Debugging a Kerberos authentication problem
Kerberos is a notorious authentication mechanism/protocol known for its complexity. I probably wouldn't exaggerate if assume that it's the first response you would get if googled the most common authentication protocol for a distributed system. Just recently I've been working on fixing the connection to Kafka secured by Kerberos…