What is impersonation?

Answer Posted / technova

setting up Impersonation will help to know better to who
accessed or which user accessed the resource.This restrict
any anonymous access to the resource.

Is This Answer Correct ?    9 Yes 7 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the difference between a Change and a Conflict?

1697


What are the benefits of SCM?

1690


What dependencies does eSvn have?

1597


What is impersonation?

9489


What Problem Management tools are available?

1789






Do you agree addressing the versioning issue is something GPO clearly needs to do, in conjunction with authentication and permanent public access ?

2032


Tell me is version control more for software development or software maintenance?

478


How does Subversion handle binary files?

1795


How many separate files do you have under QVCS control for managing the QVCS product itself?

1655


How to move a project created by another version-control tool to CS-CVS?

1644


Is there a separate QVCS API library available for embedding version control into a non-QVCS application?

1496


Which versions of Merge are Year 2000 (Y2K) compliant?

1533


What are the system requirements for Merge?

1662


What is the difference between the Standard and Professional Editions of Merge?

1574


What is subversion?

1756