User Impersonation

Deployment Automation can use user impersonation when an agent must execute a command for which it might not otherwise have permission, or when a specific user must be employed for a given process.

For example, to run a database update script, an agent might need to be the "oracle" user; but to update the application, the agent might need to be the "websphere" user. By using impersonation, the same agent can run the script and update the application, which enables you to combine these steps into a single process.

  • On UNIX/Linux systems, the ssh, sudo, or su commands are used to impersonate users.
  • On Windows, Deployment Automation provides a utility program to handle impersonation.

See also: