4.4 Understanding Aliases and Impersonations

Aliases and impersonations provide support for Aegis adapters that do not support Integrated Windows Authentication. If your Aegis environment uses Integrated Windows Authentication, you must create an alias and use an impersonation to link the alias to an adapter.

Aliases

When you create an alias, you specify the credentials for the user account you want to use in an impersonation. After you create an alias, you can assign it to one or more impersonations. At design time, Process Authors can then use adapters that do not support Integrated Windows Authentication.

NOTE:Aegis does not synchronize alias credentials with Windows or other authentication sources. If the credentials for an adapter change, you must update the alias.

Impersonations

Impersonations allow you to link the credentials in an alias to an adapter that does not support Integrated Windows Authentication. If your Aegis environment uses Integrated Windows Authentication, you must create an impersonation for each adapter in your environment that does not support Integrated Windows Authentication.

When you create an impersonation, you assign an alias to an adapter. When a user attempts to use the adapter in the Operator Console, the Configuration Console, or the Workflow Designer, Aegis checks whether an impersonation exists that links an alias with the correct credentials to the adapter.