Layer7 Access Management

Expand all | Collapse all

Impersonation Implementation

Jump to Best Answer
  • 1.  Impersonation Implementation

    Posted 08-24-2012 11:47 AM
    Hi,
    I am trying to implement a sample impersonation flow.
    I was looking for any sample implementation of the same, with details about the fcc files, policies etc.
    Any guide with every step details would be helpful


  • 2.  RE: Impersonation Implementation

    Posted 08-27-2012 12:33 PM
    Hi All,

    Anyone have anything to share for this one?

    Thanks!
    Chris


  • 3.  Re: Impersonation Implementation
    Best Answer

    Posted 04-19-2017 12:46 AM