Impersonation limitations?

K

kernel

Are there any constraints to who is impersonated? If some application gets
authenticated by a PSI web server can it impersonate anyone?
 
G

Guest

Hello kernel,

Only if the application has or can acquire "anyone's" credentials.

First the impersonating application has to be authenticated (you
remembered to validate them right?), then the credentials it is
passing for authentication have to validated.

Bob Segrest
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top