Deny delegating default credentials
Jump to overview

Policy overview

Key metadata and intent for this policy.

Computer
Category
System > Credentials Delegation
Supported on
At least Windows Vista

Supported OS tags: Windows10, Windows10RT, Windows11, Windows7, Windows8, Windows81, WindowsRT, WindowsRT81, WindowsServer2008, WindowsServer2012, WindowsServer2012R2, WindowsServer2016, WindowsVista

This policy setting applies to applications using the Cred SSP component (for example: Remote Desktop Connection). If you enable this policy setting, you can specify the servers to which the user's default credentials cannot be delegated (default credentials are those that you use when first logging on to Windows). If you disable or do not configure (by default) this policy setting, this policy setting does not specify any server. Note: The "Deny delegating default credentials" policy setting can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials cannot be delegated. The use of a single wildcard character is permitted when specifying the SPN. For Example: TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine TERMSRV/* Remote Desktop Session Host running on all machines. TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all machines in .humanresources.fabrikam.com This policy setting can be used in combination with the "Allow delegating default credentials" policy setting to define exceptions for specific servers that are otherwise permitted when using wildcard characters in the "Allow delegating default credentials" server list.

Internal name
DenyDefaultCredentials
Policy ID
07b742bdb337
Elements
2

Registry values

How enabled and disabled states update the registry.

ScopeRegistry locationTypeEnabled valueDisabled valueCopy
Computer
Path
Software\Policies\Microsoft\Windows\CredentialsDelegation
Value name
DenyDefaultCredentials
REG_DWORD
HKLM
1
HKLM
0
Registry location
Type REG_DWORD · Computer
Path
Software\Policies\Microsoft\Windows\CredentialsDelegation
Value name
DenyDefaultCredentials
Hive
HKLM
Enabled value
1
Disabled value
0

Policy elements

Inputs and configuration options exposed by this policy.

ScopeElementTypeRegistry mappingConstraints & behaviorCopy
Computer
Concatenate OS defaults with input above
ID ConcatenateDefaults_DDC
boolean
Path
Software\Policies\Microsoft\Windows\CredentialsDelegation
Value name
ConcatenateDefaults_DenyDefault
Type
REG_DWORD
Options: true (1), false (0)
True: Set value = 1 · False: Set value = 0
Computer
Add servers to the list:
ID DenyDefaultCredentials_Name
list
Path
Software\Policies\Microsoft\Windows\CredentialsDelegation\DenyDefaultCredentials
Value name
DenyDefaultCredentials
Type
REG_MULTI_SZ
List: additive
Concatenate OS defaults with input above
Computer · Type boolean
Registry mapping
Path
Software\Policies\Microsoft\Windows\CredentialsDelegation
Value name
ConcatenateDefaults_DenyDefault
Type
REG_DWORD
Details
Options: true (1), false (0)
True: Set value = 1 · False: Set value = 0
Add servers to the list:
Computer · Type list
Registry mapping
Path
Software\Policies\Microsoft\Windows\CredentialsDelegation\DenyDefaultCredentials
Value name
DenyDefaultCredentials
Type
REG_MULTI_SZ
Details
List: additive