In Part 4 of this series, I discussed Internet Explorer setup. To date, the series has been about steps needed to set up Kerberos Constrained Delegation with Windows Integrated Authentication. While the first parts of the series were not a step-by-step guide in how to set up Kerberos, it was meant to provide an overall checklist of things to make sure were properly set up. What happens if you have an issue with Kerberos after it is set up? That’s what this part of the series is about.
Unfortunately, many Kerberos setups have problems because: