Explore Microsoft Entra's (formerly Azure AD) transition to device-bound & synced passkeys. Learn how this fits into Microsoft’s overall passkey strategy.

Vincent
Created: January 18, 2024
Updated: November 21, 2025

+70-page Enterprise Passkey Whitepaper:
Learn how leaders get +80% passkey adoption. Trusted by Rakuten, Klarna & Oracle
Microsoft as one of the core members of the FIDO Alliance is ushering in a new era with its introduction of device-bound passkeys in Microsoft Entra, formerly called Azure Active Directory (AD). This move signifies the general industry shift (e.g. Coinbase, Uber, Adobe) towards passkeys as a more secure, user-friendly authentication method. With this move the friction that other, traditional MFA methods can cause in business scenarios could be overcome by making use of passkeys user-friendly login process.
Before we dive into Microsoft Entras specific passkey implementation and analysis, lets have a brief look at the different types of passkeys.
Device-bound passkeys, previously known as single-device passkeys, are FIDO2 discoverable credentials tied exclusively to a single authenticator / device. This authenticator / device could be integrated directly into devices running Windows 10 or Windows 11 (Windows Hello), macOS (Touch ID), iOS (Touch ID or Face ID), or Android (using the respective Android biometric solution of the device manufacturer). The essence of these passkeys is their binding to the authenticator / device, bolstering security by ensuring the private key of the passkeys key-pair never leaves this device. However, recovery becomes much more complex, as there is no backup and most often you need a second authenticator / device that holds another device-bound passkey to regain access if the first authenticator / device is lost, stolen or broken.
Update November 2025: Microsoft Entra ID now officially supports synced passkeys! This marks a great milestone in making passkey technology more accessible and convenient for enterprise users. Synced passkeys work across devices using centralized cloud services from platform providers like Apple's iCloud Keychain and Google Password Manager.
The support of synced passkeys represents a major step in broadening the accessibility and convenience of passkey technology to the general public. Non-technical people benefit greatly from synced passkeys due to simpler recovery and seamless cross-device experience. Users can register a passkey on one device and automatically have it available on all their other devices that use the same cloud service.
Within Microsoft Entra, IT administrators have the option to enforce the use of hardware security keys (e.g. YubiKeys). Hardware security keys also adhere to FIDO2 protocols but are not bound to one platform but can be used across platforms (thats why they are called roaming or cross- platform authenticators). Alternatively, users will default to storing their passkeys directly on their devices using the built-in platform authenticators (e.g. Windows Hello, Face ID, Touch ID). Microsoft Entra offers the flexibility to manage this through settings, including the ability to whitelist or blacklist specific types of passkeys based on the AAGUID, which indicates the authenticator / device a passkey was created on. This allows administrator to restrict the usage of passkeys to only company managed devices.
Starting January 2024, Microsoft Entra ID will preview device-bound passkeys as an authentication method, complementing existing support for hardware security keys (e.g YubiKeys). This phased approach reflects Microsoft's cautious yet progressive strategy in rolling out new security features to a large audience.
Microsoft Entra Passkey Configuration
In accordance with this new strategic direction, the admin portal of Microsoft Entra is undergoing a transformation, rebranding "FIDO2 security keys" as "Passkeys (FIDO2)". This rebranding signifies more than just a change in name; it represents a broader alignment towards establishing passkeys as the new standard for login authentication across various platforms, devices, operating systems, and web browsers.
This latest development from Microsoft not only extends support to iOS and iPadOS for Microsoft 365 but also encompasses a wide range of Microsoft's own first-party applications and any other applications safeguarded with Entra ID. Initially, Microsoft introduced passkey support for Safari in July 2023, which was a significant enhancement. However, the majority of customers were eagerly anticipating support for native apps. Now, with Microsoft's latest announcement, users can enjoy a comprehensive experience on their mobile devices, enabling them to sign in to both web applications and native apps using a YubiKey.
Its obvious that Microsoft prioritizes user experience in the transition to passkeys. This means that end-users will notice changes in both sign-up and login processes.
The "My Security Info" portal will introduce a new option labeled "Passkey (preview)" for registering device-bound passkeys on various devices. This option is set to replace the existing security key sign-up by the end of 2024.
The login interface will be updated to reflect this change. Today there are phrases like
These will evolve to phrases like
In the enhanced sign-in experience, the term passkey will be used to encompass passkey credentials from security keys, computers, and mobile devices, promoting inclusivity.
Microsoft's careful rollout of passkey support in Entra has been a calculated, multi-phase strategy. Following the adoption of passkeys by its subsidiaries like Microsoft 365, LinkedIn, and GitHub, the Entra integration marked the next significant step. The strategy evolved from device-bound passkeys to the November 2025 introduction of synced passkeys, which enable passkey synchronization via third-party cloud services like Apple's iCloud Keychain and Google Password Manager, significantly enhancing user experience and backup security.
Another key consideration is the compatibility of passkeys with different Windows versions. While Windows 11 23H2 has improved passkey capabilities, including a new passkey management UI, questions remain about older versions like Windows 10 (21H2) and their support for discoverable credentials. Microsoft continues to work on broader compatibility to ensure enterprise customers with diverse device ecosystems can adopt passkey authentication.
In May 2024, Microsoft finally released the preview update for Microsoft Entra, introducing the capability to use the Microsoft Authenticator app on Android & iOS as passkey-provider for device-bound passkeys.
The rationale behind this implementation is tailored specificly to working and enterprise environments. In these managed settings, the priority is to ensure that the passkey remains secure and bound to the device. Synced passkeys, while convenient, pose a higher risk in such environments due to the potential for broader access. By utilizing the Microsoft Authenticator app as a passkey manager, the private keys are securely stored within the app, ensuring that they are removed upon reinstallation, thus maintaining a high level of security.
This strategic choice reflects Microsoft's commitment to providing robust security solutions tailored to the needs of enterprise users, balancing the benefits of modern passkey technology with the stringent security requirements of managed environments. Microsoft has released detailed instructions how to proceed to use passkeys with:
Overall, the implementation is straightforward within the concept of a closed device system. We expect that in the future, when the passkey ecosystem itself supports implementing the device-bound keys (e.g. supplementalPubKeys), the implementation might change. Another possibility would be to leverage attestation that is available for managed iOS devices via enterprise attestation.
Microsoft Entra ID has now officially released support for synced passkeys, marking a transformative milestone for enterprise authentication. This update addresses the long-anticipated need for passkeys that work seamlessly across multiple devices without additional setup.
Synced passkeys provide superior phishing resistance compared to traditional MFA methods. Even sophisticated phishing attacks cannot compromise synced passkeys because they require a registered device and biometric or local PIN, and are registered to work only with specified sites or apps. Unlike codes sent via email or SMS that can be intercepted, passkeys won't present themselves to invalid phishing sites.
Users can now register synced passkeys directly through their account settings at My Sign-Ins. The process is straightforward:
Once a synced passkey is registered, it automatically becomes available across all devices linked to the same cloud service. For example, after registering a passkey on an iPhone using iCloud Keychain, that same passkey is immediately usable on a Mac configured to sync with iCloud—no additional setup required.
When replacing a device, users don't need to re-register passkeys. The synced passkey automatically transfers to the new device through the cloud service, making the transition seamless.
Microsoft has introduced flexible passkey profiles in the Entra admin center, allowing administrators to configure different policies for different user groups:
This granular control enables IT departments to balance security requirements with user convenience based on role and risk level.
Microsoft has introduced a passwordless account recovery method using Verified ID:
Microsoft has enhanced session revocation capabilities for compromised accounts:
Synced passkeys in Microsoft Entra work with:
Microsoft's integration of passkeys into Microsoft Entra represents a forward-thinking approach to digital security. Starting with device-bound passkeys and now fully supporting synced passkeys, Microsoft has completed a crucial milestone in enhancing both security and user convenience. This phased rollout reflects a deep understanding of customer concerns and a commitment to gradual, secure technological evolution.
With the November 2025 release of synced passkeys, Microsoft Entra now offers enterprises a complete passkey solution that balances security requirements with user experience. The introduction of flexible passkey profiles, enhanced account recovery through Verified ID, and real-time risk mitigation through Conditional Access policies demonstrates Microsoft's comprehensive approach to modern authentication.
Microsoft is in a unique position within the passkey market, serving a significant portion of the desktop market in both consumer and enterprise environments with significant legacy installations. The company has moved deliberately, respecting the needs of large established enterprises while progressively adopting modern authentication standards. While Apple and Android moved faster with their consumer-focused update cycles, Microsoft's careful approach has resulted in a robust, enterprise-ready implementation.
The final piece of the puzzle remains bringing native synced passkey support to Windows Hello itself, which would complete the ecosystem. However, with current support for synced passkeys through third-party providers like iCloud Keychain and Google Password Manager, enterprises can already deploy comprehensive passkey-based authentication across their workforce.
Related Articles
Table of Contents