Previous Topic: Sample Implementation of ImpersonationNext Topic: Sample Forms for Impersonation


Sample Impersonation Implementation Assessment

Once all of the required Policy Server objects are in place, an administrator initiates an impersonation session by doing the following:

  1. The administrator who will become the impersonator logs into a CA SiteMinder® protected network.
  2. The administrator provides credentials and is authenticated and authorized by CA SiteMinder®.
  3. The administrator accesses the imp.fcc file using a Web browser.
  4. The administrator is prompted to enter a user ID for the person to be impersonated. The administrator may also be required to provide additional information about the user to be impersonated.
  5. The administrator submits the information.
  6. The Policy Server uses the policies defined for impersonation to determine the following:
  7. If both are true, the impersonator impersonates the impersonatee.

    Note: Without custom development (.jsp pages, servlets, etc.) the impersonation session can be tracked using the Policy Server’s audit logging. However, it may be beneficial for an enterprise to create some custom Web applications to monitor and track impersonation sessions.