Policy overview

Key metadata and intent for this policy.

ClassUser
CategoryWindows Components > Remote Desktop Services > RD Gateway
Supported onAt least Windows Server 2003 operating systems with SP1 or Windows XP Professional with SP2

Supported OS tags: Windows10, Windows10RT, Windows11, Windows7, Windows8, Windows81, WindowsRT, WindowsRT81, WindowsServer2003, WindowsServer2008, WindowsServer2012, WindowsServer2012R2, WindowsServer2016, WindowsVista, WindowsXP

Specifies the authentication method that clients must use when attempting to connect to an RD Session Host server through an RD Gateway server. You can enforce this policy setting or you can allow users to overwrite this policy setting. By default, when you enable this policy setting, it is enforced. When this policy setting is enforced, users cannot override this setting, even if they select the "Use these RD Gateway server settings" option on the client. To allow users to overwrite this policy setting, select the "Allow users to change this setting" check box. When you do this, users can specify an alternate authentication method by configuring settings on the client, using an RDP file, or using an HTML script. If users do not specify an alternate authentication method, the authentication method that you specify in this policy setting is used by default. If you disable or do not configure this policy setting, the authentication method that is specified by the user is used, if one is specified. If an authentication method is not specified, the Negotiate protocol that is enabled on the client or a smart card can be used for authentication.

Internal name
TS_GATEWAY_POLICY_AUTH_METHOD
Policy ID
fe66cf4ab575
Elements
2

Registry values

How enabled and disabled states update the registry.

No explicit registry values are set for enabled or disabled states.

Policy elements

Inputs and configuration options exposed by this policy.

ElementTypeRegistry mappingConstraints & behavior
Set RD Gateway authentication method
ID TS_GATEWAY_AUTH_MODE
enum
HKCU\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\LogonMethod
Type REG_DWORD
Options: Ask for credentials, use Negotiate protocol (5), Ask for credentials, use NTLM protocol (2), Ask for credentials, use Basic protocol (1), Use locally logged-on credentials (4), Use smart-card (3)
Allow users to change this setting
ID TS_GATEWAY_OVERRIDE
boolean
HKCU\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\AllowExplicitLogonMethod
Type REG_DWORD
Options: true (1), false ()
True: Set value = 1 · False: None

Other policies in this category

Explore related policies at the same level.