Management → Managing Components → Component Processes → Component Process Step Details → User Impersonation
Deployment Automation can use user impersonation when an agent must execute a command for which it might not otherwise have permission, or when a specific user must be employed for a given process.
For example, to run a database update script, an agent might need to be the "oracle" user; but to update the application, the agent might need to be the "websphere" user. By using impersonation, the same agent can run the script and update the application, which enables you to combine these steps into a single process.
Copyright © 2011–2016 Serena Software, Inc. All rights reserved.