utilizes an Impersonation Token
which is an Access Token
that has been created to capture the SECURITY_IMPERSONATION_LEVEL
of a client process, allowing a server to perform "Impersonation
" the client process in security operations.
There might be more information for this subject on one of the following: