Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

PI Web API Reference

Impersonation Level

Defines security impersonation levels. Security impersonation levels govern the degree to which a server process can act on behalf of a client process.

  • Anonymous

    The server process cannot obtain identification information about the client, and it cannot impersonate the client.

  • Delegation

    The server process can impersonate the client's security context on remote systems.

  • Identification

    The server process can obtain information about the client, such as security identifiers and privileges, but it cannot impersonate the client. This is useful for servers that export their own objects, for example, database products that export tables and views. Using the retrieved client-security information, the server can make access-validation decisions without being able to use other services that are using the client's security context.

  • Impersonation

    The server process can impersonate the client's security context on its local system. The server cannot impersonate the client on remote systems.

  • None

    An impersonation level is not assigned.

TitleResults for “How to create a CRG?”Also Available in