Impersonation requires an Impersonation authentication scheme. This scheme is used as a method for an impersonator to initiate the impersonation process. To begin an impersonation session, an Impersonator directly accesses an .fcc file which is a resource protected by the Impersonation authentication scheme.
Copyright © 2013 CA.
All rights reserved.
|
|