Constrained and Unconstrained Kerberos systems interaction

后端 未结 0 1290
执念已碎
执念已碎 2021-02-11 05:45

I have an application server that is set up to work with Kerberos authentication using Constrained Delegation. In this server, users log in with their windows c

相关标签:
回答
  • 消灭零回复
提交回复
热议问题