Site icon Martin Haller, A blog about corporate IT protection and management

Microsoft Entra ID: Passkeys (FIDO2) – What to Configure and Why

Starting in March 2026, Microsoft is rolling out the Passkey profiles feature. This expands the configuration options for the Passkey (FIDO2) authentication method and is also a breaking change: existing settings are being migrated into the Default passkey profile, and a distinction is being introduced between passkey types (device-bound vs. synced).

In tenants where the Passkey (FIDO2) method is enabled and attestation is not enforced, synced passkeys will become enabled. And if you are also using the Microsoft-managed registration campaign, users may start seeing prompts to register passkeys after signing in to Microsoft 365, which often results in a certain amount of helpdesk noise. You can read more about this in the excellent article Microsoft Entra ID Will Auto-Enable Passkey Profiles in March 2026.

I do not want to dissect the change itself here. Instead, I would rather share our practical recommendations for configuring Passkey (FIDO2), which we use both internally and with our customers. If this helps you avoid surprises, then it has served its purpose 🙂

Passkey (FIDO2) configuration

Enforce Attestation

This is the mechanism by which the device storing the private key proves what it actually is — the device type, manufacturer, model, and sometimes even the certification level — and proves it cryptographically.

It ensures that:

If attestation is not enforced:

Restrict specific keys

This allows you to narrow down which types of FIDO2 keys and passkey stores users are allowed to use. In combination with Enforce Attestation, it works very well.

Without Enforce Attestation, however, it works only partially. It will successfully limit regular users, because they are not able to spoof a key’s AAGUID. An attacker, however, can spoof the AAGUID and impersonate any allowed key.

Device-bound vs. synced keys

We consider device-bound FIDO2 / passkeys to be a very secure authentication method. In Entra ID, this method is treated as both multifactor and phishing-resistant. In practice, this means that when FIDO2 / passkeys are used, Entra ID does not require any additional MFA step (such as SMS, OTP, or push notification). Likewise, for the detection of risky or suspicious sign-ins, it is a strong signal that the authentication is legitimate, which in my opinion also contributes to false-negative detections.

The problem, however, is that Entra ID will likely treat device-bound keys as being just as secure as synced ones. In reality, they are not equally secure. A synced key can be cloned or exported by design, and it does not necessarily test proof of presence or require multifactor authentication for access. FIDO2, on the other hand, requires a PIN or biometric verification together with proof of presence.

What configuration we recommend to our customers

Below is a screenshot showing the configuration that allows hardware FIDO2 keys and device-bound passkeys stored in Microsoft Authenticator (iOS/Android) for all users in the tenant:

Conclusion

I will be glad if sharing our experience has been helpful to you. If you feel lost in Entra ID configuration, feel free to contact me. Our company specializes in the management and security of Entra ID (Microsoft 365), and we can help you with it.

Do you like topics, I write about?

It is not necessary to periodically visit my blog to check if there is a new article. Subscribe below for notifications. You will be the first one who will know about new article.

Exit mobile version