Michael,
We have tested kerberos authentication over SSL with pywinrm. The domain controllers (acting KDCs) in the test configuration were 2008r2 and 2012r2, at 2003 functional level. Clients were 2008r2 and 2012r2. All worked fine with the latest MIT krb5 and python kerberos and pywinrm modules.
It's something we are starting to spike at the moment, but wanted to see if the feature is already being worked on/planned - don't want to mess with the product strategy
As an example:
ansible_ssh_user: iclegg << implicitly uses basic auth since no kerberos realm is specified
ansible_ssh_pass: password123
ansible_ssh_port: 5986
ansible_connection: winrm
ansible_ssh_user: iclegg@realm << implicity uses Kerberos since this not a valid Windows username, but is a valid UPN ( '@' is reserved)
ansible_ssh_pass: password123
ansible_ssh_port: 5986
ansible_connection: winrm
I have not looked into how kerb is done with SSH, so this suggestion may not be consistent with it
Ian