ComImpersonationLevel coding group
The possible values for the COM Impersonation Level.
To access the code of the codings below, append the coding group name and coding name to
see an example below.
|ANONYMOUS||2||The client is anonymous to the server. The server process can impersonate the client, but the impersonation token will not contain any information and cannot be used|
|DEFAULT||1||DCOM can choose the impersonation level using its normal security blanket negotiation algorithm. For more information, see Security Blanket Negotiation|
|DELEGATE||5||The server process can impersonate the client's security context while acting on behalf of the client. The server process can also make outgoing calls to other servers while acting on behalf of the client, using cloaking|
|IDENTIFY||3||The server can obtain the client's identity. The server can impersonate the client for ACL checking, but it cannot access system objects as the client|
|IMPERSONATE||4||The server process can impersonate the client's security context while acting on behalf of the client. This level of impersonation can be used to access local resources such as files|