Microsoft Will Roll Out Entra Passkeys on Windows Starting in Late April
Microsoft will begin rolling out Entra passkeys on Windows in late April 2026, giving organizations a new phishing-resistant way to sign in to Microsoft Entra-protected resources without using passwords.
The feature lets users create device-bound FIDO2 passkeys that are stored in the local Windows Hello container. Users can then authenticate with Windows Hello methods such as face recognition, fingerprint, or PIN.
Access content across the globe at the highest speed rate.
70% of our readers choose Private Internet Access
70% of our readers choose ExpressVPN
Browse the web from multiple devices with industry-standard security protocols.
Faster dedicated servers for specific actions (currently at summer discounts)
Microsoft expects the rollout to reach general availability by mid-June 2026. The change also extends passwordless sign-in to Windows devices that are not Microsoft Entra joined or registered, including personal and shared devices.
How Entra passkeys on Windows work
Entra passkeys on Windows use public-key cryptography instead of reusable passwords. The private key stays on the Windows device, while Microsoft Entra ID verifies the sign-in through a cryptographic challenge.
When a user signs in, Windows Hello verifies the user locally through biometrics or PIN. The passkey then signs the authentication request, and Microsoft Entra ID validates it with the matching public key.
This design makes passkeys harder to steal through phishing. A fake login page cannot capture a reusable password because the user does not type one. The credential is also bound to the device and the legitimate sign-in service.
At a glance
| Item | Details |
|---|---|
| Feature | Microsoft Entra passkeys on Windows |
| Rollout start | Late April 2026 |
| Expected general availability | Mid-June 2026 |
| Authentication standard | FIDO2 |
| Storage location | Local Windows Hello container |
| User verification | Face, fingerprint, or PIN |
| Supported devices | Corporate, personal, and shared Windows devices |
| Device join required | No |
| Entra device registration required | No |
| Admin controls | Authentication Methods policy and Conditional Access |
| Main benefit | Phishing-resistant passwordless sign-in |
| Main limitation | It does not provide Windows device sign-in by itself |
Why this update matters
The biggest change is support for unmanaged Windows devices. Many organizations still have users who access company resources from personal laptops, shared machines, contractor devices, or other PCs that are not fully joined to Microsoft Entra.
Those scenarios often keep passwords in the login flow. Entra passkeys on Windows give organizations a safer option without forcing every device into full management first.
This does not replace device management. Entra-joined and Intune-managed devices still provide stronger compliance checks, policy enforcement, inventory, and security controls. But passkeys can reduce password reliance in access scenarios where full device enrollment is not practical.
Entra passkeys vs. Windows Hello for Business
Microsoft Entra passkeys on Windows and Windows Hello for Business both use FIDO2-based authentication, but they serve different purposes.
Entra passkeys on Windows focus on signing in to Microsoft Entra-protected cloud resources from a Windows device. They do not require the device to be joined or registered.
Windows Hello for Business can also support Windows device sign-in and single sign-on to Entra-integrated resources after the user signs in to the device. It usually fits managed device scenarios more closely.
| Feature | Entra passkey on Windows | Windows Hello for Business |
|---|---|---|
| Main purpose | Sign in to Entra-protected resources | Windows device sign-in and SSO |
| Device join required | No | Often tied to device registration or join |
| Device registration required | No | Usually part of provisioning |
| Credential storage | Windows Hello container | Windows Hello for Business credential model |
| Multiple work accounts on one PC | Supported | More limited by device and account relationship |
| Management | Entra Authentication Methods policy | Intune, Group Policy, and Entra device controls |
Admin controls and rollout behavior
Administrators can manage Entra passkeys through the Microsoft Entra Authentication Methods policy. Organizations must have Microsoft Entra ID with passkeys enabled for the relevant users.
Conditional Access policies also matter. The feature works when access rules allow the sign-in scenario, including corporate-managed, personal, or shared Windows devices.
Identity teams should review passkey profiles, authentication strengths, and access rules before the rollout completes. This is especially important for organizations that restrict access based on device trust, location, compliance status, or user risk.
Why Microsoft is pushing passkeys
Credential theft remains one of the biggest enterprise security problems. Attackers use phishing kits, infostealer malware, adversary-in-the-middle pages, and token theft to bypass traditional sign-in controls.
Passkeys reduce that risk because they do not rely on a shared secret. The private key never leaves the device, and the user does not type a password that can be stolen or replayed.
Microsoft has also been moving more of its identity platform toward passwordless security. The Entra passkeys rollout fits that broader direction, along with stronger MFA defaults and passwordless account experiences.
What organizations should do now
- Review the Microsoft Entra Authentication Methods policy.
- Confirm which users can register passkeys.
- Check Conditional Access rules for unmanaged and shared Windows devices.
- Decide whether BYOD devices should use Entra passkeys.
- Prioritize admins, finance users, developers, executives, and remote workers.
- Update help desk guidance for passkey registration and recovery.
- Train users to recognize Windows Hello-based passkey prompts.
- Monitor registration and sign-in logs during the rollout.
- Secure fallback methods, especially account recovery and MFA reset flows.
What users will experience
Users will register a passkey on a Windows device and protect it with Windows Hello. After that, they can use face recognition, fingerprint, or PIN to sign in to Microsoft Entra ID.
The process should feel familiar to users who already use Windows Hello. The security change happens behind the scenes because the sign-in uses a device-held cryptographic key instead of a password.
Users should also understand that these passkeys are device-bound. If they lose access to the device, they may need another registered method or help desk recovery to regain access.
Why unmanaged device support is important
Unmanaged devices create a difficult balance for IT teams. Organizations may need to support contractors, temporary workers, shared PCs, and personal laptops, but they may not want to lower authentication standards.
Entra passkeys on Windows help close that gap. They give users a phishing-resistant login method while keeping the credential stored locally in the Windows Hello container.
This can reduce password exposure across mixed environments. It also gives administrators more control through Entra policies instead of leaving unmanaged-device access dependent on passwords alone.
FAQ
Microsoft Entra passkeys on Windows are FIDO2 passkeys stored in the local Windows Hello container. They let users sign in to Microsoft Entra ID with Windows Hello face recognition, fingerprint, or PIN.
Microsoft will begin rolling out the feature worldwide in late April 2026 and expects to complete general availability by mid-June 2026.
No. Microsoft says Entra passkeys on Windows can work on devices that are not Microsoft Entra joined or registered.
Yes. Users can register multiple passkeys for multiple work or school accounts on the same Windows device.
Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more
User forum
0 messages