Stuart Rogers has been at SAS for over 10 years and focuses on security topics with SAS, especially authentication and encryption.
Content Outline
00:00 - Kerberos Constrained Delegation Prerequisites
00:37 - General Requirements
01:32 - Active Directory Delegation Settings
* Traditional constrained delegation
* Resource-based constrained delegation
* Different tools available to define constrained delegation settings
05:59 - Additional Service Account Requirements
07:17 - Kerberos Library on Linux
08:16 - Further Information
Related Resource
SAS Viya 3.5 Kerberos Constrained Delegation: Putting the Dog on a Leash -
SAS Viya 3.5 Kerberos Troubleshooting -
SUBSCRIBE TO THE SAS USERS YOUTUBE CHANNEL #SASUsers #LearnSAS
ABOUT SAS
SAS is a trusted analytics powerhouse for organizations seeking immediate value from their data. A deep bench of analytics solutions and broad industry knowledge keep our customers coming back and feeling confident. With SAS®, you can discover insights from your data and make sense of it all. Identify what’s working and fix what isn’t. Make more intelligent decisions. And drive relevant change.
CONNECT WITH SAS
SAS ►
SAS Customer Support ►
SAS Communities ►
SAS Analytics Explorers ►
Facebook ►
Twitter ►
LinkedIn ►
Blogs ►
RSS ►
0 Comments