Examines the requirements that you can use to authenticate the users of Web applications and discusses how the new extensions to the Kerberos authentication protocol in Microsoft Windows Server 2003 can satisfy these requirements.
Kerberos Protocol Transition and Constrained Delegation
Kerberos Protocol Transition and Constrained Delegation