• Home
  • Microsoft Azure
  • Microsoft 365
  • Barista
  • Legal Notice
  • Privacy Policy
  • English
    • Deutsch
  • Home
  • Microsoft Azure
  • Microsoft 365
  • Barista
  • Legal Notice
  • Privacy Policy
  • English
    • Deutsch
cloudcoffee.ch

Freshly brewed with Microsoft Azure and Microsoft 365

Microsoft 365,  Microsoft Azure

Hardening your Identities: Microsoft Authenticator device-bound passkey

1. May 2024 /

Last Updated on 18. January 2025

A device-bound passkey is an advanced security feature implemented in Microsoft Authenticator. It is a unique security key that is tied to a specific device. When a user logs in to their account, they use this key to verify their identity. Since the key is bound to the device, no one else can access the user’s account, even if they know the password, unless they also have access to the device.

This technology provides a strong authentication method that is both cost-effective and user-friendly. Here are some advantages:

  • Phishing-Resistant: Device-bound passkeys are phishing-resistant
  • Device-Bound: The passkey doesn’t leave the device on which it was created
  • Cost-Effective: Microsoft Authenticator device-bound passkey come at no additional cost
  • No More Passwords: With passkeys, users don’t have to remember complex passwords
  • Ease of Use: The passkey is easy to use. Once set up, users just need to unlock their device and approve the notification

With this technology, users can effectively protect their digital identities and navigate securely in the digital world. It represents a significant step toward a safer digital future.

This article outlines the necessary configuration steps to rollout the Microsoft Authenticator device-bound passkey and create a passkey for a user.

At the time of publishing this article, Microsoft Authenticator device-bound passkey is still in the preview phase. The article will be continuously updated.

Table of contents hide
1 Prerequisites and Licensing
1.1 Licenses
1.2 User account
1.3 Devices
2 Enable passkey (FIDO2) authentication method
3 Set up Microsoft Authenticator device-bound passkey
3.1 Prepare Apple iPhone
3.2 Set up passkey for Apple iPhone
4 Sign in with device-bound passkey
5 Troubleshooting
5.1 Passkey setup gets stuck
5.1.1 Solution
5.2 Delete passkey
5.2.1 Delete passkey with access to device
5.2.2 Delete passkey without access to device

Prerequisites and Licensing

Licenses

For the use of Microsoft Authenticator device-bound passkey, no paid license is required. A license from Microsoft Entra ID Free is sufficient. This license is part of every Microsoft tenant.

User account

The user account that sets up the passkey is configured for multi-factor authentication.

Devices

  • iOS 17 or later
    with the latest version of Microsoft Authenticator
    If Microsoft Authenticator is not the primary password manager used on the device, iOS 18 is recommended. This operating system allows the simultaneous use of multiple password managers.
  • Androis 14 or later
    with the latest version of Microsoft Authenticator

Enable passkey (FIDO2) authentication method

The Passkey (FIDO2) authentication method is configured in the Microsoft Entra admin center.

Sign in to the Microsoft Entra admin center (https://entra.microsoft.com/) > Protection > Authentication methods > Policies and select Passkey (FIDO2).

Microsoft Entra ID Authentication methods Policies

In the Enable and Target tab, toggle the Enable switch and select All Users.
If necessary, you can also add individual security groups.

Passkey FIDO2 Enable and Target

In the Configure tab, the following options can be set:

Allow self-service set up
This option must be enabled for users to set up the Microsoft Authenticator device-bound passkey.

Enforce attestation
This option ensures that security keys adhere to FIDO Alliance Metadata.
Note that the preview for Microsoft Authenticator device-bound passkey does not support this feature and should be disabled.

Enforce key restriction
This option must be enabled for using Microsoft Authenticator device-bound passkey during the preview phase.

Restrict specific keys
This option allows you to restrict the use of specific FIDO2 security keys.
An overview of the common AAGUIDs is provided by Clayton Tyger with the Entra Compatible Attestation FIDO Key Explorer.

Microsoft Authenticator (Preview)
This option must be enabled and directly enters the AAGUIDs of the Microsoft Authenticator for iOS and Android.
The following AAGUID entries are included:
Authenticator for iOS: 90a3ccdf-635c-4729-a248-9b709135078f
Authenticator for Android: de1e552d-db1d-4423-a619-566b625cdc84

Passkey FIDO2 Settings

Click Save and then users can set up device-bound passkeys in Microsoft Authenticator.

Authentication methods policies

Set up Microsoft Authenticator device-bound passkey

Every user sets up the Microsoft Authenticator device-bound passkey independently. This guide explains how to set up a Microsoft Authenticator device-bound passkey for an Apple iPhone.

Prepare Apple iPhone

Install the latest version of Microsoft Authenticator on Apple iOS 17 or later.
If multiple password managers are to be used simultaneously, iOS 18 is required.

On an Apple iPhone with iOS 18, the following options must be configured under Settings > General > AutoFill & Passwords:

  1. Enable AutoFill Passwords and Passkeys
  2. Use passwords and passkeys from: Authenticator
Apple iOS Password Options

Once the Apple iPhone is prepared, the passkey can be set up.

Set up passkey for Apple iPhone

The user sign in at https://aka.ms/mysecurityinfo and clicks on Security info > Add sign-in method.

Security info - add sign-in method

Select Passkey in Microsoft Authenticator and click on Add.

Passkey in Microsoft Authenticator (preview)

Click Next

Add a passkey for more secure sign-in (preview)

Select iPhone or iPad

Choose Mobile OS

Passkey support for Microsoft Authenticator has already been enabled and can be confirmed with Continue.

iOS AutoFill Passwords and Passkeys Continue

Click I’m ready to set up the passkey.

iOS QR-Scanner

Select iPhone, iPad or Android device.

iPhone, iPad or Android Device

Scan QR code
Important: Scan this QR code with the Apple iPhone Camera app, not with “Scan QR code” from the Microsoft Authenticator app.

Scan QR-Code

Continue with setting up the passkey on the Apple iPhone.

Device connected

Click Continue on the Apple iPhone and set up the passkey with it.

Security Info Save Passkey

The passkey has now been successfully set up on the Apple iPhone.

Passkey saved

Enter a friendly name for better identification of the passkey.

Passkey friendly name

The passkey has now been successfully set up and can be used.

Passkey created successfull
Security info

Sign in with device-bound passkey

In services from Microsoft Azure, Microsoft 365, or Enterprise applications with Microsoft Entra ID authentication, select the Sign-in options.
For example: https://aka.ms/mysecurityinfo

Sign-in options

Select Face, fingerprint, PIN or security key

Face fingerprint PIN or security key

Select iPhone, iPad or Android device

iPhone iPad or Android device

Scan the QR code with camera.

QR-Code Sign-In

Confirm the sign in on the mobile by clicking Continue.
If multiple passkeys are stored in Microsoft Authenticator, the user account can be selected.

Choose Account

The sign-in with the Microsoft Authenticator device-bound passkey to https://aka.ms/mysecurityinfo has been successfully completed.

Security Info

Troubleshooting

Passkey setup gets stuck

When setting up the Micosoft Authenticator device-bound passkey, the following message appears in the loop after clicking on I understand:

On your mobile device, when asked to create a passkey, choose Microsoft Authenticator.

Passkey Loop

Solution

The AAGUIDs for Microsoft Authenticator were not entered in the authentication methods of Microsoft Entra. Click here for the instructions.

Delete passkey

Delete passkey with access to device

Open the Microsoft Authenticator app and select the user whose passkey needs to be deleted

Authenticator App Passkey

Click on Passkey (preview)

Passkey (preview) in Authenticator App

Click Delete

Authenticator App Delete Passkey

Select Visit link and sign in.

Authenticator App Visit link

The security information is shown.
Select the passkey and delete it from the user account with Remove.

 Security Info Remove Passkey
Delete passkey without access to device

If there is no longer access to the device with the Microsoft Authenticator device-bound passkey, the passkey can be removed from the personal security information.
Sign in to https://aka.ms/mysecurityinfo > Security info > passkey > Delete

Security Info Remove Passkey

Fresh content, explained with practical relevance. Stay up to date via LinkedIn and Bluesky.

LinkedIn BlueSky

No marketing. No noise. Just content.
If this post was helpful, a coffee brings back the rich aroma behind the writing.

Buy Me a Coffee
  1. Temporary Access Pass in Microsoft Entra: what it is and how to use it
  2. Passwordless Sign In with Microsoft Authenticator App
  3. Microsoft Entra Privileged Identity Management (PIM) and FIDO2: Increasing the security of privileged roles
  4. Passwordless Sign In with Microsoft Entra ID (Azure AD) and YubiKey (FIDO2)
DirectoryFIDO2Identity and Access Management (IAM)Microsoft Authenticator AppMicrosoft EntraMicrosoft Tenant HardeningMulti-Factor AuthenticationPasswordless Sign InTroubleshootingZero Trust Network Access (ZTNA)
Sponsored Links

Barista

Oliver Mueller My name is Oliver Müller and I have been working with passion and dedication in the IT industry since 1998. The diversity of Microsoft products has fascinated me from the beginning and motivated me to expand my knowledge in this area. As a Microsoft Azure Solutions Architect Expert, Microsoft MVP and MCT, my focus is primarily on the areas of Infrastructure-as-a-Service (IaaS) and Identity and Access Management (IAM).

Regardless of the complexity of the challenges that present themselves to me, I always find the optimal solutions. I often find inspiration over a cup of coffee. My solutions are not only effective but also innovative and future-oriented.

Azure Administrator Associate Azure Solutions Architect Expert
Microsoft MVP Microsoft Certified Trainer
LinkedIn BlueSky Buy Me a Coffee

Recent Posts

  • Microsoft Defender for Endpoint: Getting Started with Deployment Using Intune

    4. October 2025

  • Protect Security Info Registration with Microsoft Entra Conditional Access and Microsoft Entra ID Protection

    2. September 2025

  • Microsoft Entra Connect: Migration to Application Based Authentication (ABA)

    5. August 2025

  • Microsoft Defender Attack Simulation Training: Boosting Real-World Security Awareness

    2. July 2025

  • Microsoft Entra ID: Admin Consent Workflow for Secure Application Permissions

    2. June 2025

Updated Posts

  • Microsoft Entra ID Protection: Protect Identities, Detect Risks and Mitigate Threats

    26. September 2025

  • Enhance Token Security with Microsoft Entra and Microsoft Intune

    8. September 2025

  • Microsoft Entra ID: QR Code Sign-In

    30. August 2025

  • Microsoft Entra ID: Admin Consent Workflow for Secure Application Permissions

    20. August 2025

  • Backup and Restore Microsoft Authenticator App

    31. July 2025

Sponsored Links

Backup Browser Extensions Command Line Conditional Access Directory Directory Extensions Disaster Recovery Efficiency Enforce FIDO2 Guest High Availability Identity and Access Management (IAM) Microsoft Authenticator App Microsoft Defender Microsoft Entra Microsoft Entra Connect Microsoft Intune Microsoft Tenant Hardening Migration Multi-Factor Authentication Naming Passthrough Authentication (PTA) Password Hash Synchronization (PHS) Passwordless Sign In Performance Optimization PowerShell Troubleshooting Tutorials Virtual Machines Zero Trust Network Access (ZTNA)

© 2021-2025 cloudkaffee.ch
This site uses cookies to improve the user experience. By continuing to use them, you agree to this.