Impersonation provides a method for a privileged user to assume the role of another user without ending the privileged user’s session. Impersonation events are used to start impersonation sessions when resources are accessed.
Possible impersonation events:
When included in an appropriate policy, a rule that includes this event allows an impersonation session to begin
When included in an appropriate policy, a rule that includes this event allows a set of users to be impersonated.
| Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |