๐ŸŒ Protocol Landscape

Active Directory environments rarely rely on a single authentication method. Understanding where each protocol fits prevents mismatched expectations and security gaps.

Integrated

Kerberos is the native Windows protocol. It delivers mutual authentication and delegated access inside trusted forests.

Legacy

NTLM handles fallbacks, workgroup joins, and down-level systems. It lacks ticketing and is vulnerable to relay attacks.

Federated

Protocol hand-offs (SAML, OpenID Connect, OAuth) extend sign-in beyond the domain and power modern SaaS SSO.

๐Ÿ“Œ Key takeaway: Map protocols to trust boundaries. Use Kerberos where the domain controls both client and service. Require federation for cloud apps. Limit NTLM to transitional scenarios and monitor it closely.