Only if the application has or can acquire "anyone's" credentials.
First the impersonating application has to be authenticated (you
remembered to validate them right?), then the credentials it is
passing for authentication have to validated.
Bob Segrest
Ask a Question
Want to reply to this thread or ask your own question?
You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.