Impersonation on Windows Systems

For agents running on Windows platforms, Serena Release Automation provides a program that handles impersonation. You implement impersonation for Windows-based agents the same way you do for Unix- or Linux-based agents: when you configure a process step, you specify the local user credentials—user name and password—that will be used when the step is processed. For impersonation purposes, a local user is one whose user name and password are stored on the target computer and who is part of the administration group and has, at a minimum, the following privileges:

  • SE_INCREASE_QUOTA_NAME (adjust memory quotas for a process)

  • SE_ASSIGNPRIMARYTOKEN_NAME (replace a process-level token)

  • SE_INTERACTIVE_LOGON_NAME (local logon)

You can also impersonate the Windows LocalSystem account. The LocalSystem account is installed on every Windows machine and is the equivalent of the root user on Unix/Linux. It is guaranteed to have the privileges listed above.

Note

For Windows-based agents the sudo option is ignored if selected.

loading table of contents...