Specifies that the server process can impersonate the client's security context while acting on behalf of the client. This field is constant.
This level of impersonation can be used to access local resources such as files. When the process is impersonating the client at this level, the impersonation token can be passed across only one computer boundary.