Skip to end of banner
Go to start of banner

Impersonation (Dictionary Entry)

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

Contexts

Computer Science, IAM, Information Security

Term

Impersonation

Alternative Forms

To impersonate VERB

Definitions

Related Terms

  • AAL3

  • Authentication

  • Authenticator Assurance Level 3

  • Impersonation Resistance

  • Verifier Impersonation

  • Verifier Impersonation Resistance

Quotes

impersonation

Ability of a process to run using a different security context than the one that owns the process.

Overview

Impersonation is a feature of operating systems and applications that allows them to respond to client requests. Typically, a server impersonates a client to allow the client to access resources on the server. For example, Internet Information Services (IIS) uses impersonation to provide a secure context for responding to anonymous requests from clients.

An impersonation token is an access token that contains the security information of a client process and allows the server to impersonate the client to access resources.

See Also: authentication

(Tulloch, 2003, p. 141)

Bibliography

See Also

  • XXX

  • No labels