Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Passkey profiles enable granular group-based configurations for passkey FIDO2 authentication. Instead of a single tenant-wide setting, you can define specific requirements such as attestation, passkey type (device-bound or synced), or Authenticator Attestation GUID (AAGUID) restrictions. You can apply requirements in separate passkey profiles for different user groups, such as admins versus frontline staff.
Note
An Authentication Policy Administrator needs to configure a passkey profile (preview) to enable synced passkeys (preview). For more information, see How to enable synced passkeys (FIDO2) in Microsoft Entra ID (preview).
What are passkey profiles?
A passkey profile is a named set of policy rules that governs how users in targeted groups can register and authenticate with passkeys (FIDO2). Profiles support advanced controls such as:
- Enforce attestation: Enabled, Disabled
- Target types: Device-bound, Synced
- Target specific authenticators: Allow or block specific authenticators by their AAGUID. For more information, see Authenticator Attestation GUID.
Before you begin
- Users must complete multifactor authentication (MFA) within the past five minutes before they can register a passkey (FIDO2).
- Users need an authenticator that supports Microsoft Entra ID's attestation requirements. For more information, see Microsoft Entra ID attestation for FIDO2 security key vendors.
- Devices must support passkey (FIDO2) authentication. For Windows devices that are joined to Microsoft Entra ID, the best experience is on Windows 10 version 1903 or higher. Hybrid-joined devices must run Windows 10 version 2004 or higher.
- If a passkey profile for both device-bound and synced passkeys targets Microsoft Authenticator, users need to run Microsoft Authenticator iOS version 6.8.37 or Android version 6.2507.4749.
- Policy size limit:
- The Authentication methods policy supports a size limit of 20KB. You can't save more passkey profiles after the size limit is reached. To check the size, use the Get authenticationMethodsPolicy Microsoft Graph API to retrieve the JSON for the Authentication methods policy. Save the output as a .txt file, then right-click and select Properties to view the file size.
- Reference sizes:
- Base passkey policy without changes: 1.44 KB
- Target with 1 applied passkey profile: 0.23 KB
- Target with 5 applied passkey profiles: 0.4 KB
- Passkey profile with no AAGUIDs: 0.4 KB
- Passkey profile with 10 AAGUIDs: 0.3 KB
Enable passkey profiles (preview)
Note
Upon opting-in to passkey profiles (preview), your global passkey (FIDO2) policy settings will be automatically transferred to a Default passkey profile. A maximum of 3 passkey profiles, including the Default passkey profile are supported. Support for more passkey profiles is in development.
Sign in to the Microsoft Entra admin center as at least an Authentication Policy Administrator.
Browse to Entra ID > Security > Authentication methods > Policies.
Select Passkey (FIDO2), and select Opt-in to public preview on the public preview banner to see the passkey profiles (preview).
Note
Previous Passkey (FIDO2) policy settings are automatically transferred to the Default passkey profile. Previous user targets are also automatically transferred to Enable and target.
To complete opting-in, select the Default passkey profile.
For Target Types, select Device-bound, Synced (preview), or both, and select Save.
Create a new passkey profile
On the Configure tab, click + Add passkey profile.
Fill out the profile details. The following table explains the impact of various selections.
Enforce attestation
Enforce attestation set to Yes Enforce attestation to No Requires a passkey to present a valid attestation statement at registration time so Microsoft Entra ID can verify the authenticator’s make and model against trusted metadata. This gives your organization assurance that the passkey is genuine and comes from the stated vendor.
Attestation is checked only during registration; existing passkeys that were added without attestation aren’t blocked from signing in if you enable attestation later.
Synced passkeys don't support attestation. If you set Enforce attestation to Yes, synced passkeys aren't an option in Target Types.
For other vendor attestation requirements, see Microsoft Entra ID attestation for FIDO2 security key vendors.Doesn't require a passkey to present a valid attestation statement at registration time.
Microsoft Entra ID can't guarantee any attribute about a passkey, including if it's synced or device-bound, or the specific make, model, or provider, even if Target specific AAGUIDs is applied.
Synced passkeys are only supported if Enforce attestation is set to No.
For other vendor attestation requirements, see Microsoft Entra ID attestation for FIDO2 security key vendors.Target Types can allow either device-bound passkeys, synced passkeys, or both.
Note
Synced passkeys don't show as an option if attestation is enforced.
Target specific AAGUIDs Enable this setting if you want to allow or block certain security key models or passkey providers, identified by their AAGUID. This helps you control which authenticators you allow users in your organization to register and authenticate passkeys with.
Note
If attestation isn’t enforced, AAGUID information is based on what the authenticator reports and can’t be fully guaranteed. Use AAGUID lists as a policy guide rather than a strict security control when attestation is off.
Warning
Key restrictions set the usability of specific models or providers for both registration and authentication. If you change key restrictions and remove an AAGUID that you previously allowed, users who previously registered an allowed method can no longer use it for sign-in.
After you finish the configuration, select Save.
Apply a passkey profile to a targeted group
Select Enable and Target.
Select Add target and select either All users or Select targets to select groups.
Select which passkey profiles you want assigned to a specific target.
Note
A target group (for example, Engineering) can be scoped for multiple passkey profiles. When a user is scoped for multiple passkey profiles, registration and authentication with a passkey is allowed if it fully satisfies the requirement of one of the scoped passkey profiles. There's no particular order to the check. If a user is a member of an excluded group in the Passkeys (FIDO2) authentication method policy, they're blocked from FIDO2 passkey registration or sign-in. Excluded groups take precedence over Included groups.
Delete a passkey profile
Select Configure.
Select the trash can to the right of the passkey profile you want to delete, and select Save.
Note
You can delete a profile only if it's not assigned to a group of users in Enable and target. If the trash can is gray, first remove any targets that are assigned that profile.
Disable passkey profiles (preview)
Note
Opting out of passkey profiles (preview) will:
- Remove all passkey profiles and their associated targets
- Revert your passkey policy to the configuration of your default passkey profile, including its user targets
- Disable support for synced passkeys
Ensure that no administrators will be locked out of their accounts due to these changes.
- Sign in to the Microsoft Entra admin center as at least an Authentication Policy Administrator.
- Browse to Entra ID > Security > Authentication methods > Policies.
- Select Passkey (FIDO2), and select Opt-out of public preview on the public preview banner.
- Review the conditions of opting out, and click opt-out if you accept.
Examples of use cases for passkey profiles
Note
If a passkey profile for both device-bound and synced passkeys targets Microsoft Authenticator, users need to run Microsoft Authenticator iOS version 6.8.37 or Android version 6.2507.4749.
Special consideration for high-privileged accounts
| Passkey profile | Target groups | Passkey types | Attestation enforcement | Key Restrictions |
|---|---|---|---|---|
| All device-bound passkeys (attestation enforced) | IT admins Executives Engineering |
Device-bound | Enabled | Disabled |
| All synced or device-bound passkeys | HR Sales |
Device-bound, Synced | Disabled | Disabled |
Targeted rollout of passkeys in Microsoft Authenticator
| Passkey profile | Target groups | Passkey types | Attestation enforcement | Key restrictions |
|---|---|---|---|---|
| All device-bound passkeys (excluding Microsoft Authenticator) | All users | Device-bound | Enabled | Enabled - Behavior: Block - AAGUIDs: Microsoft Authenticator for iOS, Microsoft Authenticator for Android |
| Passkeys in Microsoft Authenticator | Pilot group 1 Pilot group 2 |
Device-bound | Enabled | Enabled Behavior: Allow - AAGUIDs: Microsoft Authenticator for iOS, Microsoft Authenticator for Android |
Related content
How to enable synced passkeys (FIDO2) in Microsoft Entra ID (preview)