Impersonation Level
- Last UpdatedJun 15, 2023
- 1 minute read
- PI System
- PI Web API Reference
- Developer
Defines security impersonation levels. Security impersonation levels govern the degree to which a server process can act on behalf of a client process.
-
Anonymous The server process cannot obtain identification information about the client, and it cannot impersonate the client.
-
Delegation The server process can impersonate the client's security context on remote systems.
-
Identification The server process can obtain information about the client, such as security identifiers and privileges, but it cannot impersonate the client. This is useful for servers that export their own objects, for example, database products that export tables and views. Using the retrieved client-security information, the server can make access-validation decisions without being able to use other services that are using the client's security context.
-
Impersonation The server process can impersonate the client's security context on its local system. The server cannot impersonate the client on remote systems.
-
None An impersonation level is not assigned.