Category Archives: Impersonation

  1. Using impersonation to allow a task without granting the required permission.

    7

    August 1, 2016 by Kenneth Fisher

    I use impersonation on a regular basis for a number of different tasks. This one is pretty basic but can …
    Continue reading

  2. Impersonation can give you the wrong answer

    1

    February 8, 2016 by Kenneth Fisher

    I use impersonation all the time to let me see additional permissions information I can only get that way and, …
    Continue reading

  3. Impersonating a server level permission

    8

    February 26, 2014 by Kenneth Fisher

    Warnings up front, this has some serious security implications. The method I’m going to use minimizes that somewhat but it’s …
    Continue reading

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 1,597 other followers

Follow me on Twitter

ToadWorld Pro of the Month November 2013