log for a specific session. Each entry records the HTTP method, request path, response status code, and a unique request ID.Security guarantees
Scoped access
Sessions are restricted to specific permission scopes and, optionally, a
single organization. Support cannot access resources outside the granted
scopes.
Time-limited
Every session expires automatically based on its TTL (1–60 minutes).
There are no permanent support access grants.
Full audit trail
Every HTTP request is recorded in the session’s access log with the
staff member’s IP address and User-Agent.
Revocable
Active sessions can be revoked at any time by a platform administrator,
with an optional reason.
Related
Audit logs
View and export your tenant’s audit events.
RBAC
Understand roles and permission scopes.

