Previous Topic: Impersonation Authentication Schemes

Next Topic: Configure an Impersonation Authentication Scheme

Impersonation Scheme Prerequisites

To use the Impersonation authentication scheme, the following prerequisites must be met:

Note: Impersonation is not supported by directory mapping. The impersonatee, the user being impersonated, must be uniquely present in the authentication directories associated with the domain or the impersonation fails.

Note: If a password policy applies to an impersonatee and is in effect, the Impersonation authentication scheme fails.

More information:

User Directories