Previous Topic: Impersonation Event Configuration

Next Topic: Multiple Cookie Domain Support

Configure Policies for Impersonation

In order for impersonation to function correctly, multiple policies must be configured.

For the resource that initiates impersonation:

For the resource to be accessed by the impersonator:

Note: Policies must be in place for each resource that may be accessed by an impersonator.

The following figure shows the minimum policies required for an impersonator to access a resource:

Minimum Policies Required for an Impersonator to Access a Resource

More information:

Policies


Copyright © 2010 CA. All rights reserved. Email CA about this topic