Delegation Attacks

  • In unconstrained and constrained Kerberos delegation, a computer/user is told what resources it can delegate authentications to.

  • In resource based Kerberos delegation, computers (resources) specify who they trust and who can delegate authentications to them.

Here are the articles in this section:

Last updated