Hello @Christoph Kling ,
Why is that so?
- Windows Hello on unmanaged Windows devices doesn’t store FIDO2 passkeys for Entra ID accounts because Microsoft requires the device to be Azure AD-joined and managed (e.g., via Intune) to trust the platform authenticator. Personal Microsoft accounts don’t have this restriction, so passkeys can be stored directly in Windows Hello.
How can I replicate the personal account login experience?
To replicate it for personal accounts, use one of the following options:
- Azure AD-join and enable Windows Hello for Business (requires device management).
- Use FIDO2 security keys or mobile passkeys (iOS/Android), which work without managing the device.
Is it possible to configure Entra ID to lower the FIDO2 trust level so Windows Hello can store passkeys on unmanaged devices?
- Microsoft Entra ID does not currently support lowering the trust level required for FIDO2 passkeys to enable storage in Windows Hello on unmanaged or non-Azure AD-joined Windows devices.
- Windows Hello cannot be used to store FIDO2 passkeys for Entra ID accounts on unmanaged or non-Azure AD-joined devices.
Is there a tenant policy that allows this?
- There is no tenant-level policy or configuration currently available that allows administrators to relax the trust requirements for FIDO2 passkey storage in Windows Hello on unmanaged devices
If this answer was helpful to you, please click Accept Answer
and mark Yes
for was this answer helpful, which may help members with similar questions.
If you have more questions or are still experiencing issues, feel free to ask in the "comments" section and I’ll be happy to assist you.