You cannot do NTLM and then Kerberos through several transitions (servers). You must use Kerberos to delegate Windows authentication on all flights.
You need to configure SPNS to allow keberos to delegate authentication on all machines.
To configure these parameters, you will have to issue the following commands: provided that you have the right to change AD:
SETSPN -S HTTP/Machine1 ADDomain\AppPoolCredential1 SETSPN -S HTTP/Machine1.domainname.com ADDomain\AppPoolCredential1 SETSPN -S HTTP/Machine2 ADDomain\AppPoolCredential2 SETSPN -S HTTP/Machine2.domainname.com ADDomain\AppPoolCredential2
Where ADDomain \ AppPoolCredential is the application pool credentials - note that you cannot use Network Service as the application pool credentials to make the Kerberos delegation work. You need to use a domain account.
In AD, you need to include the following objects to enable Kerberos delegation:
ADDomain\AppPoolCredential1 ADDomain\AppPoolCredential2 Machine1 Machine2

For more information see here .
Donal source share