You control impersonation using the identity configuration element. ... application, it is recommended that you restrict the access to your Web.config file using an ...
msdn.microsoft.com