Category Archives: Impersonation

  1. Impersonating a server level permission


    February 26, 2014 by Kenneth Fisher

    Warnings up front, this has some serious security implications. The method I’m going to use minimizes that somewhat but it’s …
    Continue reading


Get every new post delivered to your Inbox.

Join 847 other followers