Impersonation on Windows Systems

For agents running on Windows platforms, Deployment Automation provides a program that handles impersonation.

You implement impersonation for Windows-based agents the same way you do for UNIX- or Linux-based agents:

When you configure a process step, you specify the local user credentials, user name and password, that will be used when the step is processed.

For impersonation purposes, a local user is:

SE_INCREASE_QUOTA_NAME (adjust memory quotas for a process)
SE_ASSIGNPRIMARYTOKEN_NAME (replace a process-level token)
SE_INTERACTIVE_LOGON_NAME (local logon)
   

Impersonating the LocalSystem Account

You can also impersonate the Windows LocalSystem account. The LocalSystem account is installed on every Windows machine and is the equivalent of the root user on UNIX/Linux. It is guaranteed to have the privileges listed in the previous section.