Active Directory Security Tip #12: Kerberos Delegation
文章介绍了Kerberos代理的四种类型及其用途,并强调无约束代理存在安全风险,建议转换为约束代理或移除不再使用的代理。同时指出若无相关服务主体名称,则Kerberos身份验证无法正常工作,并提供了一个PowerShell脚本链接用于配置检查。 2025-10-7 00:3:0 Author: adsecurity.org(查看原文) 阅读量:16 收藏

Oct 06 2025

I have mentioned in several presentations that Kerberos delegation is impersonation. Kerberos delegation is used when a service (ex. web server) needs to impersonate a user when connecting to a resource (ex. database).

There are a 4 types of Kerberos delegation:

  • Unconstrained – impersonate authenticated user to any Kerberos service
  • Constrained – impersonate authenticated user to specific Kerberos services
  • Kerberos Constrained Delegation Protocol Transition – impersonate any user account to specific Kerberos services
  • Resource-based Constrained Delegation – enables delegation configured on the resource instead of the account

Unconstrained delegation should be converted to constrained delegation due to security concerns. Any Kerberos delegation that is no longer required should be removed. If there’s no associated Kerberos service principal name, Kerberos authentication isn’t working and this should be fixed or removed.

PowerShell code using the Active Directory PowerShell module:
https://github.com/PyroTek3/Misc/blob/main/Get-ADKerberosDelegation.ps1

(Visited 24 times, 24 visits today)

Sean Metcalf

I improve security for enterprises around the world working for TrustedSec & I am @PyroTek3 on Twitter.
Read the About page (top left) for information about me. :)
https://adsecurity.org/?page_id=8


文章来源: https://adsecurity.org/?p=4658
如有侵权请联系:admin#unsafe.sh