An IT administrator is configuring a new server that will host sensitive company data and requires secure authentication mechanisms. The company has an Active Directory infrastructure in place. Which authentication method should the administrator use to ensure that time-sensitive tickets are granted for authenticated access to the server's resources?
RADIUS
NTLM
TACACS+
Kerberos