Previous Topic: Configure a Global Active Policy

Next Topic: Impersonation Overview

Impersonation

This section contains the following topics:

Impersonation Overview

Impersonation Process

Security Considerations for Impersonation

Policy Server Objects for Impersonation

Sample Implementation of Impersonation