Transmission of an initiator's identity such that the identities of participants in a call chain are not preserved.
gaining access to a system in the security profile of a specific identity. Impersonation may be illegitimate (spoofing, masquerading) or legitimate (e.g., authorized testing.)
An act whereby one entity assumes the identity and privileges of another entity without restrictions and without any indication visible to the recipients of the impersonator's calls that delegation has taken place. Impersonation is a case of simple delegation.
People often have two identities – one which is their real-life persona and another which they use for, for example, when they are online. More...
impersonation - The ability of an operating system process or thread to run temporarily in the security context of a specific caller and gain authorized access to resources using that identity.
The act of posing as the intended recipient of information sent over a network. Impersonation can take two forms: spoofing and misrepresentation.
The ability of a process to run in a specified security context - as a specified user, for example - and thereby access resources authorized for that security context. Impersonation is used in Web applications to provide a security-enhanced user context for anonymous requests.