Description
Impersonation works at the very bottom level of the authentication stack, that is, we would want the very first authentication layer that is pushed onto the stack to be impersonated; maybe we can account for that by extending the API and not changing the design.