Previous Topic: Add and Remove Global Policy Time Restrictions

Next Topic: Impersonation Overview

Impersonation

This section contains the following topics:

Impersonation Overview

Impersonation Process

Security Considerations for Impersonation

Policy Server Objects for Impersonation

Sample Implementation of Impersonation


Copyright © 2010 CA. All rights reserved. Email CA about this topic