// Module included in the following assemblies: // // * users_and_roles/impersonating-system-admin.adoc :_mod-docs-content-type: PROCEDURE [id="impersonation-system-admin-user_{context}"] = Impersonating the system:admin user [role="_abstract"] You can use the OpenShift Console to impersonate a user and select multiple group memberships at the same time to reproduce that user’s effective permissions. .Procedure * To grant a user permission to impersonate `system:admin`, run the following command: + [source,terminal] ---- $ oc create clusterrolebinding --clusterrole=sudoer --user= ---- + [TIP] ==== You can alternatively apply the following YAML to grant permission to impersonate `system:admin`: [source,yaml] ---- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: sudoer subjects: - apiGroup: rbac.authorization.k8s.io kind: User name: ---- ====