Security Considerations for IIS Impersonation
To use the BAM Windows Workflow Foundation (WF) interceptor with IIS impersonation, follow the guidelines in How to Determine and Set Event Writer Roles for Activities.
Important
You must be a member of the BizTalk Application Users group.