Is kerberos unconstrained delegation partially safer than constrained delegation?
When you’re using unconstrained delegation, a service A is allowed to authenticate as the user B to any other service. This happens because the user B sends its TGS along with its TGT to the service A, and service A can then request other …