Previous Topic: Impersonation Realms and Events

Next Topic: How an Impersonation Session is Initiated

Policy Server Objects for Impersonation

In order to implement impersonation in an enterprise, a number of Policy Server objects must be configured. The combination of objects provides the authentication and policy entitlements that are required to enable one user to impersonate another. The following objects are required for impersonation:


Copyright © 2010 CA. All rights reserved. Email CA about this topic