Delegation Attacks
In unconstrained and constrained Kerberos delegation, a computer/user is told what resources it can delegate authentications to.
In resource based Kerberos delegation, computers (resources) specify who they trust and who can delegate authentications to them.
Here are the articles in this section:
Last updated