Setting up Windows impersonation
Follow these instructions to set up Windows™ impersonation for Unica Campaign.
Before you begin
To create a Windows™ impersonation group and assign it to policies, you must have administration privileges on the Windows™ server.
Procedure
-
On the Configuration page, set the value of the
enableWindowsImpersonation property in the Campaign >
unicaACListener category to TRUE.
Note: There might be additional property requirements based on your Windows™ Domain Controller setup. For more information, see the single sign-on section of the Unica Platform Administrator's Guide.
-
Create Unica Campaign users:
You can use Unica Platform to create Unica Campaign internal or external users.
Create external users by configuring Active Directory users and group synchronization. Each user you create must have the same login name as the user’s Windows™ user name.
-
Create the Windows™ impersonation group:
Create a Windows™ group specifically for Unica Campaign users. Then add the Windows™ users that correspond to Unica Campaign users to this group.
For more information about creating groups, see your Microsoft™ Windows™ documentation.
-
Assign the Windows™ impersonation group to
policies:
After you create a Windows™ group to store users that correspond to Unica Campaign users, you must add the group to the following policies:
-
Adjust memory quotas for a process
-
Create Token object
-
Replace a process level token
For more information about assigning groups to policies, see your Microsoft™ Windows™ documentation.
-
-
Assign rights to the Windows™ impersonation
group:
Using Windows™ Explorer, grant read/write/execute access to the partitions/partition_name folder under your Unica Campaign installation to the Windows™ impersonation group.
For more information about assigning rights to folders, see your Microsoft™ Windows™ documentation.