Ask HN: How do you implement “user impersonation” support? | Dark Hacker News