Use Kerberos This protocol is more secure but requires you to set up constrained delegation in your environment to perform ...