Configure Kerberos Constrained Delegation for Analysis Services

Practice Labs Module
Time
21 minutes
Difficulty
Intermediate

The "Configure Kerberos Constrained Delegation for Analysis Services" module provides you with the instructions and devices to develop hands on skills in the following topic: Configuring Analysis Services for Kerberos constrained delegation.

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

Introduction

The Configure Kerberos Constrained Delegation for Analysis Services module provides you with the instructions and devices to develop hands on skills in the following topic:

  • Configuring Analysis Services for Kerberos constrained delegation

Exercise 1 - Configuring Analysis Services for Kerberos Constrained Delegation

Kerberos constraint delegation provides a way for a front end to confirm the identity of users who are trying to access resources on a network. You can configure Analysis Services for Kerberos authentication to impersonate a user identity when querying data. Alternatively, to enable Analysis Services to delegate a user identity to a down-level service.

In this exercise, you will learn to configure the Analysis Services for Kerberos constrained delegation to allow the Analysis Services to pass the security token of the user identity to the designated down-level service on a remote computer.

Learning Partner
Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.