Forest trusts provide a way for resources in an Active Directory forest to trust identities from another forest. This trust can be configured in both directions. The trusted forest is the source of user identity. The trusting forest contains the resource to which users authenticate. The trusted forest can authenticate users to the trusting forest without allowing the reverse to occur.
Unconstrained Kerberos delegation is a mechanism in which a user sends its credentials to a service to enable the service to access resources on behalf of the user. To enable unconstrained Kerberos delegation, the service's account in Active Directory must be marked as trusted for delegation. This creates a problem if the user and service belong to different forests. The service forest is responsible for allowing delegation. The delegation includes the credentials of users from the user's forest.
Allowing one forest to make security decisions that affects another forest's accounts violates the security boundary between forests. An attacker that owns the trusting forest can request delegation of a TGT for an identity from the trusted forest, giving it access to resources in the trusted forest. This does not apply to Kerberos Constrained delegation (KCD).
Windows Server 2012 introduced Enforcement for Forest Boundary for Kerberos Full Delegation. This feature added a policy to the trusted domain to disable unconstrained delegation on a per-trust basis. The default setting for this feature allows unconstrained delegation and is unsafe.
Updates that provide security hardening exist for the following versions of Windows Server:
- Windows Server 2019
- Windows Server 2016
- Windows Server 2012 R2
- Windows Server 2012
This feature together with changes in security hardening were backported to the following versions:
- Windows Server 2008 R2
- Windows Server 2008
These security updates make the following changes:
- Unconstrained Kerberos delegation is disabled by default on new forest and new external trusts after you install the May 14 update and later updates.
- Unconstrained Kerberos delegation is disabled on forests (both new and existing) and external trusts after you install the July 9, 2019, update and later updates.
- Administrators can enable unconstrained Kerberos delegation by using the May or later versions of NETDOM and AD PowerShell module.
The updates may cause compatibility conflicts for applications that currently require unconstrained delegation across forest or external trusts. This is especially true of external trust for which the quarantine flag (also known as SID filtering) is enabled by default. Specifically, authentication requests for services that use unconstrained delegation over the listed trust types will fail when you request new tickets.
For the release dates, see Updates timeline.