Too Much of a Good Thing

  A while back I wrote a blog post about setting up Kerberos constrained delegation. As a bit of an re-introduction, a lot of the value of the Kerberos authentication protocol is that it allows an application or service to impersonate a user in order to get resources on that users behalf. This impersonation is… Read more

Scary Sounding Errors

We have a temporary role in CSS where support folks will help out in supporting prerelease (also known as beta) software.  I’ve worked a couple of Windows betas, and it’s a great experience.  I mention this since I remember a few years ago during the beta of a prior Windows release where there was an… Read more