Hi All, I'm working on a security review of Kerberos-based authentication server. I'm familiar with general facts about Kerberos but have never implemented it myself. So, any resources regarding what I will be looking for, "best-practices", etc... would be greatly appreciated.
G.
