This section provides background information to assist you in carrying out the relevant procedures.
Topics
What is impersonation?
What variables can be used for user-defined notifications?
What infrastructure properties are available?
What Kerberos properties are available?
What LDAP properties are available?
What properties are available for user-defined notifications?
What properties are available for password policies?
What SAML properties are available?
What security properties are available?
What SMTP properties are available?
What user settings properties are available?
What License monitoring settings are available?
What rules exist for license monitoring?
What is the default user group?