Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Page Properties

Contexts

Computer Science, IAM, Information Security

Term

Impersonation

Alternative Forms

To impersonate

Status
titleVerb

Definitions

Related Terms

  • Authentication

  • Impersonation Resistance

  • Verifier Impersonation

  • Verifier Impersonation Resistance

Quotes

impersonation

Ability of a process to run using a different security context than the one that owns the process.

Overview

Impersonation is a feature of operating systems and applications that allows them to respond to client requests. Typically, a server impersonates a client to allow the client to access resources on the server. For example, Internet Information Services (IIS) uses impersonation to provide a secure context for responding to anonymous requests from clients.

An impersonation token is an access token that contains the security information of a client process and allows the server to impersonate the client to access resources.

See Also: authentication

...