Preparing the ISA Server 2006 for Kerberos Constrained Delegation
In the planning and architecture document Authentication in ISA Server 2006 you’ll find a very good overview of the authentication process used by ISA Server 2006. The three major steps are: challenging the user for his/her credentials, validating those credentials against an …
Preparing the ISA Server 2006 for Kerberos Constrained Delegation Read More »