I know the purpose of the Privilege Attribute Certificate in the Microsoft-world. I also understand the importance of enforcing PAC-verification and signatures in the Microsoft-world, due to the serious security problems revealed over the past years.
But all of our KDCs are MiT-kerberos, some that does not issue MS-PAC, and cannot trivially be configured to do so and using them without PAC (on a lonley workstation or terminal server) would not entail the same risk, as in a pure AD-environment. We also manage installations that use the RedHat-based FreeIPA-framework and these do add MS-PAC and SID-information to the ticket. Before the PAC-enforcement era, all of this coexisted beautifully - but we need to see how we can reestablish some interoperability.
We are currently experimenting in an lab environment, to see if how far I am able to inter-opt with Microsoft 2025-servers either through a "one computer" AD and a trust relationship with the external kerberos realm, or some other mechanism. It is not an option to deploy a site-wide AD infrastructure along side our main infrastructure, so without some more progress - or for Microsoft clients/servers to accept tickets without PAC, they might have to be removed from the equation.
I would assume that there are others in the same situation.