Allow Delegating Fresh Credentials

This policy setting applies to applications using the Cred SSP component (for example: Terminal Server).

This policy applies when server authentication was achieved via a trusted X509 certificate or Kerberos.

If you enable this policy setting you can specify the servers to which the user's fresh credentials can be delegated (fresh credentials are those that you are prompted for when executing the application).

If you do not configure (by default) this policy setting, after proper mutual authentication, delegation of fresh credentials is permitted to Terminal Server running on any machine (TERMSRV/*).

If you disable this policy setting delegation of fresh credentials is not permitted to any machine.

Note: The "Allow Delegating Fresh Credentials" can be set to one or more Service Principal Names (SPNs). The SPN represents the target server to which the user credentials can be delegated. The use of a single wildcard is permitted when specifying the SPN.

For Example:
TERMSRV/host.humanresources.fabrikam.com
Terminal server running on host.humanresources.fabrikam.com machine
TERMSRV/* Terminal server running on all machines.
TERMSRV/*.humanresources.fabrikam.com Terminal server running on all machines in .humanresources.fabrikam.com

Supported on: At least Windows Vista

Registry HiveHKEY_LOCAL_MACHINE
Registry PathSoftware\Policies\Microsoft\Windows\CredentialsDelegation
Value NameAllowFreshCredentials
Value TypeREG_DWORD
Enabled Value1
Disabled Value0

Add servers to the list:

Registry HiveHKEY_LOCAL_MACHINE
Registry PathSoftware\Policies\Microsoft\Windows\CredentialsDelegation\AllowFreshCredentials
Value Name{number}
Value TypeREG_SZ
Default Value
Concatenate OS defaults with input above
Registry HiveHKEY_LOCAL_MACHINE
Registry PathSoftware\Policies\Microsoft\Windows\CredentialsDelegation
Value NameConcatenateDefaults_AllowFresh
Value TypeREG_DWORD
Default Value1
True Value1
False Value0

credssp.admx

Administrative Templates (Computers)

Administrative Templates (Users)