The WMI and CDM Providers use client impersonation to manage security. Every call into the Providers will be made in the client's own security context, which is passed down to the lower layers. One or all operations may fail if you do not have administrative rights on the target machine.
Copyright© 2002 Intel Corporation. Legal Information