Previous Topic: Configure an Agent to Use startimp.fccNext Topic: Enable Impersonation through an .fcc File


Configure an Impersonation Authentication Scheme

Impersonation requires an Impersonation authentication scheme. This scheme is used as a method for an impersonator to initiate the impersonation process. To begin an impersonation session, an Impersonator directly accesses an .fcc file which is a resource protected by the Impersonation authentication scheme.

More information:

Impersonation Authentication Schemes