The IMPERSONATE attribute-keyword indicates that the WMI ODBC adapter attempts to impersonate the user account defined by the UID and PWD values. This is similar to setting up a service to log on as a different user to grant it different permissions than the current user.

Impersonation fails if the host account is not set up with sufficient security permissions. To set up a system for impersonation, you must be logged on as administrator on the computer where the WMI ODBC adapter is installed.

The following procedure describes how to set up a system for impersonation.

Aa390869.wedge(en-us,VS.85).gifTo set up a system for impersonation

  1. On the Tools menu in MMC, choose User Manager for Domains and set up the privilege Act as part of the operating system for the user account you will be running under (not the account you are trying to impersonate).
  2. Restart your computer to activate these settings/tokens.

The IMPERSONATE keyword acts as a flag and does not require any value. This keyword can be omitted if not needed.

You can also specify impersonation with the Impersonation check box in the Configure Connection dialog box (using the WMI ODBC Adapter).

Note  It is important not to confuse DCOM impersonation levels with user impersonation associated with services. DCOM impersonation levels specify the permissions granted to individual DCOM calls to WMI. User impersonation attempts to make calls through ODBC as if another user account requested them.

Windows Server 2003:  The WMI Open Database Connectivity (ODBC) Adapter is not available in Windows Server 2003. When you upgrade to Windows Server 2003, the WMI ODBC Adapter is not removed if it already exists on a machine. For an alternative type of data access, see Microsoft Data Access Components (MDAC).