...
The Gateway's access control mechanism has a provision to allow cluster administrators to log in to a tenant or storage domain and bypass all restrictions contained within that tenant's or domain's policy sub-resource. This can be used to access content where the owner mistakenly cut-off all access and locked out their users. Another example is if the IDSYS for the storage domain has incorrect information within preventing all user logins.
The cluster administrator performs an administrative bypass request by putting an exclamation point "!" before and an at sign "@" after their the username. The form of the user name portion of the login is: "!" + name + "@"
...