How Cloaking Determines Client Identity

When a secure call is made and the server asks the client for its identity, it usually gets the identity tied to the proxy. (Sometimes the authentication service performs a translation from the real identity, but generally the proxy identity is the identity the server sees.) The proxy presents an identity to the server that depends on the type of cloaking that is set and other factors.

The following table summarizes the fact that the identity of the client is a function of the cloaking flag set, the process token, the presence or absence of a thread token, and whether the proxy identity has been previously set. The following table shows the resulting proxy identity (client identity) when these factors vary.

Cloaking Flags Thread Token Presence Proxy Identity
Previously Set
Proxy Identity
(client identity)
cloaking not set don't care don't care process token or authentication identity
EOAC_STATIC_CLOAKING present No thread token
EOAC_STATIC_CLOAKING present Yes current proxy identity
EOAC_STATIC_CLOAKING not present No process token
EOAC_STATIC_CLOAKING not present Yes current proxy identity
EOAC_DYNAMIC_CLOAKING present don't care thread token
EOAC_DYNAMIC_CLOAKING not present don't care process token

The following rules explain exactly how the proxy identity is determined: