It is not unusual to have a user who needs to impersonate another user without having that user's password.
- a secretary may need to REGISTER to receive calls for somebody
- a named user (e.g. firstname.lastname@example.org) may need to make a call using some role identity (e.g. From: email@example.com)
The CommonNameMappings feature for TLS partially addresses this requirement. However, a more unified approach, not specific to TLS, may be better.