Microsoft Will Roll Out Entra Passkeys on Windows Starting in Late April


Microsoft will begin rolling out Entra passkeys on Windows in late April 2026, giving organizations a new phishing-resistant way to sign in to Microsoft Entra-protected resources without using passwords.

The feature lets users create device-bound FIDO2 passkeys that are stored in the local Windows Hello container. Users can then authenticate with Windows Hello methods such as face recognition, fingerprint, or PIN.

Microsoft expects the rollout to reach general availability by mid-June 2026. The change also extends passwordless sign-in to Windows devices that are not Microsoft Entra joined or registered, including personal and shared devices.

How Entra passkeys on Windows work

Entra passkeys on Windows use public-key cryptography instead of reusable passwords. The private key stays on the Windows device, while Microsoft Entra ID verifies the sign-in through a cryptographic challenge.

When a user signs in, Windows Hello verifies the user locally through biometrics or PIN. The passkey then signs the authentication request, and Microsoft Entra ID validates it with the matching public key.

This design makes passkeys harder to steal through phishing. A fake login page cannot capture a reusable password because the user does not type one. The credential is also bound to the device and the legitimate sign-in service.

At a glance

ItemDetails
FeatureMicrosoft Entra passkeys on Windows
Rollout startLate April 2026
Expected general availabilityMid-June 2026
Authentication standardFIDO2
Storage locationLocal Windows Hello container
User verificationFace, fingerprint, or PIN
Supported devicesCorporate, personal, and shared Windows devices
Device join requiredNo
Entra device registration requiredNo
Admin controlsAuthentication Methods policy and Conditional Access
Main benefitPhishing-resistant passwordless sign-in
Main limitationIt does not provide Windows device sign-in by itself

Why this update matters

The biggest change is support for unmanaged Windows devices. Many organizations still have users who access company resources from personal laptops, shared machines, contractor devices, or other PCs that are not fully joined to Microsoft Entra.

Those scenarios often keep passwords in the login flow. Entra passkeys on Windows give organizations a safer option without forcing every device into full management first.

This does not replace device management. Entra-joined and Intune-managed devices still provide stronger compliance checks, policy enforcement, inventory, and security controls. But passkeys can reduce password reliance in access scenarios where full device enrollment is not practical.

Entra passkeys vs. Windows Hello for Business

Microsoft Entra passkeys on Windows and Windows Hello for Business both use FIDO2-based authentication, but they serve different purposes.

Entra passkeys on Windows focus on signing in to Microsoft Entra-protected cloud resources from a Windows device. They do not require the device to be joined or registered.

Windows Hello for Business can also support Windows device sign-in and single sign-on to Entra-integrated resources after the user signs in to the device. It usually fits managed device scenarios more closely.

FeatureEntra passkey on WindowsWindows Hello for Business
Main purposeSign in to Entra-protected resourcesWindows device sign-in and SSO
Device join requiredNoOften tied to device registration or join
Device registration requiredNoUsually part of provisioning
Credential storageWindows Hello containerWindows Hello for Business credential model
Multiple work accounts on one PCSupportedMore limited by device and account relationship
ManagementEntra Authentication Methods policyIntune, Group Policy, and Entra device controls

Admin controls and rollout behavior

Administrators can manage Entra passkeys through the Microsoft Entra Authentication Methods policy. Organizations must have Microsoft Entra ID with passkeys enabled for the relevant users.

Conditional Access policies also matter. The feature works when access rules allow the sign-in scenario, including corporate-managed, personal, or shared Windows devices.

Identity teams should review passkey profiles, authentication strengths, and access rules before the rollout completes. This is especially important for organizations that restrict access based on device trust, location, compliance status, or user risk.

Why Microsoft is pushing passkeys

Credential theft remains one of the biggest enterprise security problems. Attackers use phishing kits, infostealer malware, adversary-in-the-middle pages, and token theft to bypass traditional sign-in controls.

Passkeys reduce that risk because they do not rely on a shared secret. The private key never leaves the device, and the user does not type a password that can be stolen or replayed.

Microsoft has also been moving more of its identity platform toward passwordless security. The Entra passkeys rollout fits that broader direction, along with stronger MFA defaults and passwordless account experiences.

What organizations should do now

  • Review the Microsoft Entra Authentication Methods policy.
  • Confirm which users can register passkeys.
  • Check Conditional Access rules for unmanaged and shared Windows devices.
  • Decide whether BYOD devices should use Entra passkeys.
  • Prioritize admins, finance users, developers, executives, and remote workers.
  • Update help desk guidance for passkey registration and recovery.
  • Train users to recognize Windows Hello-based passkey prompts.
  • Monitor registration and sign-in logs during the rollout.
  • Secure fallback methods, especially account recovery and MFA reset flows.

What users will experience

Users will register a passkey on a Windows device and protect it with Windows Hello. After that, they can use face recognition, fingerprint, or PIN to sign in to Microsoft Entra ID.

The process should feel familiar to users who already use Windows Hello. The security change happens behind the scenes because the sign-in uses a device-held cryptographic key instead of a password.

Users should also understand that these passkeys are device-bound. If they lose access to the device, they may need another registered method or help desk recovery to regain access.

Why unmanaged device support is important

Unmanaged devices create a difficult balance for IT teams. Organizations may need to support contractors, temporary workers, shared PCs, and personal laptops, but they may not want to lower authentication standards.

Entra passkeys on Windows help close that gap. They give users a phishing-resistant login method while keeping the credential stored locally in the Windows Hello container.

This can reduce password exposure across mixed environments. It also gives administrators more control through Entra policies instead of leaving unmanaged-device access dependent on passwords alone.

FAQ

What are Microsoft Entra passkeys on Windows?

Microsoft Entra passkeys on Windows are FIDO2 passkeys stored in the local Windows Hello container. They let users sign in to Microsoft Entra ID with Windows Hello face recognition, fingerprint, or PIN.

When will Microsoft roll this out?

Microsoft will begin rolling out the feature worldwide in late April 2026 and expects to complete general availability by mid-June 2026.

Do devices need to be Microsoft Entra joined?

No. Microsoft says Entra passkeys on Windows can work on devices that are not Microsoft Entra joined or registered.

Can one Windows PC store passkeys for multiple work accounts?

Yes. Users can register multiple passkeys for multiple work or school accounts on the same Windows device.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages