If you are creating or migrating an endpoint, configure authentication to Kerberos using one or both of the following methods, depending on your configuration:
| Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |