Reputation: 11
I have an user Jake, and two Server A and B in a kerberos realm, after Jake authenticates to Server A, I want Server A impersonates Jake to connect Server B and do something.
My question is how could I configure or implement Server A to impersonate the user who has been authenticated and connected to it?
Any advice is appreciate!
Upvotes: 1
Views: 1002
Reputation: 568
What you're after is Kerberos Constrained Delegation. I have an example working for a java Spring Boot application using spring security kerberos (with a few tweaks) and Active Directory here.
Upvotes: 1