Previous Topic: SOA Security Manager Authentication Schemes

Next Topic: Impersonation Scheme Prerequisites

Impersonation Authentication Schemes

By configuring a series of Policy Server objects, you can allow privileged users to impersonate other users. This feature is useful in situations where a helpdesk or customer service representative must troubleshoot problems for a customer, or when an employee is out of the office. Part of the impersonation process requires an impersonation authentication scheme which allows a privileged user to begin the impersonation process, identify the user to be impersonated (impersonatee), and establish an impersonation session. This authentication scheme is similar to the HTML Forms authentication scheme.

More information:

HTML Forms Authentication Schemes

Impersonation


Copyright © 2010 CA. All rights reserved. Email CA about this topic