Enterprise Mobility and Security Blog


Too Much of a Good Thing

  A while back I wrote a blog post about setting up Kerberos constrained delegation. As a bit of an re-introduction, a lot of the value of the Kerberos authentication protocol is that it allows an application or service to impersonate a user in order to get resources on that users behalf. This impersonation is...

Continue reading

TS Gateway Certificates Part III: Connection Time Issues related to TS Gateway Certificates

This is the third and final part of our recent series on configuring certificates on TS Gateway. See also Part I and Part II Background TS clients authenticate TS Gateway server using server security certificates (X.509 format). TS Gateway passes the server security certificate to the clients during the SSL handshake process. During the SSL...

Continue reading

Scary Sounding Errors

We have a temporary role in CSS where support folks will help out in supporting prerelease (also known as beta) software.  I’ve worked a couple of Windows betas, and it’s a great experience.  I mention this since I remember a few years ago during the beta of a prior Windows release where there was an...

Continue reading