Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Authenticate with a FIDO2 security key for Windows Autopilot enrollment
    Intune

    Authenticate with a FIDO2 security key for Windows Autopilot enrollment

    Peter KlapwijkBy Peter KlapwijkFebruary 27, 2021Updated:June 28, 20212 Mins Read

    Imagine you just joined a company. As you`re working from home, a Windows 10 laptop and a mobile phone are dropped at your house. You received a new user account, but you didn’t receive a password. Instead of that, you received a FIDO2 security key and a Temporary Access code.

    Setup of your new account without using a password sounds like the future. But since the preview of Temporary Access Pass, on which I published an article yesterday, this isn’t the future anymore, this is the present!

    Where I used the Temporary Access Pass (TAP) to authenticate for Windows Autopilot enrollment in the previous post, this week another option to authenticate popped up on one of my test devices. On the sign-in screen from my Windows 20H2 device “Sign in with a security key” showed up.

    So we can also use the TAP to set up our account via the My Security Info page and when that is finished, register our FIDO2 security key. Ok, this works best when you already have a Windows 10 device, but for this post I assume we have one 🙂

    Now that we have set up our FIDO2 key, we can use it to start our Windows Autopilot enrollment!

    So we start our Windows Autopilot registered device and choose Sign in with a security key.

    On the next page, a new pop-up is shown, which asks to Insert your security key into the USB port.

    As soon as this is done, touch the key (and enter the PIN if you`re not using a bio version).

    If multiple accounts are stored on the key, this pop-up is shown to select the correct account.

    And the Windows Autopilot enrollment begins!

    When the enrollment is finished, we use the FIDO2 key to sign-in to Windows.

    And here a short video of the enrollment.

    Sign in with a security key and Temporary Access Pass are pretty cool developments if you ask up me!
    Thanks for reading this post and happy testing!

    And if you’re interested in more passwordless related articles have a look at this overview.

    FIDO2 Intune MEM Microsoft Endpoint Manager Passwordless Security Windows Windows 10 Windows Autopilot
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    How to change the Windows 11 language with Intune

    November 11, 2022

    Secure multiple accounts with a FIDO2 security key

    August 25, 2021

    Secure personal mobile devices with Microsoft Intune and Defender for Endpoint

    August 11, 2021
    Add A Comment
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Intune PowerShell script installer feature

    January 17, 2026

    Configuring the time zone with Intune, what are our options?

    January 9, 2026

    Configure Azure file shares for Entra joined Windows devices and cloud identities

    December 19, 2025

    Managing Windows 365 Link devices with Intune

    October 24, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Defender Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Windows Windows 10 Windows10 Windows 11 Windows 365 Windows Autopilot Windows Update
    Awards
    Sponsor
    Follow me on Twitter
    Tweets by inthecloud_247
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Defender Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Windows Windows 10 Windows10 Windows 11 Windows 365 Windows Autopilot Windows Update
    Archives
    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Artin on Onboarding a passwordless Azure AD user
    • George on Configure Azure file shares for Entra joined Windows devices and cloud identities
    • Ganesh sekarbabu on Configure Azure file shares for Entra joined Windows devices and cloud identities
    • John on Connect to Azure file shares with Microsoft Entra Private Access
    • Luis on Application installation issues; Download pending
    most popular

    Application installation issues; Download pending

    October 1, 2024

    How to change the Windows 11 language with Intune

    November 11, 2022

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How I solved a strange Kerberos issue

    December 12, 2024
    Recent Comments
    • Artin on Onboarding a passwordless Azure AD user
    • George on Configure Azure file shares for Entra joined Windows devices and cloud identities
    • Ganesh sekarbabu on Configure Azure file shares for Entra joined Windows devices and cloud identities
    • John on Connect to Azure file shares with Microsoft Entra Private Access
    • Luis on Application installation issues; Download pending
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

    Copyright © 2023 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand: Don’t pass off my work as yours, it’s not nice.

    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}