This CSP contains some settings that are under development and only applicable for Windows Insider Preview builds. These settings are subject to change and may have dependencies on other features or services in preview.
The PassportForWork configuration service provider is used to provision Windows Hello for Business (formerly Microsoft Passport for Work). It allows you to log in to Windows using your Active Directory or Microsoft Entra account and replace passwords, smartcards, and virtual smart cards.
Important
Starting with Windows 10, version 1607 all devices only have one PIN associated with Windows Hello for Business. This means that any PIN on a device will be subject to the policies specified in the PassportForWork CSP. The values specified take precedence over any complexity rules set via Exchange ActiveSync (EAS) or the DeviceLock CSP.
The following list shows the PassportForWork configuration service provider nodes:
This policy specifies the Tenant ID in the format of a Globally Unique Identifier (GUID) without curly braces { }, which will be used as part of Windows Hello for Business provisioning and management.
✅ [10.0.20348.2402] and later ✅ Windows 10, version 2004 [10.0.19041.4239] and later ✅ Windows 11, version 21H2 with KB5036894 [10.0.22000.2899] and later ✅ Windows 11, version 22H2 with KB5035942 [10.0.22621.3374] and later ✅ Windows Insider Preview
If the user forgets their PIN, it can be changed to a new PIN using the Windows Hello for Business PIN recovery service. This cloud service encrypts a recovery secret which is stored locally on the client, but which can only be decrypted by the cloud service.
If you enable this policy setting, the PIN recovery secret will be stored on the device and the user will be able to change to a new PIN in case their PIN is forgotten.
If you disable or don't configure this policy setting, the PIN recovery secret won't be created or stored. If the user's PIN is forgotten, the only way to get a new PIN is by deleting the existing PIN and creating a new one, which will require the user to re-register with any services the old PIN provided access to.
Some Trusted Platform Modules (TPMs) are only compliant with the older 1.2 revision of the TPM specification defined by the Trusted Computing Group (TCG).
If you enable this policy setting, TPM revision 1.2 modules will be disallowed from being used with Windows Hello for Business.
If you disable or don't configure this policy setting, TPM revision 1.2 modules will be allowed to be used with Windows Hello for Business.
Use this policy setting to configure the use of digits in the Windows Hello for Business PIN.
A value of 1 corresponds to "Required". If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one digit in their PIN.
A value of 2 corresponds to "Disallow". If you configure this policy setting to 2, Windows Hello for Business prevents users from using digits in their PIN.
If you don't configure this policy setting, Windows Hello for Business requires users to use digits in their PIN.
This policy specifies the number of past PINs that can be stored in the history that can't be used. Valid values are 0 to 50 inclusive. If this policy is set to 0, then storage of previous PINs isn't required. PIN history isn't preserved through PIN reset.
Use this policy setting to configure the use of lowercase letters in the Windows Hello for Business PIN.
A value of 1 corresponds to "Required". If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one lowercase letter in their PIN.
A value of 2 corresponds to "Disallow". If you configure this policy setting to 2, Windows Hello for Business prevents users from using lowercase letters in their PIN.
If you don't configure this policy setting, Windows Hello for Business doesn't allow users to use lowercase letters in their PIN.
Description framework properties:
Property name
Property value
Format
int
Access Type
Add, Delete, Get, Replace
Default Value
0
Allowed values:
Value
Description
0 (Default)
Allows the use of lowercase letters in PIN.
1
Requires the use of at least one lowercase letters in PIN.
2
Does not allow the use of lowercase letters in PIN.
Maximum PIN length configures the maximum number of characters allowed for the PIN. The largest number you can configure for this policy setting is 127. The lowest number you can configure must be larger than the number configured in the Minimum PIN length policy setting or the number 4, whichever is greater.
If you configure this policy setting, the PIN length must be less than or equal to this number.
If you don't configure this policy setting, the PIN length must be less than or equal to 127.
Note
If the above specified conditions for the maximum PIN length aren't met, default values will be used for both the maximum and minimum PIN lengths.
Minimum PIN length configures the minimum number of characters required for the PIN. The lowest number you can configure for this policy setting is 4. The largest number you can configure must be less than the number configured in the Maximum PIN length policy setting or the number 127, whichever is the lowest.
If you configure this policy setting, the PIN length must be greater than or equal to this number.
If you don't configure this policy setting, the PIN length must be greater than or equal to 4.
Note
If the above specified conditions for the minimum PIN length aren't met, default values will be used for both the maximum and minimum PIN lengths.
Use this policy setting to configure the use of special characters in the Windows Hello for Business PIN gesture. Valid special characters for Windows Hello for Business PIN gestures include: ! " # $ % & ' ( ) * + , - . / : ; < = > ? @ [ \ ] ^ _ ` { | } ~ .
A value of 1 corresponds to "Required". If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one special character in their PIN.
A value of 2 corresponds to "Disallow". If you configure this policy setting to 2, Windows Hello for Business prevents users from using special characters in their PIN.
If you don't configure this policy setting, Windows Hello for Business doesn't allow users to use special characters in their PIN.
Description framework properties:
Property name
Property value
Format
int
Access Type
Add, Delete, Get, Replace
Default Value
0
Allowed values:
Value
Description
0 (Default)
Allows the use of special characters in PIN.
1
Requires the use of at least one special characters in PIN.
2
Does not allow the use of special characters in PIN.
Use this policy setting to configure the use of uppercase letters in the Windows Hello for Business PIN.
A value of 1 corresponds to "Required". If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one uppercase letter in their PIN.
A value of 2 corresponds to "Disallow". If you configure this policy setting to 2, Windows Hello for Business prevents users from using uppercase letters in their PIN.
If you don't configure this policy setting, Windows Hello for Business doesn't allow users to use uppercase letters in their PIN.
Description framework properties:
Property name
Property value
Format
int
Access Type
Add, Delete, Get, Replace
Default Value
0
Allowed values:
Value
Description
0 (Default)
Allows the use of uppercase letters in PIN.
1
Requires the use of at least one uppercase letters in PIN.
2
Does not allow the use of uppercase letters in PIN.
Boolean that specifies if phone sign-in can be used with a device. Phone sign-in provides the ability for a portable, registered device to be usable as a companion device for desktop authentication.
Default value is false.
If you enable this setting, a desktop device will allow a registered, companion device to be used as an authentication factor.
If you disable this setting, a companion device can't be used in desktop authentication scenarios.
Note
Not supported on Windows Holographic and Windows Holographic for Business prior to Windows 10 version 1903 (May 2019 Update).
A Trusted Platform Module (TPM) provides additional security benefits over software because data stored within it can't be used on other devices.
If you enable this policy setting, only devices with a usable TPM provision Windows Hello for Business.
If you disable or don't configure this policy setting, the TPM is still preferred, but all devices provision Windows Hello for Business using software if the TPM is non-functional or unavailable.
Windows Hello for Business can use certificates to authenticate to on-premise resources.
If you enable this policy setting, Windows Hello for Business will wait until the device has received a certificate payload from the mobile device management server before provisioning a PIN.
If you disable or don't configure this policy setting, the PIN will be provisioned when the user logs in, without waiting for a certificate payload.
✅ Windows 10, version 21H2 with KB5010415 [10.0.19044.1566] and later ✅ Windows 11, version 21H2 with KB5010414 [10.0.22000.527] and later ✅ Windows 11, version 22H2 [10.0.22621] and later
Boolean value that enables Windows Hello for Business to use Microsoft Entra Kerberos to authenticate to on-premises resources.
If you enable this policy setting, Windows Hello for Business will use a Microsoft Entra Kerberos ticket to authenticate to on-premises resources. The Microsoft Entra Kerberos ticket is returned to the client after a successful authentication to Microsoft Entra ID if Microsoft Entra Kerberos is enabled for the tenant and domain.
If you disable or don't configure this policy setting, Windows Hello for Business will use a key or certificate to authenticate to on-premises resources.
If you enable this policy setting, applications use Windows Hello for Business certificates as smart card certificates. Biometric factors are unavailable when a user is asked to authorize the use of the certificate's private key. This policy setting is designed to allow compatibility with applications that rely exclusively on smart card certificates.
If you disable or don't configure this policy setting, applications don't use Windows Hello for Business certificates as smart card certificates, and biometric factors are available when a user is asked to authorize the use of the certificate's private key.
Windows requires a user to lock and unlock their session after changing this setting if the user is currently signed in.
Windows Hello for Business is an alternative method for signing into Windows using your Active Directory or Microsoft Entra account that can replace passwords, Smart Cards, and Virtual Smart Cards.
If you enable or don't configure this policy setting, the device provisions Windows Hello for Business for all users.
If you disable this policy setting, the device doesn't provision Windows Hello for Business for any user.
Enhanced Sign-in Security (ESS) isolates both biometric template data and matching operations to trusted hardware or specified memory regions, meaning the rest of the operating system can't access or tamper with them. Because the channel of communication between the sensors and the algorithm is also secured, it's impossible for malware to inject or replay data in order to simulate a user signing in or to lock a user out of their machine.
Description framework properties:
Property name
Property value
Format
int
Access Type
Add, Delete, Get, Replace
Default Value
1
Allowed values:
Value
Description
0
ESS will be enabled on systems with capable software and hardware, following the existing default behavior in Windows. Authentication operations of peripheral Windows Hello capable devices will be allowed, subject to current feature limitations. In addition, with this setting, ESS will be enabled on devices with a mixture of biometric devices, such as an ESS capable FPR and a non-ESS capable camera. (not recommended).
1 (Default)
ESS will be enabled on systems with capable software and hardware, following the existing default behavior in Windows. Authentication operations of any peripheral biometric device will be blocked and not available for Windows Hello. (default and recommended for highest security).
Group policy mapping:
Name
Value
Name
Enable ESS with Supported Peripherals
Path
Passport > AT > WindowsComponents > MSPassportForWorkCategory
This setting determines whether enhanced anti-spoofing is required for Windows Hello face authentication.
If you enable this setting, Windows requires all users on managed devices to use enhanced anti-spoofing for Windows Hello face authentication. This disables Windows Hello face authentication on devices that don't support enhanced anti-spoofing.
If you disable or don't configure this setting, Windows doesn't require enhanced anti-spoofing for Windows Hello face authentication.
Note that enhanced anti-spoofing for Windows Hello face authentication isn't required on unmanaged devices.
Note
Not supported on Windows Holographic and Windows Holographic for Business prior to Windows 10 version 1903 (May 2019 Update).
Windows Hello for Business enables users to use biometric gestures, such as face and fingerprints, as an alternative to the PIN gesture. However, users must still configure a PIN to use in case of failures.
If you enable or don't configure this policy setting, Windows Hello for Business allows the use of biometric gestures.
If you disable this policy setting, Windows Hello for Business prevents the use of biometric gestures.
Note
Disabling this policy prevents the use of biometric gestures on the device for all account types.
Note
Not supported on Windows Holographic and Windows Holographic for Business prior to Windows 10 version 1903 (May 2019 Update).
THIS NODE IS DEPRECATED AND WILL BE REMOVED IN A FUTURE VERSION. PLEASE USE Biometrics/UseBiometrics NODE INSTEAD.
Windows Hello for Business enables users to use biometric gestures, such as face and fingerprints, as an alternative to the PIN gesture. However, users must still configure a PIN to use in case of failures.
If you enable or don't configure this policy setting, Windows Hello for Business allows the use of biometric gestures.
If you disable this policy setting, Windows Hello for Business prevents the use of biometric gestures.
Note
Disabling this policy prevents the use of biometric gestures on the device for all account types.
This policy specifies the Tenant ID in the format of a Globally Unique Identifier (GUID) without curly braces { }, which will be used as part of Windows Hello for Business provisioning and management.
If the user forgets their PIN, it can be changed to a new PIN using the Windows Hello for Business PIN recovery service. This cloud service encrypts a recovery secret which is stored locally on the client, but which can only be decrypted by the cloud service.
If you enable this policy setting, the PIN recovery secret will be stored on the device and the user will be able to change to a new PIN in case their PIN is forgotten.
If you disable or don't configure this policy setting, the PIN recovery secret won't be created or stored. If the user's PIN is forgotten, the only way to get a new PIN is by deleting the existing PIN and creating a new one, which will require the user to re-register with any services the old PIN provided access to.
Use this policy setting to configure the use of digits in the Windows Hello for Business PIN.
A value of 1 corresponds to "Required". If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one digit in their PIN.
A value of 2 corresponds to "Disallow". If you configure this policy setting to 2, Windows Hello for Business prevents users from using digits in their PIN.
If you don't configure this policy setting, Windows Hello for Business requires users to use digits in their PIN.
This policy specifies the number of past PINs that can be stored in the history that can't be used. Valid values are 0 to 50 inclusive. If this policy is set to 0, then storage of previous PINs isn't required. PIN history isn't preserved through PIN reset.
Use this policy setting to configure the use of lowercase letters in the Windows Hello for Business PIN.
A value of 1 corresponds to "Required". If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one lowercase letter in their PIN.
A value of 2 corresponds to "Disallow". If you configure this policy setting to 2, Windows Hello for Business prevents users from using lowercase letters in their PIN.
If you don't configure this policy setting, Windows Hello for Business doesn't allow users to use lowercase letters in their PIN.
Description framework properties:
Property name
Property value
Format
int
Access Type
Add, Delete, Get, Replace
Default Value
0
Allowed values:
Value
Description
0 (Default)
Allows the use of lowercase letters in PIN.
1
Requires the use of at least one lowercase letters in PIN.
2
Does not allow the use of lowercase letters in PIN.
Maximum PIN length configures the maximum number of characters allowed for the PIN. The largest number you can configure for this policy setting is 127. The lowest number you can configure must be larger than the number configured in the Minimum PIN length policy setting or the number 4, whichever is greater.
If you configure this policy setting, the PIN length must be less than or equal to this number.
If you don't configure this policy setting, the PIN length must be less than or equal to 127.
Note
If the above specified conditions for the maximum PIN length aren't met, default values will be used for both the maximum and minimum PIN lengths.
Minimum PIN length configures the minimum number of characters required for the PIN. The lowest number you can configure for this policy setting is 4. The largest number you can configure must be less than the number configured in the Maximum PIN length policy setting or the number 127, whichever is the lowest.
If you configure this policy setting, the PIN length must be greater than or equal to this number.
If you don't configure this policy setting, the PIN length must be greater than or equal to 4.
Note
If the above specified conditions for the minimum PIN length aren't met, default values will be used for both the maximum and minimum PIN lengths.
Use this policy setting to configure the use of special characters in the Windows Hello for Business PIN gesture. Valid special characters for Windows Hello for Business PIN gestures include: ! " # $ % & ' ( ) * + , - . / : ; < = > ? @ [ \ ] ^ _ ` { | } ~ .
A value of 1 corresponds to "Required". If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one special character in their PIN.
A value of 2 corresponds to "Disallow". If you configure this policy setting to 2, Windows Hello for Business prevents users from using special characters in their PIN.
If you don't configure this policy setting, Windows Hello for Business doesn't allow users to use special characters in their PIN.
Description framework properties:
Property name
Property value
Format
int
Access Type
Add, Delete, Get, Replace
Default Value
0
Allowed values:
Value
Description
0 (Default)
Allows the use of special characters in PIN.
1
Requires the use of at least one special characters in PIN.
2
Does not allow the use of special characters in PIN.
Use this policy setting to configure the use of uppercase letters in the Windows Hello for Business PIN.
A value of 1 corresponds to "Required". If you configure this policy setting to 1, Windows Hello for Business requires users to include at least one uppercase letter in their PIN.
A value of 2 corresponds to "Disallow". If you configure this policy setting to 2, Windows Hello for Business prevents users from using uppercase letters in their PIN.
If you don't configure this policy setting, Windows Hello for Business doesn't allow users to use uppercase letters in their PIN.
Description framework properties:
Property name
Property value
Format
int
Access Type
Add, Delete, Get, Replace
Default Value
0
Allowed values:
Value
Description
0 (Default)
Allows the use of uppercase letters in PIN.
1
Requires the use of at least one uppercase letters in PIN.
2
Does not allow the use of uppercase letters in PIN.
A Trusted Platform Module (TPM) provides additional security benefits over software because data stored within it can't be used on other devices.
If you enable this policy setting, only devices with a usable TPM provision Windows Hello for Business.
If you disable or don't configure this policy setting, the TPM is still preferred, but all devices provision Windows Hello for Business using software if the TPM is non-functional or unavailable.
Windows Hello for Business is an alternative method for signing into Windows using your Active Directory or Microsoft Entra account that can replace passwords, Smart Cards, and Virtual Smart Cards.
If you enable or don't configure this policy setting, the device provisions Windows Hello for Business for all users.
If you disable this policy setting, the device doesn't provision Windows Hello for Business for any user.
Description framework properties:
Property name
Property value
Format
bool
Access Type
Add, Delete, Get, Replace
Default Value
True
Allowed values:
Value
Description
false
Disabled.
true (Default)
Enabled.
Examples
Here's an example for setting Windows Hello for Business and setting the PIN policies. It also turns on the use of biometrics and TPM.
Plan and execute an endpoint deployment strategy, using essential elements of modern management, co-management approaches, and Microsoft Intune integration.