For security audit reasons, it would be helpful to see a log of who has impersonated whom.
You won't be notified about changes to this idea.