Policy
Allow delegating saved credentials with NTLM-only server authentication
Windows 11 25H2
Policy overview
Key metadata and intent for this policy.
Supported OS tags: Windows10, Windows10RT, Windows11, Windows7, Windows8, Windows81, WindowsRT, WindowsRT81, WindowsServer2008, WindowsServer2012, WindowsServer2012R2, WindowsServer2016, WindowsVista
This policy setting applies to applications using the Cred SSP component (for example: Remote Desktop Connection). This policy setting applies when server authentication was achieved via NTLM. If you enable this policy setting, you can specify the servers to which the user's saved credentials can be delegated (saved credentials are those that you elect to save/remember using the Windows credential manager). If you do not configure (by default) this policy setting, after proper mutual authentication, delegation of saved credentials is permitted to Remote Desktop Session Host running on any machine (TERMSRV/*) if the client machine is not a member of any domain. If the client is domain-joined, by default the delegation of saved credentials is not permitted to any machine. If you disable this policy setting, delegation of saved credentials is not permitted to any machine. Note: The "Allow delegating saved credentials with NTLM-only server authentication" policy setting can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials can be delegated. The use of a single wildcard character is permitted when specifying the SPN. For Example: TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machine TERMSRV/* Remote Desktop Session Host running on all machines. TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all machines in humanresources.fabrikam.com
Registry values
How enabled and disabled states update the registry.
| Registry location | Type | Enabled value | Disabled value |
|---|---|---|---|
| HKLM\Software\Policies\Microsoft\Windows\CredentialsDelegation\AllowSavedCredentialsWhenNTLMOnly | REG_DWORD | 1 | 0 |
Policy elements
Inputs and configuration options exposed by this policy.
| Element | Type | Registry mapping | Constraints & behavior |
|---|---|---|---|
Concatenate OS defaults with input above ID ConcatenateDefaults_ASCN | boolean | HKLM\Software\Policies\Microsoft\Windows\CredentialsDelegation\ConcatenateDefaults_AllowSavedNTLMOnly Type REG_DWORD | Options: true (1), false (0) True: Set value = 1 · False: Set value = 0 |
Add servers to the list: ID AllowSavedCredentialsWhenNTLMOnly_Name | list | HKLM\Software\Policies\Microsoft\Windows\CredentialsDelegation\AllowSavedCredentialsWhenNTLMOnly\AllowSavedCredentialsWhenNTLMOnly Type REG_MULTI_SZ | List: additive |
Other policies in this category
Explore related policies at the same level.
- ComputerAllow delegating default credentialsAt least Windows Vista
- ComputerAllow delegating default credentials with NTLM-only server authenticationAt least Windows Vista
- ComputerAllow delegating fresh credentialsAt least Windows Vista
- ComputerAllow delegating fresh credentials with NTLM-only server authenticationAt least Windows Vista
- ComputerAllow delegating saved credentialsAt least Windows Vista
- ComputerDeny delegating default credentialsAt least Windows Vista
- ComputerDeny delegating fresh credentialsAt least Windows Vista
- ComputerDeny delegating saved credentialsAt least Windows Vista
- ComputerEncryption Oracle RemediationAt least Windows Vista
- ComputerRemote host allows delegation of non-exportable credentialsAt least Windows Server 2016, Windows 10 Version 1703
- ComputerRestrict delegation of credentials to remote serversAt least Windows Server 2012 R2, Windows 8.1 or Windows RT 8.1