Overview#Impersonation is allows a user to log into a client application under a different identity.
Impersonation may also extend to accessing Protected Resources (web APIs) as the impersonated identity and using their permissions.
More Information#There might be more information for this subject on one of the following:
Add new attachment
Only authorized users are allowed to upload new attachments.