edge://flags/#edge-windows-credentials-for-http-auth gone

%3CLINGO-SUB%20id%3D%22lingo-sub-1359367%22%20slang%3D%22en-US%22%3Eedge%3A%2F%2Fflags%2F%23edge-windows-credentials-for-http-auth%20gone%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1359367%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%3C%2FP%3E%3CP%3Ehow%20to%20Enable%26nbsp%3Bedge%3A%2F%2Fflags%2F%23edge-windows-credentials-for-http-auth%20type%20of%20behavior%20as%20that%20flag%20seems%20to%20be%20gone%20in%20%3CSPAN%3E84.0.495.2%20(or%20some%20other%20relative%20recent%20build)%3C%2FSPAN%3E%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EEarlier%20discussion%20of%20why%20it%20is%20needed%20and%20used%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fdiscussions%2Fearly-preview-of-microsoft-edge-group-policies%2Fm-p%2F1113340%23M21906%22%20target%3D%22_self%22%3Ehere%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fdiscussions%2Fwindows-integrated-authentication-dialog-box-prompt-for%2Fm-p%2F1002488%22%20target%3D%22_self%22%3Ehere%3C%2FA%3E.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1381870%22%20slang%3D%22en-US%22%3ERe%3A%20edge%3A%2F%2Fflags%2F%23edge-windows-credentials-for-http-auth%20gone%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1381870%22%20slang%3D%22en-US%22%3E%3CP%3EBump.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1431680%22%20slang%3D%22en-US%22%3ERe%3A%20edge%3A%2F%2Fflags%2F%23edge-windows-credentials-for-http-auth%20gone%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1431680%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F40373%22%20target%3D%22_blank%22%3E%40Jussi%20Palo%3C%2FA%3E%26nbsp%3BThanks%20for%20reaching%20out.%20As%20I'm%20sure%20you%20know%2C%20the%20flags%20are%20all%20experimental%2C%20and%20can%20unfortunately%20come%20and%20go%20while%20they%20are%20in%20testing.%20However%2C%20I%20hear%20that%20there's%20a%20need%20for%20this%20functionality%2C%20so%20I've%20looped%20the%20team%20in.%20I'll%20let%20you%20know%20if%20they%20have%20any%20insights%20to%20share!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CI%3EFawkes%20(they%2Fthem)%3CBR%20%2F%3E%3CBR%20%2F%3EProject%20%26amp%3B%20Community%20Manager%20-%20Microsoft%20Edge%3CI%3E%3C%2FI%3E%3C%2FI%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1432180%22%20slang%3D%22en-US%22%3ERe%3A%20edge%3A%2F%2Fflags%2F%23edge-windows-credentials-for-http-auth%20gone%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1432180%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F40373%22%20target%3D%22_blank%22%3E%40Jussi%20Palo%3C%2FA%3E%26nbsp%3BGreat%20news%3A%20after%20reviewing%20your%20feedback%2C%20the%20team%20realized%20how%20important%20it%20was%20for%20some%20of%20our%20users%2C%20and%20has%20decided%20to%20re-enable%20this%20flag!%20They've%20created%20a%20work%20item%20for%20this%2C%20so%20you%20should%20see%20the%20flag%20back%20in%20the%20preview%20channels%20in%20the%20near%20future.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHope%20that%20helps%2C%20and%20please%20let%20us%20know%20if%20you%20have%20any%20other%20feedback.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CI%3EFawkes%20(they%2Fthem)%3CBR%20%2F%3E%3CBR%20%2F%3EProject%20%26amp%3B%20Community%20Manager%20-%20Microsoft%20Edge%3CI%3E%3C%2FI%3E%3C%2FI%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1433513%22%20slang%3D%22en-US%22%3ERe%3A%20edge%3A%2F%2Fflags%2F%23edge-windows-credentials-for-http-auth%20gone%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1433513%22%20slang%3D%22en-US%22%3EThat's%20great%20news%2C%20thank%20you%20so%20much.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1433807%22%20slang%3D%22en-US%22%3ERe%3A%20edge%3A%2F%2Fflags%2F%23edge-windows-credentials-for-http-auth%20gone%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1433807%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F40373%22%20target%3D%22_blank%22%3E%40Jussi%20Palo%3C%2FA%3E%26nbsp%3BSure%20thing%2C%20we're%20happy%20to%20help%20whenever%20we%20can!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CI%3EFawkes%20(they%2Fthem)%3CBR%20%2F%3E%3CBR%20%2F%3EProject%20%26amp%3B%20Community%20Manager%20-%20Microsoft%20Edge%3CI%3E%3C%2FI%3E%3C%2FI%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1441580%22%20slang%3D%22en-US%22%3ERe%3A%20edge%3A%2F%2Fflags%2F%23edge-windows-credentials-for-http-auth%20gone%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1441580%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F40373%22%20target%3D%22_blank%22%3E%40Jussi%20Palo%3C%2FA%3E%26nbsp%3BThe%20engineering%20team%20just%20let%20me%20know%20that%20this%20change%20is%20now%20in%20Canary%20and%20will%20be%20working%20its%20way%20up%20the%20channels%20will%20subsequent%20updates.%20%3A)%3C%2Fimg%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CI%3EFawkes%20(they%2Fthem)%3CBR%20%2F%3E%3CBR%20%2F%3EProject%20%26amp%3B%20Community%20Manager%20-%20Microsoft%20Edge%3CI%3E%3C%2FI%3E%3C%2FI%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1458348%22%20slang%3D%22en-US%22%3ERe%3A%20edge%3A%2F%2Fflags%2F%23edge-windows-credentials-for-http-auth%20gone%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1458348%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F484598%22%20target%3D%22_blank%22%3E%40fawkes%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHi%20Fawkes%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20is%20great%20news.%20What%20would%20be%20even%20better%20is%20that%20if%20this%20setting%20could%20be%20managed%20through%20a%20GPO.%20Do%20you%20think%20this%20would%20be%20possible%20as%20it%20would%20simplify%20the%20roll%20out%20of%20the%20setting%20a%20lot.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBest%20regards%20Fredrik%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1459578%22%20slang%3D%22en-US%22%3ERe%3A%20edge%3A%2F%2Fflags%2F%23edge-windows-credentials-for-http-auth%20gone%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1459578%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F439935%22%20target%3D%22_blank%22%3E%40Fredrik_Freden%3C%2FA%3E%26nbsp%3BI%20know%20our%20team%20has%20looked%20into%20creating%20a%20GPO%2C%20but%20there%20are%20currently%20some%20confounding%20factors.%20I'll%20let%20them%20know%20that%20there%20is%20interest%20in%20it%2C%20though%2C%20and%20let%20you%20know%20if%20there%20is%20a%20change%20of%20plans!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CI%3EFawkes%20(they%2Fthem)%3CBR%20%2F%3E%3CBR%20%2F%3EProject%20%26amp%3B%20Community%20Manager%20-%20Microsoft%20Edge%3CI%3E%3C%2FI%3E%3C%2FI%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1462633%22%20slang%3D%22en-US%22%3ERe%3A%20edge%3A%2F%2Fflags%2F%23edge-windows-credentials-for-http-auth%20gone%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1462633%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F484598%22%20target%3D%22_blank%22%3E%40fawkes%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThank%20you.%20I%20really%20hope%20you%20have%20a%20solution%20for%20this.%20I%20am%20pretty%20sure%20I%20am%20not%20the%20only%20one%20in%20the%20enterprise%20market%20that%20uses%20old%20third%20party%20systems%20that%20we%20have%20no%20control%20over.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20most%20important%20thing%20is%20that%20the%20flag%20is%20there%20and%20that%20it%20is%20possible%20to%20fix%20it%20even%20if%20I%20have%20to%20configure%20every%20computer%20manually%20but%20the%20GPO%20would%20really%20make%20life%20easier.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBest%20regards%20Fredrik%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1463828%22%20slang%3D%22en-US%22%3ERe%3A%20edge%3A%2F%2Fflags%2F%23edge-windows-credentials-for-http-auth%20gone%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1463828%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F439935%22%20target%3D%22_blank%22%3E%40Fredrik_Freden%3C%2FA%3E%26nbsp%3BThanks%20for%20the%20details%2C%20Fredrik.%20Knowing%20more%20about%20individual%20and%20org%20use%20cases%20provides%20a%20more%20complete%20picture%20of%20everyone's%20needs.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CI%3EFawkes%20(they%2Fthem)%3CBR%20%2F%3E%3CBR%20%2F%3EProject%20%26amp%3B%20Community%20Manager%20-%20Microsoft%20Edge%3CI%3E%3C%2FI%3E%3C%2FI%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Contributor

Hi,

how to Enable edge://flags/#edge-windows-credentials-for-http-auth type of behavior as that flag seems to be gone in 84.0.495.2 (or some other relative recent build)?

 

Earlier discussion of why it is needed and used here and here.

21 Replies

@Jussi Palo Thanks for reaching out. As I'm sure you know, the flags are all experimental, and can unfortunately come and go while they are in testing. However, I hear that there's a need for this functionality, so I've looped the team in. I'll let you know if they have any insights to share!

 

Fawkes (they/them)
Project & Community Manager - Microsoft Edge

@Jussi Palo Great news: after reviewing your feedback, the team realized how important it was for some of our users, and has decided to re-enable this flag! They've created a work item for this, so you should see the flag back in the preview channels in the near future.

 

Hope that helps, and please let us know if you have any other feedback.

 

Fawkes (they/them)
Project & Community Manager - Microsoft Edge

That's great news, thank you so much.

@Jussi Palo Sure thing, we're happy to help whenever we can!

 

Fawkes (they/them)
Project & Community Manager - Microsoft Edge

@Jussi Palo The engineering team just let me know that this change is now in Canary and will be working its way up the channels will subsequent updates. :)

 

Fawkes (they/them)
Project & Community Manager - Microsoft Edge

@Deleted 

 

Hi Fawkes 

 

This is great news. What would be even better is that if this setting could be managed through a GPO. Do you think this would be possible as it would simplify the roll out of the setting a lot.

 

Best regards Fredrik

@Fredrik_Freden I know our team has looked into creating a GPO, but there are currently some confounding factors. I'll let them know that there is interest in it, though, and let you know if there is a change of plans!

 

Fawkes (they/them)
Project & Community Manager - Microsoft Edge

@Deleted 

 

Thank you. I really hope you have a solution for this. I am pretty sure I am not the only one in the enterprise market that uses old third party systems that we have no control over.

 

The most important thing is that the flag is there and that it is possible to fix it even if I have to configure every computer manually but the GPO would really make life easier.

 

Best regards Fredrik

@Fredrik_Freden Thanks for the details, Fredrik. Knowing more about individual and org use cases provides a more complete picture of everyone's needs.

 

Fawkes (they/them)
Project & Community Manager - Microsoft Edge

The flag is no longer working.

@Keith Davis 

 

The Beta 88.0.705.45 has the flag but the Canary 89.0.767.0 has not. Is this what you found out as well?

 

I see that all Fawkes entries are changed to anonymous. I guess he doesn't work for Microsoft anymore.

 

@josh_bodner 

 

Removing this flag destroys my companys setup and I will be forced to disable updates all together if you can't bring back the flag. 

 

We are many who need this flag and a better way to handle it (GPO). This creates a lot of headache and it has been like this for over a year now. Is it really not possible to fix this?

Yes, can confirm it is now gone at least in v. 89.0.760.0. @josh_bodner

@Jussi Palo @Fredrik_Freden Thanks for updating this post that the flag is no longer available! I wanted to let you know that I'm looking into this, but today's a holiday so I likely won't hear back until tomorrow. Thanks for your patience and I'll update here when I know more!

@Jussi Palo @Keith Davis @Fredrik_Freden Thanks for your patience as I looked into this!

 

The flag disappearing in version 89 is by design, end users will have no UX to control this behavior. The current setup uses Windows Credentials for now, however the team is working on a policy allowing admins to disable the experience and use the basic prompt instead of Windows credential UI. The GPO is expected in Microsoft Edge 90. You can check out the release schedule for the Beta and Stable channels here.

 

Please let me know if you have any questions, and I'll keep an eye on this thread. =)

-Alex

@Alexandra-R 

 

Hi Alex

 

Thank you for sharing this information with us. As you describe it this sounds awesome, just have to skip V. 89 but I will gladly do that If V.90 brings a solution.

 

I have one question, I can't find any information about this on the roadmap.

 

Microsoft 365 Roadmap | Microsoft 365

 

Any idea why?

 

Best regards Fredrik

@Alexandra-R 

 

Thanks for the update. However, I'm still confused about why this is even changing. Why would Microsoft not want users to be able to use password managers, like LastPass, for their login? How is using Windows Credentials supposed to even replace this?

@Keith Davis 

 

As far as I understand this is the behavior when using Windows Integreated Authentication. You can use Windows Integrated Authentication to apply single sign on based on your domain credentials and in this case you will not need a password manager.

 

The problem in my company is that some of our partners have built sites with Windows Integrated Authenticatio. We are not part of their domain and Windows Integrated Authentication will not work because of this. This is when the "bad" credential popup arrives and destroys my day.

 

So if we get a GPO to adjust this behavior everybody will be happy.