Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Configure FIDO security keys as the default sign-in option for Windows
    Intune

    Configure FIDO security keys as the default sign-in option for Windows

    Peter KlapwijkBy Peter KlapwijkFebruary 27, 2023Updated:June 4, 2024194 Mins Read

    Today a short article on configuring FIDO2 security keys as the default login option for your Windows devices. I describe how we assign the default credential provider with Microsoft Intune, which is the logon setting to configure the FIDO Credential Provider as the credential provider.

    Besides configuring the default credential provider, we can also exclude credential providers, to remove login options from the Windows logon screen. We can use this setting to block for example the usage of a password.

    The combination of setting the default configuration provider to security keys and removing the password as a credential provider might come too early for default Windows end-user devices, as this also affects for example RDP and remote support (which also can’t use passwords). But for shared multi-user desktops or kiosk devices (where end-users sign in with their (Azure) AD account), these things should be less of a problem. Sign-in with a FIDO2 key to such multi-user devices is very easy for the end-user and very safe.

    Credential Providers

    To configure credential providers, we first need to find the corresponding GUID/ CLSID of the credential providers. The easiest manner to find the GUID we need is to check the registry of a Windows 10/11 device.
    A list of registered credential providers and their GUIDs can be found in the registry at HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Providers.

    All these GUIDs correspond to a credential provider. A few well-known credential providers are:

    PasswordProvider{60b78e88-ead8-445c-9cfd-0b87f74ea6cd}
    FIDO Credential Provider{F8A1793B-7873-4046-B2A7-1F318747F427}
    Smartcard Credential Provider{8FD7E19C-3BF7-489B-A72C-846AB3678C96}

    Configure the Credential Providers

    We can configure the credential providers with a GPO, but I only show how it is done using Microsoft Intune. The setting is, like thousands of other settings, available in the Settings Catalog profile.

    Let’s sign into the Intune portal.

    • Browse to Devices, Windows, Configuration profile
    • Click Create profile
    • Select Windows 10 and later as Platform
    • Select Settings Catalog as Profile type
    • Click Create
    • Enter a Name for the profile
    • Enter a Description (optional)
    • Click Next
    • Click Add settings
    • Open Administrative Templates, System, Logon
    • Select Assign a default Credential provider
    • Select Exclude credential providers (Optional)

    On the left, the settings we selected are available to configure.

    • Switch Assign a default credential provider to Enabled
    • Add {F8A1793B-7873-4046-B2A7-1F318747F427} as the Default credential provider.

    If you also want to exclude (remove) credential providers, add the GUIDs from the corresponding credential providers to Exclude the following credential providers.

    • Switch Exclude the following credential provider to Enabled
    • Add the GUIDs from the corresponding credential providers

    In case you want to exclude multiple credential providers, separate the GUIDs with a comma.

    Finish the creation of the profile by clicking Next and assign the profile to a security group.

    The end result

    After the policy settings are applied, the device first needs a restart before the settings are active.

    But after the restart we immediately see on the sign-in screen, security keys are set as the default sign-in option, even as the key is not yet inserted into the device.

    With a FIDO2 (bio version) security key inserted, it asks to touch the key.

    When we only set the default credential provider to FIDO Credential Provider but did not exclude other credential providers, we still have to Sign-in options shown on the screen. In this case, I have the options password and smartcard also available to sign in to my kiosk device.

    But after excluding these two credential providers, the Sign-in options are removed and I can only sign in to my device with a security key.

    I used a biometric version FIDO2 key, which has fingerprint recognition. To sign in to my device, I insert the key and only touch the key once with my finger to get signed in to the device.

    This is a very user-friendly sign-in option to use for multi-user-like devices.

    if you are interested in taking the next step in going passwordless, I suggest to also read this blog post.

    Thanks for reading!

    Azure AD FIDO2 KIOSK Microsoft 365 Passwordless Security Windows
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Onboarding a passwordless Azure AD user

    April 1, 2023

    Using your smartphone as a FIDO security with IDmelon

    September 19, 2021

    Automatically wipe a Windows 10 device after a number of authentication failures

    November 14, 2019
    View 19 Comments

    19 Comments

    1. Ferry Knol on February 28, 2023 12:40

      Can you tell us exactly which FIDO key you used to achieve this?
      Especially since you describe that the FIDO key is also used for your fingerprint.
      I myself have a yubikey and as far as I know it has no fingerprint recognition.

      Reply
    2. Ferry Knol on February 28, 2023 12:47

      Good post by the way. Does setting this default login method also mean that the windows hello PIN code is no longer an option or does it remain on as an option in addition to logging in via the Fido key?

      Reply
      • Peter Klapwijk on February 28, 2023 16:28

        I have blocked Windows Hello on this device to avoid users need to go through the WH registration. But setting a default credential provider doesn’t block other credential providers.
        For this setup I used a Feitian K27 key.

        Reply
        • Ferry Knol on February 28, 2023 18:10

          Thanks for your reaction Peter, that answers my questions so far.

          Do you also know if it is possible with this solution to have the device locked when the Fido key is ejected, like with a smartcard solution?

          Reply
          • Peter Klapwijk on March 1, 2023 10:13

            There is no policy or something related to get this done.
            So, that would mean creating something yourself which get triggered by removing the key.

            Reply
            • Ferry Knol on March 1, 2023 15:38

              Thanks Peter,
              I have the Fido authentication working, set as default and disabled all the other credential providers.
              Working fine so far.

              I will try to find a solution for triggering a lock when removing the key from the device.

    3. Koen Stronkhorst on March 2, 2023 10:30

      Hi Peter,

      Do you know if it’s possible to exclude multiple credential providers for this? If so, how are the two exclusions separated?

      Thanks in advance!

      Reply
      • Peter Klapwijk on March 2, 2023 10:48

        Hi Koen,

        I totally forgot to mention how to exclude multiple credential providers. Separate the GUIDs with a comma should do the job.

        Reply
        • Koen Stronkhorst on March 2, 2023 11:41

          Awesome! Thanks for your quick response Peter, this seems to work just fine!

          Reply
        • Koen Stronkhorst on March 3, 2023 08:28

          Just one more questions Peter, when adding multiple credential providers, and separating them with a comma, do I have to use space after the comma or only comma and then next provider tag?

          Thanks!

          Reply
          • Peter Klapwijk on March 4, 2023 09:27

            Just a comma, no other spaces.

            Reply
    4. jeet on March 4, 2023 12:40

      windows hello for business and FIDO both are phishing resistant have similar security.
      just thinking why any org will invest in FIDO if they have WHFB.

      Reply
      • Peter Klapwijk on March 6, 2023 09:54

        To setup WHfB, you still first have to sign in to the device with a password, that’s where the FIDO key comes in.
        And on shared Windows devices sign in with a sec key is preferred above sign in with a password.

        Reply
    5. Koen Stronkhorst on March 30, 2023 13:27

      Hi Peter, one last question. When WHfB is forced, it seems that after adding and deploying this policy, the setup PIN (set up by WHfB) is still usable for login. Do you know if it’s required to turn off this WHfB, so that PIN code is no longer usable?

      Or am I using the wrong GUID of the PIN credential provider? If yes, do you know which one I should use?

      Thanks, again!

      Reply
    6. Mike B on April 4, 2024 18:25

      Thanks for this article Peter! I’ve just tried to set this up using a FIDO2 key and am asked to set up and then use a PIN with the key.

      So at the Win login screen with the USB inserted it asks first for a PIN and then to touch the security key (might as well just use Win Hello PIN with this workflow).
      Have MS changed this requirement since you published this article?

      I want to be able to log in to windows by just touching the security key as in your article. I’m using a Thetis key which is U2F & FIDO2 (but doesn’t have a fingerprint reader like your key).

      Reply
      • Peter Klapwijk on April 5, 2024 11:01

        Hi Mike,

        You are asked for a PIN because you are not using a BIO version key with a fingerprint. If you would have such a version, you’re not asked for a PIN.

        Reply
    7. Richard on June 3, 2024 17:34

      Hi Peter,
      first of all thanks for this tutorial. Question from our side would be, if it is still possible to use Password Authentication for UAC prompts and Admin Login.
      We would like to have our users forced to use the FIDO 2 Stick, in our case YubiKey 5, but the UAC prompt would still need a password and it must be possible to login as Admin using a password.

      Looking forward for your thoughts 🙂

      Reply
      • Peter Klapwijk on June 4, 2024 14:57

        Hi Richard,

        What is described in this article is only related to the sign-in options you have on the logon screen. You can still authenticate inside Windows itself with a password.
        That’s different if you take the next step in going passwordless as you can read in this article https://inthecloud247.com/the-next-step-in-a-passwordless-windows-experience/

        Reply
    8. Eugene on September 25, 2024 16:56

      guided me well but found that windows 11 turned round and said shows smart card requires drivers that are not present on this system W11 – I got in touch with the key provider and they led me down the line of reg key

      REG ADD “HKLM\SOFTWARE\policies\Microsoft\FIDO” /v EnableFIDODeviceLogon /t REG_DWORD /d 1 /f

      for some reason despite me putting the FIDO as credential providor it didn’t like the fido 2.1 nfc card in the reader, once I used that reg key it worked fine but still showed smartcard as an option instead. I’m sure it’s so simple if look deeper into it but up and running at the moment. So just providing reg key for those having similar issue.

      Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Update Windows Defender during Windows Autopilot enrollments

    May 16, 2025

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Adam on Get notified on expiring Azure App Registration client secrets
    • Peter Klapwijk on Update Windows Defender during Windows Autopilot enrollments
    • Rob van de Ven on Add a certificate to the Trusted Publishers with Intune without reporting errors
    • Carl on Update Windows Defender during Windows Autopilot enrollments
    • Peter Klapwijk on The next step in a passwordless Windows experience
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}