Previous Topic: Add and Remove Global Policy Time RestrictionsNext Topic: Security Considerations for Impersonation


Impersonation

This section contains the following topics:

Impersonation Overview

Impersonation Process

Security Considerations for Impersonation

Configure Impersonation

Sample Implementation of Impersonation

Impersonation Overview

Impersonation provides a method for a privileged user to assume the role of another user without ending the privileged user’s session. This feature facilitates the following:

Impersonation provides a secure solution in the preceding situations. In all cases, passwords are not disclosed to allow one user to impersonate another user.

The following terms are used when describing impersonation:

Impersonated session

A user session created for the purpose of assuming another user's identity.

Impersonatee

The user whose identity is assumed by a privileged user.

Impersonator

The privileged user that is able to assume the identities of other users.

Impersonation authentication scheme

A method for authenticating a user that allows a privileged user to assume the identity of another user while preserving the identity of the impersonator.

Session

Also known as user session. This term is the time between authenticating and logging out.

Session Specification

Also known as the Session Ticket or Session Spec, this term is the information held in a proprietary format on the Policy Server that describes a user and the characteristics of the current session.

SMSESSION

The name of the Web Agent cookie that contains the Policy Server’s Session Specification.

Impersonation Process

The process of impersonating another user consists of the following:

The Policy Server determines whether the impersonator can be impersonated using a series of policies.

The following diagram shows an example of impersonation:

Graphic showing the impersonation process workflow

  1. A customer with a problem calls a CSR. The CSR determines that the best way to solve the problem is to impersonate the customer.
  2. The CSR accesses the impersonation start page (/app/impersonators/startimp.fcc) to begin the impersonation process. The FCC presents a form to the CSR. The CSR provides the name of the customer to be impersonated and other attributes for disambiguation. Within the FCC are directives (not shown) that collect the session specification of the CSR for use by the authentication scheme. The impersonation authentication scheme is invoked on the Policy Server because the target of the FCC resides in a realm that is protected by the impersonation authentication scheme.
  3. The Policy Server takes the information gathered by the FCC and uses it to determine if the customer to be impersonated can be found in any of the configured user directories. If found, the Policy Server determines if the CSR can impersonate the customer, and if the customer may be impersonated. If both are allowed, the Policy Server authenticates the impersonator and the CSR acts as the customer for the duration of the impersonated session.
  4. Tthe Policy Server directs the CSR (impersonating the Customer) to the target of the FCC.