What is impersonation?

Answer Posted / technova

setting up Impersonation will help to know better to who
accessed or which user accessed the resource.This restrict
any anonymous access to the resource.

Is This Answer Correct ?    9 Yes 7 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Plz Let me the Difference Between Bea Weblogic IBM Websphere

2304


How does the Hide Empty Folders command in the folder comparison window work?

1856


How to move a CS-RCS project to CS-CVS?

2136


What is the "best" CM tool to use?

1924


When vob is created at first time?

688


How does Subversion handle binary files?

1976


What are the benefits of SCM?

1851


Can you uninstall an older version of Merge before installing a newer version or build?

1549


What is eSvn?

1803


What is "version control"?

1884


What is the difference between QVCS-Enterprise, QVCS-Pro and QVCS?

1883


Explain impersonation?

736


Is there a separate QVCS API library available for embedding version control into a non-QVCS application?

1707


When CS-CVS should be used?

2496


Hi can any one help me what are the prerequisites to billed before forecasting in SAP APO DP.............like blue sheet kindly help me the steps............

1808