In delegation, an initiator forwards its identity to an acceptor so that the acceptor can use the identity to act as an agent for the initiator. There are two forms of delegation:
- Impersonation delegation
- Traced delegation
More:
Initiating a Security Context to Delegate Credentials
Accepting a Security Context with Delegated Credentials