Allow delegating saved credentials

This policy setting applies to applications using the Cred SSP component (for example: Remote Desktop Connection).This policy setting applies when server authentication was achieved via a trusted X509 certificate or Kerberos.If you enable this policy setting you can specify the servers to which the user's saved credentials can be delegated (saved credentials are those that you elect to save/remember using the Windows credential manager).If you do not configure (by default) this policy setting after proper mutual authentication delegation of saved credentials is permitted to Remote Desktop Session Host running on any machine (TERMSRV/*).If you disable this policy setting delegation of saved credentials is not permitted to any machine.Note: The "Allow delegating saved credentials" policy setting can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials can be delegated. The use of a single wildcard character is permitted when specifying the SPN.For Example:TERMSRV/host.humanresources.fabrikam.com Remote Desktop Session Host running on host.humanresources.fabrikam.com machineTERMSRV/* Remote Desktop Session Host running on all machines.TERMSRV/*.humanresources.fabrikam.com Remote Desktop Session Host running on all machines in humanresources.fabrikam.com

Policy path: 

System\Credentials Delegation

Scope: 

Machine

Supported on: 

At least Windows Vista

Registry settings: 

HKLM\Software\Policies\Microsoft\Windows\CredentialsDelegation!AllowSavedCredentials; HKLM\Software\Policies\Microsoft\Windows\CredentialsDelegation\AllowSavedCredentials HKLM\Software\Policies\Microsoft\Windows\CredentialsDelegation!ConcatenateDefaults_AllowSaved

Filename: 

CredSsp.admx

Related content