Having a complete understanding of the goals and configuration issues aids in the implementation of Kerberos Authentication.