# Delegation Attacks

* In unconstrained and constrained Kerberos delegation, a computer/user is told what resources it can delegate authentications to.
* In resource based Kerberos delegation, computers (resources) specify who they trust and who can delegate authentications to them.

Here are the articles in this section:
