An IT administrator is configuring a new server that will host sensitive company data and requires secure authentication mechanisms. The company has an Active Directory infrastructure in place. Which authentication method should the administrator use to ensure that time-sensitive tickets are granted for authenticated access to the server's resources?
TACACS+
Kerberos
RADIUS
NTLM