Allow Delegating Default Credentials

This policy setting applies to applications using the Cred SSP component (for example: Terminal Server).

This policy applies when server authentication was achieved via a trusted X509 certificate or Kerberos.

If you enable this policy setting you can specify the servers to which the user's default credentials can be delegated (default credentials are those that you use when first logging on to Windows).

If you disable or do not configure (by default) this policy setting, delegation of default credentials is not permitted to any machine.

Note: The "Allow Delegating Default Credentials" can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials can be delegated. The use of a single wildcard is permitted when specifying the SPN.

For Example:
TERMSRV/ Terminal server running on machine
TERMSRV/* Terminal server running on all machines.
TERMSRV/* Terminal server running on all machines in

Supported on: At least Windows Vista

Registry PathSoftware\Policies\Microsoft\Windows\CredentialsDelegation
Value NameAllowDefaultCredentials
Enabled Value1
Disabled Value0

Add servers to the list:

Registry PathSoftware\Policies\Microsoft\Windows\CredentialsDelegation\AllowDefaultCredentials
Value Name{number}
Value TypeREG_SZ
Default Value
Concatenate OS defaults with input above
Registry PathSoftware\Policies\Microsoft\Windows\CredentialsDelegation
Value NameConcatenateDefaults_AllowDefault
Default Value1
True Value1
False Value0


Administrative Templates (Computers)

Administrative Templates (Users)