You use an Impersonation authentication scheme to let privileged users impersonate other users.
Note: The following procedure assumes you are creating a new object. You can also copy the properties of an existing object to create an object. More information exists in Duplicate Policy Server Objects.
To configure the authentication scheme
The Create Authentication Scheme pane opens.
Authentication scheme settings open.
Note: Click Help for descriptions of settings and controls, including their respective requirements and limits.
Scheme-specific fields and controls open.
Note: Click Help for descriptions of settings and controls, including their respective requirements and limits.
The authentication scheme is saved and may be assigned to a realm.
Copyright © 2010 CA. All rights reserved. | Email CA about this topic |