Previous Topic: Obtain the Session Specification using an FCC

Next Topic: Effects of FCCCompatMode

Example .fcc Files for Impersonation

The following .fcc file is invoked directly by an impersonator, or called by the impersonation authentication scheme to begin the impersonation process:

@username=%USER%
@smheaders=%SMSERVERSESSIONSPEC%
@password=%SMSERVERSESSIONSPEC%
@smpushsession=true

<html>
<head><title>Sample Impersonation Form</title><head>
<body>
<h3> Please enter your Impersonation Information</h3>
<form method=post><table>
<tr>
  [assign the value for TD in your book]User Name:</td>
  [assign the value for TD in your book]<input type=text name=USER></td>
 </tr>
 <input type=hidden name=target value="server.company.com/app/
     impersonatee/successimp.htm ">
<tr>[assign the value for TD in your book]<input type=submit></td></tr>
</table></form></body>
</html>

The following .fcc file is invoked by impersonators to return to their original sessions.

@smpopsession=true
@target=/impersonators/end.htm
@smredirect=/impersonators/end.htm


Copyright © 2010 CA. All rights reserved. Email CA about this topic