The use of Kerberos requires additional configuration of Constrained Delegation in Active Directory. The authentication method for Live Migration determines which protocol will be used to authenticate the live migration traffic.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |