You can configure a rule for impersonation events to start impersonation sessions when resources are accessed.
Follow these steps:
Note: If a realm does not exist for the resources that you want to protect, a rule cannot be created to protect those resources.
Note: Click Help for descriptions of settings and controls, including their respective requirements and limits.
The Effective Resource updates to include the resource.
The Action List populates with impersonation events.
Note: The Allow Access and Deny Access options are disabled. These options do not apply to impersonation events.
The rule is saved and applied to the specified realm and resource.
Copyright © 2015 CA Technologies.
All rights reserved.
|
|