Introduction
Microsoft allows organizations to enable FIDO2 Security Keys as a passwordless authentication factor. By utilizing Microsoft Passwordless Login flows, organizations may realize the following benefits:
- Strong security - improved protection against phishing, man-in-the-middle, and password spray attacks
- Improved user experience - end users no longer have to deal with long, complex, and rotating passwords
- Reduced costs - minimize password-related help desk tickets that account for a large percentage of IT help desk resources.
Microsoft’s Passwordless sign-in with YubiKeys applies to the following scenarios:
- Azure Active Directory web applications
- Azure Active Directory joined Windows 10 devices (Windows 10 1909 and later)
- Hybrid Azure Active Directory joined Windows 10 devices (Windows 10 2004 and later)
The chart below indicates where the YubiKey works with Azure AD Passwordless (FIDO2). This assumes the current versions of operating systems and browsers.
Chrome/Edge browsers |
Safari |
MS 365 native apps |
Device sign in |
|
Windows Azure AD joined |
Yes |
Yes |
Yes |
|
Windows Hybrid Azure AD joined |
Yes |
Yes |
Yes |
|
Windows AD joined |
Yes |
Yes |
No |
|
Windows non-AD joined |
Yes |
Yes |
No |
|
MacOS |
Yes |
No |
No |
No |
Linux |
Yes |
No |
No |
|
Android |
No |
No |
No |
|
iPhone |
No |
No |
No |
No |
iPad |
No |
No |
No |
No |
ChromeOS |
Yes |
No |
No |
For more details on Azure AD Passwordless support please see Microsoft's documentation here Browser support of FIDO2 passwordless authentication.
The documents attached below serve as a guide for organizations looking to configure and deploy Microsoft’s Passwordless Sign-in for Azure AD. More information about the Microsoft + Yubico partnership can be found here.
Getting Additional Help
For more information, and to get help with your YubiKeys, see: