Introduction
Impersonation can basically provide the functionality of executing something in the context of a different identity.
For example assigning an account to users with anonymous access.
You would use impersonation in order to access resources on behalf of the user with a different account, that normally, that would not be able to access or execute something.
Thanks for learning my blogs!!