I don't usually do this, but I came across just a great article on how FIM 2010 utilizes Kerberos for securing communications between its components, that I thought I would share it:

FIM 2010 Kerberos Setup by Thomas Vuylsteke

...What a great piece of IP