An act whereby one entity assumes the identity and privileges of another entity without restrictions and without any indication visible to the recipients of the impersonator's calls that delegation has taken place Impersonation is a case of simple delegation
A technique by which one process can take on the security attributes of another process, as when a server process impersonates a client process to complete a task involving objects to which the server does not normally have access
In Windows NT, the capability of a thread in one process to assume the security identity of another process Impersonation is employed by a named pipe to acquire and use the security ID of the service requester