O'Reilly logo

Pro SharePoint 2007 Development Techniques by Nikander Bruggeman, Margriet Bruggeman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Changing Code Privileges Using Impersonation, Elevation, and Delegation

Every web part is executed under a given identity. In most cases, this will be the identity of the current logged-on user. But there are times when a web part needs to be able to assume another user context in order to do its work. Normally speaking, changing identities is only a temporary situation. Assuming another user context is widely known as impersonation, although we prefer to use the term impersonation in a narrower sense. We will discern two types of user identity assumption: impersonation and elevation, which differ only in their intent. We talk about impersonation when a process does something on behalf of someone else. A well-known impersonation scenario ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required