Policy
Configure the level of TPM owner authorization information available to the operating system
Windows 11 25H2
Policy overview
Key metadata and intent for this policy.
Supported OS tags: Windows10, Windows10RT, Windows11, Windows8, Windows81, WindowsRT, WindowsRT81, WindowsServer2012, WindowsServer2012R2, WindowsServer2016
This policy setting configures how much of the TPM owner authorization information is stored in the registry of the local computer. Depending on the amount of TPM owner authorization information stored locally, the operating system and TPM-based applications can perform certain TPM actions which require TPM owner authorization without requiring the user to enter the TPM owner password. You can choose to have the operating system store either the full TPM owner authorization value, the TPM administrative delegation blob plus the TPM user delegation blob, or none. If you enable this policy setting, Windows will store the TPM owner authorization in the registry of the local computer according to the operating system managed TPM authentication setting you choose. Choose the operating system managed TPM authentication setting of "Full" to store the full TPM owner authorization, the TPM administrative delegation blob and the TPM user delegation blob in the local registry. This setting allows use of the TPM without requiring remote or external storage of the TPM owner authorization value. This setting is appropriate for scenarios which do not depend on preventing reset of the TPM anti-hammering logic or changing the TPM owner authorization value. Some TPM-based applications may require this setting be changed before features which depend on the TPM anti-hammering logic can be used. Choose the operating system managed TPM authentication setting of "Delegated" to store only the TPM administrative delegation blob and the TPM user delegation blob in the local registry. This setting is appropriate for use with TPM-based applications that depend on the TPM anti-hammering logic. Choose the operating system managed TPM authentication setting of "None" for compatibility with previous operating systems and applications or for use with scenarios that require TPM owner authorization not be stored locally. Using this setting might cause issues with some TPM-based applications. Note: If the operating system managed TPM authentication setting is changed from "Full" to "Delegated", the full TPM owner authorization value will be regenerated and any copies of the original TPM owner authorization value will be invalid.
Registry values
How enabled and disabled states update the registry.
No explicit registry values are set for enabled or disabled states.
Policy elements
Inputs and configuration options exposed by this policy.
| Element | Type | Registry mapping | Constraints & behavior |
|---|---|---|---|
Operating system managed TPM authentication level: ID SelectOSManagedAuthLevel | enum | HKLM\Software\Policies\Microsoft\TPM\OSManagedAuthLevel Type REG_DWORD | Options: Full (4), Delegated (2), None (0) |
Other policies in this category
Explore related policies at the same level.
- ComputerConfigure the list of blocked TPM commandsAt least Windows Vista
- ComputerConfigure the system to clear the TPM if it is not in a ready state.At least Windows Server 2016, Windows 10 Version 1709
- ComputerConfigure the system to use legacy Dictionary Attack Prevention Parameters setting for TPM 2.0.At least Windows Server 2016, Windows 10 Version 1703
- ComputerIgnore the default list of blocked TPM commandsAt least Windows Vista
- ComputerIgnore the local list of blocked TPM commandsAt least Windows Vista
- ComputerStandard User Individual Lockout ThresholdAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerStandard User Lockout DurationAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerStandard User Total Lockout ThresholdAt least Windows Server 2012, Windows 8 or Windows RT