The configuration of Kerberos can be subtle and complex.
In order to explain configuration, the process is divided across several steps.