Previous Topic: Impersonation Event ConfigurationNext Topic: Multiple Cookie Domain Support


Configure Policies for Impersonation

In order for impersonation to function correctly, multiple policies must be configured.

For the resource that initiates impersonation:

For the resource to be accessed by the impersonator:

Note: Policies must be in place for each resource that may be accessed by an impersonator.

The following figure shows the minimum policies required for an impersonator to access a resource:

Minimum Policies Required for an Impersonator to Access a Resource

More information:

Policies