Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Enable passwordless authentication to Windows 10 with Yubico security keys
    Intune

    Enable passwordless authentication to Windows 10 with Yubico security keys

    Peter KlapwijkBy Peter KlapwijkNovember 6, 2019Updated:December 7, 201967 Mins Read

    In the past I wrote some security related blog posts with subjects like Windows Hello Multifactor Device Unlock, Self Service Password Reset on the Windows Logon screen and Securing the Azure MFA registration process. This time I`ll have a look at the passwordless sign-in feature to Windows 10 with Yubikey security keys.

    This passwordless sign-in feature for Windows 10 is made possible by the support in Azure AD for FIDO2 security keys, which was announced (in preview) by Alex Simons back in July 2019. Supported FIDO2 security keys, provide a passwordless sign-in option, to Saas apps (like the Office 365 portal) or to an Azure AD joined Windows 10 device.

    FIDO stands for Fast Identity Online, an open standard to sign-in safely to SaaS apps and computers. The goal of FIDO is to make the sign-in proces more secure and simplified. This is accomplished by sign-in in without using a username and password; passwordless.

    To enable passwordless sign-in to Windows 10 devices in my environment, I used Microsoft Intune and Azure AD for the implementation of the required settings. As security key I used a Yubico YubiKey and the Windows device runs Windows 10 1903.

    Prerequisites

    There are some prerequisites to get the passwordless sign in feature up and running for Windows 10 Azure AD joined devices;

    • Azure Multi-Factor Authentication
    • Combined security information registration
    • Compatible FIDO2 security key (Like the Yubico key I used)
    • WebAuthn requires Windows 10 version 1809 or higher
    • Azure AD joined devices require Windows 10 version 1809 or higher (best experience with 1903 and higher)

    Enable security keys for Windows sign-in

    We need to enable the the security keys as a sign-in option for our Windows 10 devices in Microsoft Intune. In Intune this can be done by enabling this as part of a tenant wide Windows Hello for Business (WHfB) setting or by deploying an Identity Protection configuration policy.

    Using this first option is a tenant wide setting for all users.

    Open a browser to sign-in to the Microsoft Intune portal.

    • Sign-in to the Device Management Portal
    • Browse to Devices – Windows – Windows Enrollment
    • Click Windows Hello for Business
    • Set Use Security keys for sign-in to Enabled
    • Click Save

    The same can be accomplished by using an Identity Protection configuration policy. The advantage of using a configuration policy is you can assign it to a group of users instead of all users.

    • Browse to Devices – Windows – Configuration profiles
    • Click Create profile
    • Give the policy a Name
    • Enter a Description (optional)
    • Choose Windows 10 and later as Platform
    • Choose Identity protection as Profile type
    • On the Settings tab set Use security keys for sign-in to Enable
    • Click OK
    • Click Create
    • Assign the policy to the security group of choice

    The documentation states we also need to deploy the Intune CSP setting UseSecurityKeyForSignin. But during my testing with Windows 10 1903, that setting wasn`t needed (anymore).

    Enable combined security information registration

    The next step is to enable combined security information registration, which is at the moment of writing, in preview.
    The feature needs to be enabled from the Azure (AD) Portal.

    • Sign-in to the Azure AD portal
    • Browse to Azure Active Directory – User settings
    • Click Manage user feature preview settings
    • Select All to switch on the feature for all users
    • Click Save

    Enable FIDO2 security keys as Authentication methode

    The third step is to enable FIDO2 security keys as Authentication method in Azure Active Directory.

    • Still in the Azure AD Portal browse to Azure Active Directory
    • Browse to Security – Authentication methods
    • Click FIDO2 Security Keys
    • Set Enable to Yes
    • Leave Target set to All or switch to Select users and select a security group
    • Click Save

    In above screen we also have the option to block Self-service setup of the security keys and a Key restrictions policy. If you want to block specific security keys or only allow specific security keys, you need the AAGuid of an security key. Those for the security keys of Yubico can be found here.

    End-user experience: FIDO key registration

    For the end-user to use the FIDO2 security key, the key first needs to be registered in Azure AD. This can be done by visiting https://myprofile.microsoft.com with a browser (like Edge, Chrome, Firefox) which supports WebAuthn.

    Signed-in to the portal, click Update info under Security info.

    On the Security info page click Add method.

    Pick Security key from the drop-down list and click Add.

    Select USB Device.

    Click Next.

    Insert the FIDO2 security key.
    Your PC will redirect you to a new window to finish setup.

    Follow the instructions described in the new window.
    Click Continue in de pop-up screen.

    Create a PIN for this security key and enter the PIN a second time. Click OK.

    Touch the Security key.

    Give your security key a Name, so you can identify your key, and click Next.

    You`re all Set! Registration of the security key is finished.
    Click Done.

    The security key is listed as one of the sign-in methods.

    End-user experience: sign-in to a Windows 10 device

    Get yourself an Azure AD joined Windows 10 (1809 or later) device.
    When you click on Sign-in options on the login Window, the new option is shown.

    In the middle we now have the security key icon.

    When you click on the security key icon, you are asked to insert the key.

    When you insert your FIDO2 security key, you are prompted to enter your PIN code.
    After entering your PIN, you are asked to touch your key. After you have touched your key, you are signed-in to Windows without entering your password!

    To sign-in to a Windows 10 device it isn`t necessary to choose the security key sign-in option. As soon as you insert the security key, the key is recognized as sign-in option and you are directly asked for the security key PIN.

    By using the security key, you are able to sign-in to a device without entering your username and password, completely passwordless! Instead of for example a PIN as part of Windows Hello for Business. Where you first need to authenticatie using a username and password and after that are able to create a PIN for future sign-ins to Windows.

    At this moment there is only one time you still need to use your username and password on a Windows 10 device, during the OOBE proces for Azure AD (AAD) authentication. But at Ignite 2019 support for FIDO2 was announced for Windows Autopilot. In the future during OOBE, using Autopilot for authentication to AAD and enrollment into Intune, we can also use security keys!

    End-user experience: Sign-in to a SaaS app

    The FIDO2 security key cannot only be used to sign-in to a Windows 10 device, but also to sign-in to a SaaS app, like Office 365. Let`s see how that looks like.

    Open a browser which supports WebAuthn like to new Chromium based Edge browser. Visit office.com and click Sign in.
    On the new page click Sign-in options.

    Select Sign in with a security key.

    When the security key isn`t inserted yet to your device, it will show below screen.
    Insert the security key.

    Enter the PIN code from the security key.
    Click OK.

    Touch the security key.

    And we are signed-in to the Office 365 portal without providing our username and password!

    The Yubico security key with FIDO2 support I used works just fine. I`m very curious what FIDO2 security keys as a whole, will bring us in the passwordless future.
    At this moment we can use the keys, as I showed, to sign-in passwordless to Azure AD joined Windows 10 devices and SaaS apps. But at Ignite was announced these capabilities will be expanded to hybrid environments as we can read here.
    Another interesting development, related to the FIDO2 security keys, are biometric security keys, as also announced for YubiKeys at Ignite. This type of security keys supports fingerprint recognition.

    Feitian already has a few biometric security keys in their portfolio. A new post about those keys can be read HERE.

    Lot of developments around a passwordless future which we should follow.

    Happy testing!

    Azure AD Browser EMS FIDO2 Identity Management Intune Microsoft 365 Microsoft Endpoint Manager Passwordless Security Windows10 Yubico YubiKey
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Use an ATKey.Pro security key with multiple accounts

    November 23, 2020

    Manage Microsoft Edge Chromium extensions with Microsoft Intune

    February 18, 2020

    Automatically wipe a Windows 10 device after a number of authentication failures

    November 14, 2019
    View 6 Comments

    6 Comments

    1. Rkast on November 8, 2019 19:59

      Now support for locking the workstation when removing the key. Even enabling the GPO and starting the removal smartcard service Does not lock the system when the key is removes. Got it working with a Self Made tool/script.

      Reply
      • Peter Klapwijk on November 9, 2019 19:24

        That would be a great addition!

        Reply
      • Bas H on February 25, 2020 14:35

        Can you share your self made tool/script?

        Reply
      • Jeroen on March 26, 2020 22:31

        Please share your script.

        Reply
      • shashi prakash Singh on October 8, 2020 22:10

        Hi Rkast
        Is it possible to share your script?

        Reply
      • Tyler Johnson on May 28, 2021 07:31

        This can be done via Arduino NFC/MFA, Tech is already there just not for Yubikey

        Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Update Windows Defender during Windows Autopilot enrollments

    May 16, 2025

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Adam on Get notified on expiring Azure App Registration client secrets
    • Peter Klapwijk on Update Windows Defender during Windows Autopilot enrollments
    • Rob van de Ven on Add a certificate to the Trusted Publishers with Intune without reporting errors
    • Carl on Update Windows Defender during Windows Autopilot enrollments
    • Peter Klapwijk on The next step in a passwordless Windows experience
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}