active directory – Using Kerberos Golden Ticket with Metasploit

Having compromised a domain controller during testing, I now want to create persistent domain administrator access. In addition, operational security is important to me because I do not want to connect to netowkr hosts with the help of domain administrator credentials.

Having generated a Kerberos gold ticket, I can get a system cmd shell on the domain joins hosts on the network with Impacket psexec.py, without having to use the administrator identification information.

However, I would like to use the tools available in meterpreter with this access.
Is it possible to use this Kerberos ticket generated with metasploit?