Yes. In essence, they represent just another user whose actions are strictly controlled by permission settings. You determine exactly what they can see and do, and every action they take once logged in is captured in detail.
Yes. In essence, they represent just another user whose actions are strictly controlled by permission settings. You determine exactly what they can see and do, and every action they take once logged in is captured in detail.