Signing back into the Community for the first time? You'll need to reset your password to access your account. Find out more.
Forum Discussion
wavesound
2 years agoFrequent Contributor
Passkeys do not work with Microsoft 365
When I go to add PassKeys to my MIcrosoft 365 portal it fails at the last step.
https://mysignins.microsoft.com/security-info
Same error in Chrome and Brave.
I was able to cancel the 1Password enrollment process and enroll a YubiKey just fine.
1Password Version: 1Password for Mac 8.10.7 (81007041)
Extension Version: 2.12.0
OS Version: 13.4
Browser:_ Brave
- Former Member
"Beginning January 2024, Microsoft Entra ID will support device-bound passkeys stored on computers and mobile devices as an authentication method in public preview, in addition to the existing support for FIDO2 security keys. This enables your users to perform phishing-resistant authentication using the devices that they already have."
- Former Member
"Beginning January 2024, Microsoft Entra ID will support device-bound passkeys stored on computers and mobile devices as an authentication method in public preview, in addition to the existing support for FIDO2 security keys. This enables your users to perform phishing-resistant authentication using the devices that they already have."
- Former Member
"Beginning January 2024, Microsoft Entra ID will support device-bound passkeys stored on computers and mobile devices as an authentication method in public preview, in addition to the existing support for FIDO2 security keys. This enables your users to perform phishing-resistant authentication using the devices that they already have."
- leonardderOccasional Contributor
This opens the question whether 1Password passkeys are considered device bound. Furthermore, how to determine the Authenticator Attestation GUID (AAGUID) needed to approve 1Password passkeys?
- wraithOccasional Contributor
leonardder https://support.yubico.com/hc/en-us/articles/360016648959-YubiKey-Hardware-FIDO2-AAGUIDs
Of course I haven't actually been successful in making this work (despite following the poorly worded guidance in the MS Article).
- BackspazeFrequent Contributor
In today's weekly digest for coming updates in Microsoft 365 there are two mentions of passkeys with some information on expected release windows and a bunch of other information.
For those that have access to the Microsoft 365 admin center, you can search for the two headers and MC numbers below and/or take a look at 182056 in their public roadmap. I've included the information in spoiler tags (for brevity) for those that don't have access to the admin center.
Microsoft Entra ID: Authentication strength improvements to support passkeys - MC718260
!
! Summary
!
! Conditional Access authentication strengths in Microsoft Entra ID will be improved to support registration of device-bound passkeys (defined at passkeys.dev) stored on computers, security keys, and mobile devices.
!
! This message is associated with Microsoft 365 Roadmap ID 182056.
!
! When this will happen:
!
! Public Preview: We will begin rolling out early March 2024 and expect to complete by mid-March 2024.
!
! Worldwide, GCC, GCC High, DoD: We will begin rolling out late April 2024 and expect to complete by early May 2024.
!
! How this will affect your organization:
!
! End user registration
!
! Prior to this change, users who were in-scope for authentication strength enforcement who could not satisfy passkey (FIDO2) authentication requirements received an error message asking users to manually register the passkey (FIDO2) method.
!
! With this rollout, in My Security Info, new registration options called Passkey (preview) and Passkey in Microsoft Authenticator (preview) will be shown to users who are interrupted to register a passkey (FIDO2) method to satisfy authentication strength requirements. Users that are required to register a passkey in Microsoft Authenticator will see a dedicated registration experience. Users whose organization requires specific passkeys from various vendors and manufacturers will be shown allowable AAGUIDS of the passkeys they can choose to register. No changes are expected to existing Conditional Access policies targeting security information registration.
!
! Current:
!
!
!
! New:
!
!
!
! What you need to do to prepare:
!
! For more information on changes to Microsoft Entra support for passkeys (FIDO2), please review our previous message center post MC690185: (Updated) Prepare for device-bound passkeys in Microsoft Entra ID (changes to FIDO2 and Windows Hello for Business), (November 2023).
!
! No action is needed to prepare for this change. You may want to notify your users about this change and update any relevant documentation as appropriate.(Updated) Prepare for device-bound passkeys in Microsoft Entra ID (changes to FIDO2 and Windows Hello for Business) - MC690185
! Summary
!
! Updated February 19, 2024: We have updated the rollout timeline below. Thank you for your patience.
!
! Beginning mid-March 2024, Microsoft Entra ID will support device-bound passkeys stored on computers and mobile devices as an authentication method in preview, in addition to the existing support for FIDO2 security keys. This enables your users to perform phishing-resistant authentication using the devices that they already have.
!
! We will be expanding the existing FIDO2 authentication methods policy and end user experiences to support this preview release. If your organization uses FIDO2 authentication or Windows Hello for Business, please continue reading to learn more and prepare for the upcoming changes.
!
! Admin Configuration
!
! In the Entra admin portal, we will be renaming “FIDO2 security keys” to “Passkeys (FIDO2)” within the authentication methods policy and Conditional Access authentication strengths policy.
!
! For your organization to opt-in to this preview, you will need to enforce key restrictions to allow specified passkey providers in your FIDO2 policy. Here are the possible configuration states for FIDO2 key restrictions during the preview:
!
! * No key restrictions (FIDO2 policy default): Tenant allows all security key models. Device-bound passkey providers on computers and mobile devices are not allowed.
! * Key restrictions set to "Allow": Tenant only allows the explicitly added AAGUIDs. To enable a device-bound passkey provider, add their AAGUID(s) to the key restrictions list.
! * Key restrictions set to "Block": Tenant blocks the explicitly added AAGUIDs and allows all other security key models. Device-bound passkey providers on computers and mobile devices are not allowed.
!
!
!
! End User Registration Experience
!
! In the My Security Info portal, a new registration option called "Passkey (preview)" will be shown to end users for registering a device-bound passkey on computers, mobile devices, or security keys.
!
!
!
! Towards the end of 2024, the existing security key registration option will be replaced by the newly introduced passkey option.
!
! **End User Sign-in Experience*
!
! The existing end user sign-in option for Windows Hello for Business and FIDO2 security keys will be renamed to “Face, fingerprint, PIN, or security key”. The term "passkey" will be mentioned in the updated sign-in experience to be inclusive of passkey credentials presented from security keys, computers, and mobile devices.
!
! * Text displayed to users today:
! * “Sign in with Windows Hello or security key”
! * "Sign in with a security key”
! * "Signing in with Windows Hello or security key"
! * Text displayed to users in January 2024:
! * “Face, fingerprint, PIN, or security key”
! * "Signing in with a passkey"
!
!
! - gussicContributor
- DF33A124C0A1New Contributor
Microsoft have confirmed on Reddit that this still isn't supported yet:
Passkeys in Entra IDCurrently you'll see the following error:
An unknown error occurred during passkey registration. Try again or contact your administrator for support.
This contradicts MC690185, it's all rather confusing.
- kathampyNew Contributor
Ideally 1Password should be able to spoof any kind of passkey through the browser extension, given than it can be registered even on websites that require physical removable security keys and reject Windows Hello / Face ID.