Screenshots from Blackberry Webinar on Using Kerberos Constrained Delegation (KCD)

Recently, I attended a webinar titled Blackberry UEM Advanced Configuration presented by distinguished analyst Brian Bernard. One of the topics on his agenda was Using Kerberos Constrained Delegation (KCD). I also wrote about KCD setup via my other blog post. For future reference purpose, I will share his slides on this topic here.

KCDwebinar0.jpg

KCDwebinar1.jpgKCDwebinar2.jpgKCDwebinar3.jpgKCDwebinar4.jpgKCDwebinar5KCDwebinar6KCDwebinar7KCDwebinar8KCDwebinar9.jpgKCDwebinar10.jpgKCDwebinar11.jpgKCDwebinar12.jpgKCDwebinar13.jpgKCDwebinar14.jpgKCDwebinar15.jpgKCDwebinar16.jpgKCDwebinar17.jpgKCDwebinar18.jpg

One comment

  1. […] By far, this is the most challenging component to implement as part of our AirWatch infrastructure. The concept of leveraging certificate-based authentication over username and password to improve user’s experience is noble, however, the process to the finish line is not for the faint of heart. The same complexity can be seen in other MDM providers as well such as Blackberry UEM (you can check out my post on that setup by clicking here.) […]

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.