Impersonation

The call to CoInitializeSecurity() also has an impersonation level parameter. The impersonation levels listed in Table 12.3 are available. Impersonation is the capability of a thread to execute in a security context that is different from the context of the process that owns the thread.

Remote access client impersonation occurs when a person takes over an existing authenticated connection. The intruder waits until the connection is authenticated and then obtains the connection parameters, disconnects the user, and takes control of the authenticated connection.

Remote server impersonation occurs when a computer appears to the remote access client as the remote access server. The impersonator appears to verify the remote access ...

Get COM+ Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.