Policy
Configure hash algorithms for certificate logon
Windows 11 25H2
Policy overview
Key metadata and intent for this policy.
Supported OS tags: Windows11
This policy setting controls hash or checksum algorithms used by the Kerberos client when performing certificate authentication. If you enable this policy, you will be able to configure one of four states for each algorithm: - “Default” sets the algorithm to the recommended state. - “Supported” enables usage of the algorithm. Enabling algorithms that have been disabled by default may reduce your security. - “Audited” enables usage of the algorithm and reports an event (ID 309) every time it is used. This state is intended to verify that the algorithm is not being used and can be safely disabled. - “Not Supported” disables usage of the algorithm. This state is intended for algorithms that are deemed to be insecure. If you disable or do not configure this policy, each algorithm will assume the “Default” state. More information about the hash and checksum algorithms supported by the Windows Kerberos client and their default states can be found at https://go.microsoft.com/fwlink/?linkid=2169037. Events generated by this configuration: 309, 310.
Registry values
How enabled and disabled states update the registry.
| Registry location | Type | Enabled value | Disabled value |
|---|---|---|---|
| HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters\PKINITHashAlgorithmConfigurationEnabled | REG_DWORD | 1 | 0 |
Policy elements
Inputs and configuration options exposed by this policy.
| Element | Type | Registry mapping | Constraints & behavior |
|---|---|---|---|
SHA-1 ID PKINITHashAlgorithmSHA1 | enum | HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters\PKINITSHA1 Type REG_DWORD | Options: Default (1), Supported (3), Audited (2), Not Supported (0) |
SHA-256 ID PKINITHashAlgorithmSHA256 | enum | HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters\PKINITSHA256 Type REG_DWORD | Options: Default (1), Supported (3), Audited (2), Not Supported (0) |
SHA-384 ID PKINITHashAlgorithmSHA384 | enum | HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters\PKINITSHA384 Type REG_DWORD | Options: Default (1), Supported (3), Audited (2), Not Supported (0) |
SHA-512 ID PKINITHashAlgorithmSHA512 | enum | HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters\PKINITSHA512 Type REG_DWORD | Options: Default (1), Supported (3), Audited (2), Not Supported (0) |
Other policies in this category
Explore related policies at the same level.
- ComputerAllow name-based strong mappings for certificatesAt least Windows Server 2019, Windows 10 Version 2004
- ComputerKDC support for claims, compound authentication and Kerberos armoringAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerKDC support for PKInit Freshness ExtensionAt least Windows Server 2016, Windows 10
- ComputerProvide information about previous logons to client computersAt least Windows Vista
- ComputerRequest compound authenticationAt least Windows Server 2012 R2, Windows 8.1 or Windows RT 8.1
- ComputerUse forest search orderAt least Windows Server 2008 R2 or Windows 7
- ComputerWarning for large Kerberos ticketsAt least Windows Server 2012, Windows 8 or Windows RT