Very recently, we’ve had an abundant amount of issues around environments using unconstrained delegations failing. What is unconstrained delegations you might ask? It’s what we call “Full Trust” delegations, and my former Escalation Engineer nicely details the differences between constrained delegations and unconstrained delegations in his post My Kerberos Checklist. Consider the scenario: You are […]
You are browsing archives for