Symantec Access Management

  • 1.  Impersonation Implementation

    Posted Aug 24, 2012 11:47 AM
    Hi,
    I am trying to implement a sample impersonation flow.
    I was looking for any sample implementation of the same, with details about the fcc files, policies etc.
    Any guide with every step details would be helpful


  • 2.  RE: Impersonation Implementation

     
    Posted Aug 27, 2012 12:33 PM
    Hi All,

    Anyone have anything to share for this one?

    Thanks!
    Chris


  • 3.  Re: Impersonation Implementation
    Best Answer

    Posted Apr 19, 2017 12:46 AM