Tag Archives: Impersonation

  1. Impersonating a server level permission

    2

    February 26, 2014 by Kenneth Fisher

    Warnings up front, this has some serious security implications. The method I’m going to use minimizes that somewhat but it’s …
    Continue reading

Follow

Get every new post delivered to your Inbox.

Join 338 other followers