Security Considerations for IIS Impersonation

To use the BAM Windows Workflow Foundation (WF) interceptor with IIS impersonation, follow the guidelines in How to Determine and Set Event Writer Roles for Activities.

Important

You must be a member of the BizTalk Application Users group.

See Also

Security Considerations for BAM Interceptors