Establishing a Connection with the K2 Server

A connection can be made with the K2 server from many different sources, including both K2 and non-K2 applications. Some examples of connection sources are:

When the connection is attempted, it may be a direct connection or the connection may have been delegated via another machine. Direct connections use integrated (AD) or some other form of authentication. Delegated must use Kerberos or K2 Pass-Through Authentication (K2PTA).

Kerberos vs K2 Pass-Through

If Kerberos has not been configured, there is a possibility that the credentials will be lost as they are delegated through application layers, in particular when the number of physical machines in question increases. The primary reason for this is that the application layers do not have valid credentials from Active Directory because of the double-hop authentication problem. The most obvious evidence of this is an anonymous user error is displayed or logged when a client application on one machine attempts a connection with another domain machine and the connection is refused.

Since the credentials would normally only be lost on the second hop (i.e. the second machine-to-machine delegation) K2PTA can be requested.