Previous Topic: Impersonation Event Configuration

Next Topic: Multiple Cookie Domain Support

Configure Policies for Impersonation

In order for impersonation to function correctly, multiple policies must be configured. They include:

For the resource that initiates impersonation:

For the resource to be accessed by the impersonator:

Note: Policies must be in place for each resource that may be accessed by an impersonator.

The following figure shows the minimum policies required for an impersonator to access a resource.

More information:

Policies