Policy Server Guides › Policy Server Configuration Guide › Impersonation
This section contains the following topics:
Impersonation Overview
Impersonation Process
Security Considerations for Impersonation
Policy Server Objects for Impersonation
Sample Implementation of Impersonation