Reasons on the security side and on the application server side.
Figure 1. Kerberos Authentication Flow