Skip to content

Commit 25e95d5

Browse files
Merge pull request #11454 from Justinha/epow
Epow
2 parents 943eacd + 2b24e9c commit 25e95d5

File tree

5 files changed

+160
-9
lines changed

5 files changed

+160
-9
lines changed
Lines changed: 146 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,146 @@
1+
---
2+
title: Enable Microsoft Entra passkey on Windows devices (preview)
3+
description: Learn how to enable Microsoft Entra passkey on Windows devices for phishing-resistant multifactor authentication with work or school accounts.
4+
#customer intent: As an administrator, I want to enable Microsoft Entra passkeys so users with work and school accounts can sign in by using phishing-resistant multifactor authentication.
5+
author: hanki71
6+
ms.author: justinha
7+
ms.date: 02/18/2026
8+
ms.topic: how-to
9+
ms.service: entra-id
10+
ms.subservice: authentication
11+
ms.collection: msec-ai-copilot
12+
ms.custom: msecd-doc-authoring-106
13+
---
14+
15+
# Enable Microsoft Entra passkey on Windows (preview)
16+
17+
This article describes Microsoft Entra passkey on Windows in public preview. It covers how they work, how they differ from Windows Hello for Business, and how to configure passkey profiles to allow Windows Hello as a passkey provider.
18+
19+
Microsoft Entra passkey on Windows is currently in public preview and requires opt-in. You need to explicitly configure them to enable the preview of passkey registration in Windows Hello.
20+
21+
## Overview
22+
23+
Microsoft Entra passkey on Windows allows users to register passkeys (FIDO2) directly into their device's local Windows Hello container and use them to sign in to Microsoft Entra ID. Microsoft Entra passkey on Windows enables phishing-resistant sign-in by using a Windows Hello biometric or PIN without requiring the device to be Microsoft Entra joined or registered.
24+
25+
By using Microsoft Entra passkey on Windows:
26+
27+
- Users can register passkeys (FIDO2) in the local Windows Hello container.
28+
- Devices don't need to be joined or registered to Microsoft Entra to use a local Windows passkey.
29+
- A single Windows PC can store multiple passkeys for multiple Microsoft Entra accounts.
30+
- Passkeys (FIDO2) registered in Windows Hello are governed by Microsoft Entra passkey (FIDO2) policies and passkey profiles.
31+
32+
## How Microsoft Entra passkey on Windows works
33+
34+
Windows Hello acts as a secure local credential container on Windows devices. The container is protected by user-presence verification such as:
35+
36+
- PIN
37+
- Fingerprint
38+
- Facial recognition
39+
40+
Microsoft Entra passkey on Windows allows passkeys (FIDO2) to be created and stored inside this Windows Hello container and used for authentication to Microsoft Entra ID.
41+
42+
This behavior also applies when the device is governed by Windows Hello for Business policies configured through Microsoft Intune. However, passkeys (FIDO2) are distinct from the Windows Hello for Business credentials that may be automatically registered during device registration to Microsoft Entra ID.
43+
44+
## Supported Windows Hello passkey Authenticator Attestation GUIDs (AAGUIDs)
45+
46+
During public preview, Windows Hello passkeys are identified and controlled by using the following AAGUIDs. These AAGUIDs must be explicitly allowed in a passkey profile to enable registration.
47+
48+
| Windows Hello authenticator | AAGUID | Description |
49+
|----|----|----|
50+
| Windows Hello Hardware Authenticator | 08987058-cadc-4b81-b6e1-30de50dcbe96 | Private key stored in a hardware-based TPM. |
51+
| Windows Hello VBS Hardware Authenticator | 9ddd1817-af5a-4672-a2b9-3e3dd95000a9 | Virtualization-based Security (VBS) uses hardware virtualization and the Windows hypervisor to store private keys in the host machine's TPM. |
52+
| Windows Hello Software Authenticator | 6028b017-b1d4-4c02-b4b3-afcdafc96bb2 | Private key stored in a software-based TPM. |
53+
54+
These AAGUIDs represent Windows Hello passkey providers and are used in passkey profiles to allow or block registration.
55+
56+
## How Microsoft Entra passkey on Windows compares with Windows Hello for Business
57+
58+
Although both features use Windows Hello, Microsoft Entra passkey on Windows and Windows Hello for Business have different purposes and behavior.
59+
60+
### Windows Hello for Business
61+
62+
- Windows Hello for Business credentials are automatically provisioned on some Microsoft Entra joined or registered devices during device registration.
63+
- The credential is tied only to the Microsoft Entra account used to register the device.
64+
- Windows Hello for Business credentials are passkeys using a first-party (1P) protocol, but not FIDO2 passkeys.
65+
- Windows Hello for Business enables device sign-in using facial recognition, fingerprint, or PIN protected by Windows Hello.
66+
- Windows Hello for Business provides single sign-on (SSO) to Microsoft Entra-integrated resources after device sign-in.
67+
- Windows Hello for Business is primarily a device-bound sign-in method linked to device trust.
68+
- Registration and authentication aren't controlled by the Microsoft Entra Authentication Methods Passkey (FIDO2) policy.
69+
70+
### Microsoft Entra passkey on Windows
71+
72+
- Microsoft Entra passkey on Windows is a FIDO2 passkey.
73+
- They can be registered without device join or registration.
74+
- Users can register multiple passkeys for multiple Microsoft Entra accounts on the same device.
75+
- Registration and authentication are controlled by using Microsoft Entra Authentication Methods Passkey (FIDO2) policy.
76+
- They can't be used for device sign-in.
77+
78+
> [!NOTE]
79+
> If you're on a Microsoft Entra joined or Microsoft Entra registered device, setting up Windows Hello might automatically register a Windows Hello for Business credential for the device's linked account. If you then attempt to register a passkey on Windows for that same account, registration fails because the Windows Hello for Business credential already exists. On retry, you'll see an error indicating the passkey is already registered.
80+
81+
| Feature | Microsoft Entra passkey on Windows | Windows Hello for Business |
82+
|---|---|---|
83+
| Standard base | FIDO2 | FIDO2 for authentication, first-party (1P) protocol for device sign-in |
84+
| Registration | User-initiated, doesn't require device join or registration | Automatically provisioned on some Microsoft Entra joined or registered devices during device registration |
85+
| Device sign-in and single sign-on (SSO) | N/A | Enables device sign-in and SSO to Microsoft Entra-integrated resources after device sign-in |
86+
| Passkey type | Device-bound | Device-bound |
87+
| Credential binding | Bound to the device and stored in the local Windows Hello container. Users can register multiple passkeys for multiple work or school accounts on the same device. | Primarily a device-bound sign-in method linked to device trust. The credential is tied only to the work or school account used to register the device. |
88+
| Management | Microsoft Entra ID Authentication methods policy | Microsoft Intune<br>Group Policy |
89+
90+
## Attestation support
91+
92+
Attestation isn't supported for Microsoft Entra passkey on Windows during public preview. As a result, if **Enforce attestation** is enabled in a passkey profile that allows Windows Hello AAGUIDs, passkey registration attempts to Windows Hello will fail.
93+
94+
In the Authentication methods policy in the Microsoft Entra admin center, ensure that **Enforce attestation** is set to **No** for any passkey profile that includes Windows Hello AAGUIDs during public preview.
95+
96+
## How to configure passkeys on Windows
97+
98+
During public preview, Microsoft Entra passkey on Windows requires an Authentication Policy Administrator to explicitly opt in.
99+
100+
To enable registration, you need to meet all of the following prerequisites and configuration requirements.
101+
102+
### Prerequisites
103+
104+
- Windows 10 or Windows 11
105+
- Device must support Windows Hello
106+
107+
### Required configuration
108+
109+
- You must explicitly include the Windows Hello AAGUIDs in an allow list in a passkey profile.
110+
- Attestation must not be enforced.
111+
- Key restrictions must be enabled.
112+
113+
:::image type="content" source="media/how-to-authentication-entra-passkeys-on-windows/passkey-profile.png" alt-text="Screenshot of the passkey profile configuration settings showing Windows Hello AAGUIDs configuration options.":::
114+
115+
> [!NOTE]
116+
> During public preview, passkey registration in Windows Hello is blocked unless the Windows Hello AAGUIDs are explicitly allowed in a passkey profile. For General Availability, you won’t be required to explicitly allow Windows Hello AAGUIDs.
117+
118+
## FAQ
119+
120+
**Question**: What is the use case for Microsoft Entra passkey on Windows?
121+
122+
**Answer**: Use Microsoft Entra passkey on Windows when:
123+
124+
- You want passkeys (FIDO2) stored locally on Windows.
125+
- Users access multiple Microsoft Entra accounts from a single PC.
126+
- You want standards-based, phishing-resistant sign-in to Microsoft Entra on unregistered, personal, or shared devices.
127+
128+
**Question**: Does Microsoft Entra passkey on Windows replace Windows Hello for Business?
129+
130+
**Answer**: No. Microsoft Entra passkey on Windows doesn't replace Windows Hello for Business. Windows Hello for Business remains the recommended solution for signing into corporate managed, Microsoft Entra joined or registered devices. Microsoft Entra passkey on Windows complements Windows Hello for Business by enabling passkeys (FIDO2) on Windows in scenarios where devices aren't joined or registered. Microsoft Entra passkey on Windows doesn't support device sign-in.
131+
132+
> [!NOTE]
133+
> Users can't register a passkey on Windows if a Windows Hello for Business credential already exists for the same account and container. This block may not apply once the user exceeds 50 total platform credentials.
134+
135+
**Question**: Are Microsoft Entra passkeys synced?
136+
137+
**Answer**: No. Microsoft Entra passkey on Windows is device-bound and stored in the local Windows Hello container. It isn't synced across devices. Each device requires a separate passkey registration for each Microsoft Entra account.
138+
139+
## Known issues
140+
141+
During public preview, if a tenant allows Microsoft Entra passkey on Windows and a user registers a passkey, it appears in the user's list of usable authentication methods in the Microsoft Entra admin center. If the tenant later removes the Windows Hello AAGUIDs from the allow list, the registered passkey remains on the usable authentication methods list instead of moving to the non-usable methods list. Although the passkey appears as usable, authentication with the passkey is governed by the current passkey (FIDO2) policy. If the Windows Hello AAGUIDs are no longer allowed, the passkey can't be used to authenticate. This display issue will be fixed for General Availability.
142+
143+
## Related content
144+
145+
- [How to enable passkey (FIDO2) profiles in Microsoft Entra ID (preview)](how-to-authentication-passkey-profiles.md)
146+
- [Microsoft Entra ID attestation for FIDO2 authenticators](concept-fido2-hardware-vendor.md)

0 commit comments

Comments
 (0)