Previous Topic: Configure an Agent to Use startimp.fcc

Next Topic: Enable Impersonation through an .fcc File

Configure an Impersonation Authentication Scheme

Impersonation requires an Impersonation authentication scheme. This scheme is used as a method for an impersonator to initiate the impersonation process. To begin an impersonation session, an Impersonator directly accesses an .fcc file which is a resource protected by the Impersonation authentication scheme.

More information:

Impersonation Authentication Schemes


Copyright © 2010 CA. All rights reserved. Email CA about this topic