If the security requirements attached to B specify that delegation not be enabled for this session, then no delegation certificate is generated. The method on object B is invoked as if invoked by object A, and method invoked by object B on the next object in the delegation chain is invoked with object B's privileges and so on.