Policy
Kerberos delegation server allowlist
Policy overview
Key metadata and intent for this policy.
Supported OS tags: Windows7
Setting the policy assigns servers that Google Chrome may delegate to. Separate multiple server names with commas. Wildcards, *, are allowed. Leaving the policy unset means Google Chrome won't delegate user credentials, even if a server is detected as intranet. Example value: *.example.com,foobar.example.com
Internal name
AuthNegotiateDelegateAllowlist
Policy ID
29cfef07e464
Elements
1
Registry values
How enabled and disabled states update the registry.
No explicit registry values are set for enabled or disabled states.
Policy elements
Inputs and configuration options exposed by this policy.
| Element | Type | Registry mapping | Constraints & behavior |
|---|---|---|---|
Kerberos delegation server allowlist ID AuthNegotiateDelegateAllowlist | text | HKCU\Software\Policies\Google\Chrome\AuthNegotiateDelegateAllowlist Type REG_SZ | None |
Other policies in this category
Explore related policies at the same level.
- ComputerAllow Basic authentication for HTTPMicrosoft Windows 7 or later
- UserAllow Basic authentication for HTTPMicrosoft Windows 7 or later
- UserAuthentication server allowlistMicrosoft Windows 7 or later
- ComputerAuthentication server allowlistMicrosoft Windows 7 or later
- ComputerCross-origin HTTP Authentication promptsMicrosoft Windows 7 or later
- UserCross-origin HTTP Authentication promptsMicrosoft Windows 7 or later
- UserDisable CNAME lookup when negotiating Kerberos authenticationMicrosoft Windows 7 or later
- ComputerDisable CNAME lookup when negotiating Kerberos authenticationMicrosoft Windows 7 or later
- UserInclude non-standard port in Kerberos SPNMicrosoft Windows 7 or later
- ComputerInclude non-standard port in Kerberos SPNMicrosoft Windows 7 or later
- ComputerKerberos delegation server allowlistMicrosoft Windows 7 or later
- ComputerList of origins allowing all HTTP authenticationMicrosoft Windows 7 or later