Published: July 16, 2012
Applies to: Exchange 2013 | Exchange Online | Exchange Server 2007 | Exchange Server 2010
The ConnectingSID element represents an account to impersonate when you are using the ExchangeImpersonation SOAP header.
<ConnectingSID> <PrincipalName/> </ConnectingSID>
<ConnectingSID> <SID/> </ConnectingSID>
<ConnectingSID> <PrimarySmtpAddress/> </ConnectingSID>
<ConnectingSID> <SmtpAddress/> </ConnectingSID>
The following sections describe attributes, child elements, and parent elements.
Represents the user principal name (UPN) of the account to use for impersonation. This should be the UPN for the domain where the user account exists.
Represents the security descriptor definition language (SDDL) form of the security identifier (SID) for the account to use for impersonation.
Represents the primary Simple Mail Transfer Protocol (SMTP) address of the account to use for Exchange impersonation. If the primary SMTP address is supplied, it will cost an extra Active Directory directory service lookup in order to obtain the SID of the user. We recommend that you use the SID or UPN if they are available.
Represents the Simple Mail Transfer Protocol (SMTP) address of the account to use for Exchange Impersonation. If the SMTP address is supplied, it will cost an extra Active Directory lookup in order to obtain the SID of the user. We recommend that you use the SID or UPN if they are available.
Used in the SOAP header of a request. When this element is present, the caller is trying to impersonate the account that is contained within the ExchangeImpersonation element.
The following is the XPath expression to this element:
The calling account must have the ms-exch-impersonation right on the Client Access server and the ms-exch-MayImpersonate right on either the mailbox database that contains the mailbox to impersonate or the Active Directory user or contact object.
The schema that describes this element is located in the EWS virtual directory of the computer that is running MicrosoftExchange Server 2007 that has the Client Access server role installed.