Enable passwordless sign in for Azure AD (preview)


  • Azure Multi-Factor Authentication
  • Combined registration preview
  • FIDO2 security key preview requires compatible FIDO2 security keys
  • WebAuthN requires Microsoft Edge on Windows 10 version 1809 or higher
  • FIDO2 based Windows sign in requires Azure AD joined Windows 10 version 1809 or higher

Prepare devices for preview

Devices that you will be piloting with must be running Windows 10 version 1809 or higher. The best experience is on Windows 10 version 1903 or higher.

Enable security keys for Windows sign in

Organizations may choose to use one or more of the following methods to enable the use of security keys for Windows sign in.

Enable credential provider via Intune

  1. Sign in to the Azure portal.
  2. Browse to Microsoft Intune > Device enrollment > Windows enrollment > Windows Hello for Business > Properties.
  3. Under Settings set Use security keys for sign-in to Enabled.

Configuration of security keys for sign in, is not dependent on configuring Windows Hello for Business.

Enable targeted Intune deployment

To target specific device groups to enable the credential provider, use the following custom settings via Intune.

  1. Sign in to the Azure portal.
  2. Browse to Microsoft Intune > Device configuration > Profiles > Create profile.
  3. Configure the new profile with the following settings
    1. Name: Security Keys for Windows Sign-In
    2. Description: Enables FIDO Security Keys to be used during Windows Sign In
    3. Platform: Windows 10 and later
    4. Platform type: Custom
    5. Custom OMA-URI Settings:
      1. Name: Turn on FIDO Security Keys for Windows Sign-In
      2. OMA-URI: ./Device/Vendor/MSFT/PassportForWork/SecurityKey/UseSecurityKeyForSignin
      3. Data Type: Integer
      4. Value: 1
  4. This policy can be assigned to specific users, devices, or groups. More information can be found in the article Assign user and device profiles in Microsoft Intune.

Intune custom device configuration policy creation

Enable credential provider via provisioning package

For devices not managed by Intune, a provisioning package can be installed to enable the functionality. The Windows Configuration Designer app can be installed from the Microsoft Store.

  1. Launch the Windows Configuration Designer.
  2. Select File > New project.
  3. Give your project a name and take note of the path where your project is created.
  4. Select Next.
  5. Leave Provisioning package selected as the Selected project workflow and select Next.
  6. Select All Windows desktop editions under Choose which settings to view and configure and select Next.
  7. Select Finish.
  8. In your newly created project, browse to Runtime settings > WindowsHelloForBusiness > SecurityKeys > UseSecurityKeyForSignIn.
  9. Set UseSecurityKeyForSignIn to Enabled.
  10. Select Export > Provisioning package
  11. Leave the defaults in the Build window under Describe the provisioning package and select Next.
  12. Leave the defaults in the Build window under Select security details for the provisioning package and select Next.
  13. Take note of or change the path in the Build windows under Select where to save the provisioning package and select Next.
  14. Select Build on the Build the provisioning package page.
  15. Save the two files created (ppkg and cat) to a location where you can apply them to machines later.
  16. Follow the guidance in the article Apply a provisioning package, to apply the provisioning package you created.

Obtain FIDO2 security keys

See the section FIDO2 Security Keys, in the article What is passwordless? for more information about supported keys and manufacturers.


If you purchase and plan to use NFC based security keys you will need a supported NFC reader.

Enable passwordless authentication methods

Enable the combined registration experience

Registration features for FIDO2 security keys rely on the combined registration preview. Follow the steps below to enable the combined registration preview.

  1. Sign in to the Azure portal
  2. Browse to Azure Active Directory > User Settings
    1. Click on Manage user feature preview settings
    2. Under Users can use preview features for registering and managing security info - enhanced.
      1. Choose Selected and choose a group of users who will participate in the preview.
      2. Or choose All to enable for everyone in your directory.
  3. Click Save

Enable new passwordless authentication methods

  1. Sign in to the Azure portal
  2. Browse to Azure Active Directory > Authentication methods > Authentication method policy (Preview)
  3. Under each Method, choose the following options
    1. Enable - Yes or No
    2. Target - All users or Select users
  4. Save each method


The FIDO2 “Key restriction policies” do not work yet. This functionality will be available before general availability, please do not change these policies from default.


You don’t need to opt in to both of the passwordless methods (if you want to preview only one passwordless method, you can enable only that method). We encourage you try out both methods since they both have their own benefits.

User registration and management of FIDO2 security keys

  1. Browse to https://myprofile.microsoft.com
  2. Sign in if not already
  3. Click Security Info
    1. If the user already has at least one Azure Multi-Factor Authentication method registered, they can immediately register a FIDO2 security key.
    2. If they don’t have at least one Azure Multi-Factor Authentication method registered, they must add one.
  4. Add a FIDO2 Security key by clicking Add method and choosing Security key
  5. Choose USB device or NFC device
  6. Have your key ready and choose Next
  7. A box will appear and ask you to create/enter a PIN for your security key, then perform the required gesture for your key either biometric or touch.
  8. You will be returned to the combined registration experience and asked to provide a meaningful name for your token so you can identify which one if you have multiple. Click Next.
  9. Click Done to complete the process

Manage security key biometric, PIN, or reset security key

  • Windows 10 version 1809
    • Companion software from the security key vendor is required
  • Windows 10 version 1903 or higher
    • Users can open Windows Settings on their device > Accounts > Security Key
    • Users can change their PIN, update biometrics, or reset their security key

User registration and management of Microsoft Authenticator app

To configure the Microsoft Authenticator app for phone sign in, follow the guidance in the article Sign in to your accounts using the Microsoft Authenticator app.

Sign in with passwordless credentials

Sign in at the lock screen

In the example below a user Bala Sandhu has already provisioned their FIDO2 security key. Bala can choose the security key credential provider from the Windows 10 lock screen and insert the security key to sign into Windows.

Security key sign in at the Windows 10 lock screen

Sign in on the web

In the example below a user has already provisioned their FIDO2 security key. The user can choose to sign in on the web with their FIDO2 security key inside of the Microsoft Edge browser on Windows 10 version 1809 or higher.

Security key sign in Microsoft Edge

For information about signing in using the Microsoft Authenticator app see the article, Sign in to your accounts using the Microsoft Authenticator app.

Known issues

FIDO2 security keys

Security key provisioning

Administrator provisioning and de-provisioning of security keys is not available in the public preview.

Hybrid Azure AD join

Users relying on WIA SSO that use managed credentials like FIDO2 security keys or passwordless sign in with Microsoft Authenticator app need to Hybrid Join on Windows 10 to get the benefits of SSO. However, security keys only work for Azure Active Directory Joined machines for now. We recommend you only try out FIDO2 security keys for the Windows lock screen on pure Azure Active Directory Joined machines. This limitation doesn’t apply for the web.

UPN changes

We are working on supporting a feature that allows UPN change on hybrid AADJ and AADJ devices. If a user’s UPN changes, you can no longer modify FIDO2 security keys to account for that. So the only approach is to reset the device and the user has to re-register.

Authenticator app

AD FS integration

When a user has enabled the Microsoft Authenticator passwordless credential, authentication for that user will always default to sending a notification for approval. This logic prevents users in a hybrid tenant from being directed to ADFS for sign in verification without the user taking an additional step to click “Use your password instead.” This process will also bypass any on-premises Conditional Access policies, and Pass-through authentication flows. The exception to this process is if a login_hint is specified, a user will be autoforwarded to AD FS, and bypass the option to use the passwordless credential.

Azure MFA server

End users who are enabled for MFA through an organization’s on-premises Azure MFA server can still create and use a single passwordless phone sign in credential. If the user attempts to upgrade multiple installations (5+) of the Microsoft Authenticator with the credential, this change may result in an error.

Device registration

One of the prerequisites to create this new, strong credential, is that the device where it resides is registered within the Azure AD tenant, to an individual user. Due to device registration restrictions, a device can only be registered in a single tenant. This limit means that only one work or school account in the Microsoft Authenticator app can be enabled for phone sign in.

Next steps

Learn about device registration

Learn about Azure Multi-Factor Authentication