A user of a client can access an application using privileged credentials without having direct access to or knowledge of the privileged credentials. The user's access to the application can also be monitored using a custom protocol including recording the user's interactions with the application while logged in with the privileged credentials.