Previous Topic: Configure an Impersonation Authentication SchemeNext Topic: Basic .fcc Requirements for Impersonation


Enable Impersonation through an .fcc File

A critical part of impersonation is the authentication process using an appropriate authentication scheme and .fcc files. The .fcc files that enable the impersonation authentication scheme are files installed on a CA SiteMinder®-enabled Web server. The files must end in the extension: .fcc. Files with this extension can take advantage of special processing by the Web Agent. The impersonation authentication scheme is similar to an HTML forms authentication scheme.

An impersonator can invoke the impersonation authentication scheme by directly accessing the .fcc file for the scheme. The proper authentication scheme is invoked through the .fcc file’s target parameter. This value can be hard-coded in the .fcc file using the @target directive, or by setting the target (hidden form post variable) to the appropriate Web page.

Note: The target resource must reside in a realm that is protected by the impersonation authentication scheme.