Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Microsoft365»The next step in a passwordless Windows experience
    Microsoft365

    The next step in a passwordless Windows experience

    Peter KlapwijkBy Peter KlapwijkOctober 28, 2023Updated:November 6, 202339 Mins Read

    We most likely all know passwords don’t have a future and therefore I’m happy more and more companies embrace authentication options without using a password (passwordless). One of the companies that is at the forefront of this is Microsoft, at least on Windows (of course on Windows). Microsoft supports passwordless authentication options like Windows Hello (for Business), phone sign-in (with the Microsoft Authenticator app) and FIDO2 security keys.

    But a Windows device is originally not designed to sign in to the device without a password, so on several parts in the Windows system we see the password sign-in option (or related settings). With the recent release of the Enable Passwordless Experience setting in Microsoft Intune and the release of Windows 11 23H2, we now have an option to hide password-related settings and the password sign-in option. But wait, didn’t we already have such an option when we exclude credential providers which I described in this blog post? Well, these two settings don`t exactly do the same thing. So let’s have a look at these two settings.

    Enable Passwordless Experience (configure the Intune profile)

    Let`s start with the newly released Enable Passwordless Experience setting. As written in the Windows IT Pro blog;

    Once the policy is set, it removes passwords from the user experience, both for device sign-in as well as in-session auth scenarios like password managers in a web browser, “Run as” admin scenarios, and User Account Control (UAC). Users will need to use Windows Hello for authentication in place of a password.

    Enabling this setting only hides the password option from certain parts of the Windows system.

    Let`s see how we can configure this using Microsoft Intune and how the end-user experience is.

    Let’s sign into the Intune portal.

    • Browse to Devices, Windows, Configuration profile
    • Click Create profile
    • Select Windows 10 and later as Platform
    • Select Settings Catalog as Profile type
    • Click Create
    • Enter a Name for the profile
    • Enter a Description (optional)
    • Click Next

    In the Settings Picker browse to the Authentication section. Here check Enable Passwordless Experience.

    The setting is added to the configuration profile. Select Enabled from the drop-down list.
    Finish creating the profile by assigning the profile to a (device) group.

    That’s all to enable the new Passwordless experience for our Windows devices.

    But you might want to consider configuring another setting, Enable Web sign-in.
    Web sign-in can be used as a recovery mechanism when the end-user for some reason can’t sign in anymore to the device with for example a FIDO2 key or Windows Hello for Business. For Web sign-in, the user needs to have a Temporary Access Pass (TAP) or phone sign-in activated with the Microsoft Authenticator app.

    Web sign-in is also found under the Authentication section in the Settings Catalog profile.

    When you enable Web sign-in on your Windows devices, you might consider a second optional setting. This is because when a user starts his device, a Sign in button is shown in the middle of the screen, which opens the Web sign-in experience. But as written, this is just a recovery option, thus not the default sign-in option for the end user. This could be confusing for the end-user, so you might want to configure a default sign-in option. We can do this by configuring a default credential provider, as I showed in a previous blog post. In that article, a FIDO2 security key was assigned as the default sign-in option, below I show you how to assign the PIN (code) as the default option.

    A few well-known credential provider GUIDs related to Windows Hello are:

    PIN{D6886603-9D2F-4EB2-B667-1971041FA96B}
    Fingerprint{BEC09223-B018-416D-A0AC-523971B639F5}
    Facial Recognition{8AF662BF-65A0-4D0A-A540-A338A999D36F}

    This setting is also found in the Settings Catalog profile but under Administrative Templates, System, Logon section. Add the Assign the following credential provider as the default credential provider setting to your profile, switch the setting to enabled, and add the GUID to the text box.

    All is set now, to switch over to the end user device.

    Unfortunately, the Enable passwordless Experience wasn’t applied to my Windows Insider test device (on which I tested this setting at first) and also not on my 23H2 machine (version 10.0.22632.2428). I have no idea why the setting doesn’t work for me. Some people in the community report the setting from the Settings Catalog does work fine and others report it also doesn’t work for them.
    We can also deploy the setting as custom OMA-URI CSP, so let me also show you how that is done, as that setting does work as expected.

    We need to create an additional configuration profile for this setting.

    • Click Create profile
    • Select Windows 10 and later as Platform
    • Select Templates as profile type
    • Select Custom and click Create

    Enter a Name and Description and click Next.

    Click Add, to add an OMA_URI row.

    Enter below information to the policy;
    Name: EnablePasswordlessExperience
    OMA-URI: ./Device/Vendor/MSFT/Policy/Config/Authentication/EnablePasswordlessExperience
    Data Type: Integer
    Value: 1

    When we finished creating the profile, it is time to switch to the end user device.

    Enable Passwordless Experience (end-user experience)

    As you can see, I was already signed in with my demo user account. On the Windows logon screen, the option to sign in with a password is not available.

    When we go to Other user, we do have the password authentication option available.
    We can also see the Sign in button in the middle of the screen, screaming to the user to be selected.

    But that Sign in button is to start the Web sign-in experience. And as written, that option does only work when the user enabled phone sign-in in the Microsoft Authenticator app (or with TAP) as recovery option.

    Or isn’t that really the case, I still see a Use your password instead option available 🙁

    In case you have assigned PIN (or another provider) as the default credential provider, the Sign in button isn’t shown in the middle of the screen.

    When we are signed in to the device, we see the password option is removed in the Settings, under

    We can still use a password when we use the Run as option.

    But the option to use a password in a UAC prompt is removed, which makes remote assistance for a help desk employee who needs to elevate his permissions challenging.

    This Microsoft article describes the password option is disabled for User Account Control (UAC) elevation, except if a local user account is used for elevation.

    We do however still have the password authentication option when we remotely need to connect to another device using Remote Desktop Connection.

    Exclude the password credential provider (configure the Intune profile)

    Another option to remove the password authentication option from the Windows logon screen is using the setting Exclude the following credential providers. As already briefly mentioned in a previous blog post this setting completely removes the option to use the password authentication option from our Windows devices.

    The setting uses the credential provider GUID to exclude a credential provider. The GUID for the PasswordProvider is {60b78e88-ead8-445c-9cfd-0b87f74ea6cd}.

    The setting is like the new setting, available in the Intune Settings Catalog profile.

    This is all we need to configure for this setting. We can of course, also enable Web sign-in or configure a default credential provider, but that is already shown in the previous part.

    Exclude the password credential provider (end-user experience)

    In the below example we see we only have the authentication options security key (FIDO2) and PIN available (I have not configured face recognition or fingerprint). Password is removed from the Windows logon screen.

    But when we choose Other user, we see that now also the password authentication is removed from the Windows logon screen.

    When we are signed in to Windows, we see password setting is not removed from the Windows settings.

    The password authentication option is not available anymore when using Run as to start a program.

    Also in the Remote Desktop Connection, we have no option anymore to use a password.

    Conclusion

    Let’s end this article with a short conclusion in taking the next step in going passwordless on a Windows device.

    We have two different options available to hide/ remove the password authentication option from Windows. Using the Exclude credential provider option is most likely too restrictive for most companies. Using this setting removes the option to authenticate with a password when using an RDP connection to another machine. A lot of IT admins still need to use RDP during their daily job, this already eliminates this configuration on a lot of these devices. Besides that, a service desk employee who remotely takes over a device from a user also has no option left to elevate permissions because the password option is also removed from UAC. These two examples make this setting not useful for a lot of companies is my expectation.

    Using the new Enable Passwordless Experience setting might be more useful for companies. It allows IT admins to use their password when they need to set up a RDP connection.
    However, providing remote assistance might be challenging when elevation is needed.

    The only option to elevate permissions for helpdesk support is, referring to the Microsoft documentation, using a local administrator account. That actually means Microsoft is pushing organizations to their Windows LAPS solution as just enabling a local administrator account and putting a password on it might not be the best idea. I think only allowing a local administrator account for this situation is blocking a lot of companies, as companies still use (second/ separate) domain accounts for this job, instead of local accounts. But time will tell us what steps are taking in this situation.

    In case a company or a part of its users/ devices has no need for RDP or remote support (that needs elevation using UAC), a combination of the two settings might also be a good option. Because why not hide the password settings, when you completely remove the password credential provider? But that is most likely at the moment a step too far for many organizations. Although using an endpoint privilege management solution might help in this journey as well.

    I’m curious how the passwordless experience is evolving in the near future.

    Thanks for reading the post til the end. What are your experiences and thoughts on taking the next step in the passwordless journey?

    Azure AD Entra FIDO2 KIOSK Microsoft 365 Passwordless Security Windows
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Onboarding a passwordless Azure AD user

    April 1, 2023

    Using your smartphone as a FIDO security with IDmelon

    September 19, 2021

    Automatically wipe a Windows 10 device after a number of authentication failures

    November 14, 2019
    View 3 Comments

    3 Comments

    1. Steve Whitcher on November 1, 2023 13:49

      Passwordless experience sounds great, and is a feature that has been in demand for a long time, but if UAC doesn’t give helpdesk some way to elevate when connected via remote, that’s definitely going to be a show stopper for most organizations.
      Also, after reading your article I went back to the web sign-in documentation to check something and noticed that it apparently IS supported for more than just TAP now. If I’m understanding this correctly, it is now supported to use Web Sign-in for passwordless login to a computer via the authenticator app or using a 3rd party Identity Provider.
      “With the release of Windows 11, the supported scenarios and capabilities of Web sign-in are expanded.
      For example, you can sign in with the Microsoft Authenticator app or with a SAML-P federated identity.”
      From – https://learn.microsoft.com/en-us/windows/security/identity-protection/web-sign-in/?tabs=intune

      Reply
    2. Sam on May 15, 2025 21:20

      Are you able to apply these settings but some users be able to use the password and make other users use fido login?

      Reply
      • Peter Klapwijk on May 16, 2025 15:20

        Not on the same device, if that’s what you mean.

        Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025

    Using Visual Studio with Microsoft Endpoint Privilege Management, some notes

    April 8, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Peter Klapwijk on The next step in a passwordless Windows experience
    • Sam on The next step in a passwordless Windows experience
    • John M on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • Nathalie on How to update win32 applications with Microsoft Intune
    • Peter Klapwijk on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}