Policy Server Guides › Policy Server Configuration Guide › Impersonation › Sample Implementation of Impersonation › Sample Impersonation Implementation Assessment
Sample Impersonation Implementation Assessment
Once all of the required Policy Server objects are in place, an administrator initiates an impersonation session by doing the following:
- The administrator who will become the impersonator logs into a CA SiteMinder® protected network.
- The administrator provides credentials and is authenticated and authorized by CA SiteMinder®.
- The administrator accesses the imp.fcc file using a Web browser.
- The administrator is prompted to enter a user ID for the person to be impersonated. The administrator may also be required to provide additional information about the user to be impersonated.
- The administrator submits the information.
- The Policy Server uses the policies defined for impersonation to determine the following:
- Is the administrator allowed to act as an impersonator?
- Is the user allowed to be impersonated?
- If both are true, the impersonator impersonates the impersonatee.
Note: Without custom development (.jsp pages, servlets, etc.) the impersonation session can be tracked using the Policy Server’s audit logging. However, it may be beneficial for an enterprise to create some custom Web applications to monitor and track impersonation sessions.
Copyright © 2013 CA.
All rights reserved.
|
|