Hi,
Are we talking about impersonating in general, or impersonating the Remedy
Application Service?
The typical reason for impersonating is when you want to run things with
the permissions of a user, but you do not want to login with that account.
You may not have the password, and you do not want to get problems with
connecting from different machines.
You have to be Admin to impersonate.
I think that Modified By etc will also be that of the impersonated user.
Best Regards - Misi, RRR AB, http://www.rrr.se (ARSList MVP 2011)
Products from RRR Scandinavia (Best R.O.I. Award at WWRUG10/11):
* RRR|License - Not enough Remedy licenses? Save money by optimizing.
* RRR|Log - Performance issues or elusive bugs? Analyze your Remedy logs.
Find these products, and many free tools and utilities, at http://rrr.se.
> is there a reason for this? Throw me a bone..
>
> --
> Patrick Zandi
>
> _______________________________________________________________________________
> UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
> attend wwrug12 www.wwrug12.com ARSList: "Where the Answers Are"
>
_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug12 www.wwrug12.com ARSList: "Where the Answers Are"