Impersonation events are rule events that must be configured and included in policies in order to allow a privileged user to impersonate another user.
You must configure at least one of each of the following impersonation events in order to enable impersonation:
When included in an appropriate policy, a rule that includes this event allows an impersonation session to begin.
When included in an appropriate policy, a rule that includes this event allows a set of users to be impersonated.
Copyright © 2013 CA.
All rights reserved.
|
|