Previous Topic: Impersonation Authentication SchemesNext Topic: Certificate Mapping and Validity Checking for X.509 Certificates


Configure an Impersonation Authentication Scheme

You use an Impersonation authentication scheme to let privileged users impersonate other users.

Note: The following procedure assumes that you are creating an object. You can also copy the properties of an existing object to create an object. For more information, see Duplicate Policy Server Objects.

To configure the authentication scheme

  1. Click Infrastructure, Authentication.
  2. Click Authentication Scheme, Create Authentication Scheme.

    The Create Authentication Scheme pane opens.

  3. Click OK.

    Authentication scheme settings open.

    Note: Click Help for descriptions of settings and controls, including their respective requirements and limits.

  4. Select Impersonation Template from the Authentication Type Style list.

    Scheme-specific fields and controls open.

    Note: Click Help for descriptions of settings and controls, including their respective requirements and limits.

  5. Enter a name and a protection level in the General group box.
  6. Enter the server name and target information in the Scheme Setup group box.
  7. Click Submit.

    The authentication scheme is saved and may be assigned to a realm.