Impersonation provides a method for a privileged user to assume the role of another user without ending the privileged user's session. Impersonation events are used to start impersonation sessions when resources are accessed.
Possible impersonation events:
When included in an appropriate policy, a rule that includes this event allows an impersonation session to begin.
When included in an appropriate policy, a rule that includes this event allows a set of users to be impersonated.
Copyright © 2010 CA. All rights reserved. | Email CA about this topic |