Policy
KDC support for PKInit Freshness Extension
Windows 11 25H2
Policy overview
Key metadata and intent for this policy.
Supported OS tags: Windows10, Windows10RT, Windows11, WindowsServer2016
Support for PKInit Freshness Extension requires Windows Server 2016 domain functional level (DFL). If the domain controller’s domain is not at Windows Server 2016 DFL or higher this policy will not be applied. This policy setting allows you to configure a domain controller (DC) to support the PKInit Freshness Extension. If you enable this policy setting, the following options are supported: Supported: PKInit Freshness Extension is supported on request. Kerberos clients successfully authenticating with the PKInit Freshness Extension will get the fresh public key identity SID. Required: PKInit Freshness Extension is required for successful authentication. Kerberos clients which do not support the PKInit Freshness Extension will always fail when using public key credentials. If you disable or not configure this policy setting, then the DC will never offer the PKInit Freshness Extension and accept valid authentication requests without checking for freshness. Users will never receive the fresh public key identity SID.
Registry values
How enabled and disabled states update the registry.
No explicit registry values are set for enabled or disabled states.
Policy elements
Inputs and configuration options exposed by this policy.
| Element | Type | Registry mapping | Constraints & behavior |
|---|---|---|---|
PKInit Freshness Extension options: ID PKINITFreshness_Levels | enum | HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters\PKINITFreshness Type REG_DWORD | Options: Disabled (0), Supported (1), Required (2) |
Other policies in this category
Explore related policies at the same level.
- ComputerAllow name-based strong mappings for certificatesAt least Windows Server 2019, Windows 10 Version 2004
- ComputerConfigure hash algorithms for certificate logonAt least Windows 11 Version 22H2
- ComputerKDC support for claims, compound authentication and Kerberos armoringAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerProvide information about previous logons to client computersAt least Windows Vista
- ComputerRequest compound authenticationAt least Windows Server 2012 R2, Windows 8.1 or Windows RT 8.1
- ComputerUse forest search orderAt least Windows Server 2008 R2 or Windows 7
- ComputerWarning for large Kerberos ticketsAt least Windows Server 2012, Windows 8 or Windows RT