Microsoft announced a public preview of Hybrid Azure AD support for FIDO2-based passwordless sign-in.
The preview delivers users with a fast, easy, passwordless and secure way to access Windows devices and all Azure-connected apps and services.
Microsoft’s passwordless authentication currently supports Windows Hello for Business and FIDO2 security keys. Windows Hello for Business is available for employees using dedicated computers; The FIDO2 security key can be used for both employees who use a dedicated computer and those who may use shared PCs in their workplace.
AuthenTrend is a member of both the FIDO Alliance and the Microsoft Intelligent Security Association (MISA). Our series of security keys include ATKey.Pro and ATKey.Card are fingerprint-based FIDO2 biometric keys. Based on FIDO2 standard, the private key or any fingerprints info would never leave in the security key, or can it be copied or accessed from the device.
If you are interested in any of our ATKeys’ technical details, please feel free to contact us.
Let’s see the process going when a user signs in with a FIDO2 security key: (Read the full version at docs.Microsoft.com)
While there are many keys that are FIDO2 certified by the FIDO Alliance, Microsoft requires some optional extensions of the FIDO2 Client-to-Authenticator Protocol (CTAP) specification to be implemented by the vendor to ensure maximum security and the best experience.
A security key MUST implement the following features and extensions from the FIDO2 CTAP protocol to be Microsoft-compatible:
# | Feature / Extension trust | Why is this feature or extension required? |
---|---|---|
1 | Resident key | This feature enables the security key to be portable, where your credential is stored on the security key. |
2 | Client pin | This feature enables you to protect your credentials with a second factor and applies to security keys that do not have a user interface. |
3 | hmac-secret | This extension ensures you can sign in to your device when it’s off-line or in airplane mode. |
4 | Multiple accounts per RP | This feature ensures you can use the same security key across multiple services like Microsoft Account and Azure Active Directory. |
Please check the important requirements and unsupported scenarios before you start. (Read the full version at docs.Microsoft.com)
Device Type | Azure AD joined | Hybrid Azure AD joined |
---|---|---|
Azure Multi-Factor Authentication | X | X |
Combined security information registration preview | X | X |
Compatible FIDO2 security keys | X | X |
WebAuthN requires Windows 10 version 1903 or higher | X | X |
Azure AD joined devices require Windows 10 version 1909 or higher | X | |
Hybrid Azure AD joined devices require Windows 10 version 2004 or higher | X | |
Fully patched Windows Server 2016/2019 Domain Controllers. | X | |
Azure AD Connect version 1.4.32.0 or later | X | |
Microsoft Intune (Optional) | X | X |
Provisioning package (Optional) | X | X |
Group Policy (Optional) | X |
The following scenarios aren’t supported:
To enable the use of security keys using Intune, complete the following steps:
Configuration of security keys for sign-in isn’t dependent on configuring Windows Hello for Business.
To target specific device groups to enable the credential provider, use the following custom settings via Intune:
For devices not managed by Intune, a provisioning package can be installed to enable the functionality. The Windows Configuration Designer app can be installed from the Microsoft Store. Complete the following steps to create a provisioning package:
Note: Devices running Windows 10 Version 1903 must also enable shared PC mode (EnableSharedPCMode).
For more information about enabling this functionality, see Set up a shared or guest PC with Windows 10.
For hybrid Azure AD joined devices, organizations can configure the following Group Policy setting to enable FIDO security key sign-in. The setting can be found under Computer Configuration > Administrative Templates > System > Logon > Turn on security key sign-in:
This Group Policy setting requires an updated version of the credentialprovider.admx
Group Policy template. This new template is available with the next version of Windows Server and with Windows 10 20H1. This setting can be managed with a device running one of these newer versions of Windows or centrally by following the guidance in the support topic, How to create and manage the Central Store for Group Policy Administrative Templates in Windows.
Once logged in, we can seamlessly access Office 365 without further authentication.
Passwordless authentication works in offline scenarios as well.
If you are interested in any of our ATKeys’ technical details, please feel free to contact us.