Introduction
 
Impersonation can basically provide the functionality of executing  something  in the context of a different identity.  
For example assigning  an account to users  with anonymous access. 
 
You would use impersonation  in order to access resources  on behalf of the user with a different  account, that normally, that would not be  able to access or execute  something.
 
Thanks for learning my blogs!!