Kerberos Authentication 101: Understanding the Essentials of the Kerberos Security Protocol
Setting Clock Synchronization Tolerance to Prevent Replay Attacks