Impersonation events are rule events that must be configured and included in policies in order to allow a privileged user to impersonate another user.
You must configure at least one of each of the following impersonation events in order to enable impersonation:
When included in an appropriate policy, a rule that includes this event allows an impersonation session to begin.
When included in an appropriate policy, a rule that includes this event allows a set of users to be impersonated.
Copyright © 2010 CA. All rights reserved. | Email CA about this topic |