Policy overview

Key metadata and intent for this policy.

ClassComputer
CategorySystem > Credentials Delegation
Supported onAt least Windows Vista

Supported OS tags: Windows10, Windows10RT, Windows11, Windows7, Windows8, Windows81, WindowsRT, WindowsRT81, WindowsServer2008, WindowsServer2012, WindowsServer2012R2, WindowsServer2016, WindowsVista

This policy setting applies to applications using the Cred SSP component (for example: Remote Desktop Connection). This policy setting applies when server authentication was achieved by using a trusted X509 certificate or Kerberos. If you enable this policy setting, you can specify the servers to which the user's default credentials can be delegated (default credentials are those that you use when first logging on to Windows). The policy becomes effective the next time the user signs on to a computer running Windows. If you disable or do not configure (by default) this policy setting, delegation of default credentials is not permitted to any computer. Applications depending upon this delegation behavior might fail authentication. For more information, see KB. FWlink for KB: http://go.microsoft.com/fwlink/?LinkId=301508 Note: The "Allow delegating default credentials" policy setting can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials can be delegated. The use of a single wildcard character is permitted when specifying the SPN. For Example: TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine TERMSRV/* Remote Desktop Session Host running on all machines. TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all machines in .humanresources.fabrikam.com

Internal name
AllowDefaultCredentials
Policy ID
6f4e7b615b39
Elements
2

Registry values

How enabled and disabled states update the registry.

Registry locationTypeEnabled valueDisabled value
HKLM\Software\Policies\Microsoft\Windows\CredentialsDelegation\AllowDefaultCredentialsREG_DWORD
1
0

Policy elements

Inputs and configuration options exposed by this policy.

ElementTypeRegistry mappingConstraints & behavior
Concatenate OS defaults with input above
ID ConcatenateDefaults_ADC
boolean
HKLM\Software\Policies\Microsoft\Windows\CredentialsDelegation\ConcatenateDefaults_AllowDefault
Type REG_DWORD
Options: true (1), false (0)
True: Set value = 1 · False: Set value = 0
Add servers to the list:
ID AllowDefaultCredentials_Name
list
HKLM\Software\Policies\Microsoft\Windows\CredentialsDelegation\AllowDefaultCredentials\AllowDefaultCredentials
Type REG_MULTI_SZ
List: additive

Other policies in this category

Explore related policies at the same level.