In part 1, we talked about authentication via NTLM and how the domain controllers that are used to authenticate you are the ones near the service that is being consumed. Now let us move onto Kerberos. Just like last time I need to point at a TechNet Article, How DNS Support for Active Directory Works. […]