The following .fcc file is invoked directly by an impersonator, or called by the impersonation authentication scheme to begin the impersonation process:
@username=%USER% @smheaders=%SMSERVERSESSIONSPEC% @password=%SMSERVERSESSIONSPEC% @smpushsession=true <html> <head><title>Sample Impersonation Form</title><head> <body> <h3> Please enter your Impersonation Information</h3> <form method=post><table> <tr> [assign the value for TD in your book]User Name:</td> [assign the value for TD in your book]<input type=text name=USER></td> </tr> <input type=hidden name=target value="server.company.com/app/ impersonatee/successimp.htm "> <tr>[assign the value for TD in your book]<input type=submit></td></tr> </table></form></body> </html>
The following .fcc file is invoked by impersonators to return to their original sessions.
@smpopsession=true @target=/impersonators/end.htm @smredirect=/impersonators/end.htm
Copyright © 2010 CA. All rights reserved. | Email CA about this topic |