EN 
15.04.2026 Anastázie WELCOME IN MY WORLD

This website is originally written in the Czech language. Most content is machine (AI) translated into English. The translation may not be exact and may contain errors.

Tento článek si můžete zobrazit v originální české verzi. You can view this article in the original Czech version.
FIDO passkeys část 5 - Entra ID passkey profily a synchronizované passkeys

FIDO passkeys part 5 - Entra ID passkey profiles and synced passkeys

| Petr Bouška - Samuraj |
Microsoft continues to expand the options for using passkeys for user authentication. Since March, new capabilities within Microsoft Entra ID for corporate accounts have become Generally Available. These are passkey profiles assigned to user groups. Instead of a single global setting, we can now configure allowed passkeys more granularly. The second new feature is support for synced passkeys, which are not tied to a single device.
displayed: 1 169x (460 CZ, 709 EN) | Comments [0]

Passkeys

FIDO authentication with passkeys is a standardized method of Phishing resistant Multi-Factor Passwordless Authentication. Passkeys are credentials based on the FIDO2 standard.

Passkeys can be stored on various models of security keys or with various passkey providers. Passkeys cannot be used in the self-service password reset (SSPR) process.

Types of passkeys

Microsoft Entra ID now (newly) supports two main types of passkeys

  • Device-bound passkeys - the private key is created and stored on a single physical device and cannot leave it; examples include FIDO2 Security keys and Microsoft Authenticator
  • Synced passkeys - the private key is generated by a hardware security module (HSM), encrypted and stored on the device; the encrypted key is synchronized between the user's devices via a cloud service; synced passkeys do not support attestation; examples include Google Password Manager and Apple iCloud Keychain, as well as various password managers with passkey support (such as 1Password, Bitwarden)

Note: Passkeys were described in detail in previous parts of this series.

What's new - passkey profiles and synced passkeys

From March 2026, new features within Microsoft Entra ID are transitioning to General Availability (GA). These are passkey profiles and synced passkeys.

Rollout to tenants began at the start of March and is expected to complete by end of March. When I activated the feature, it was still labeled as Public Preview. During the writing of this article it switched to the final version.

Profile transition process

In the first phase, administrators are given the option to opt in to the new way of working with passkey profiles, which supports configuring passkeys at the group level and introduces the new passkeyType property.

In the second phase, automatic migration will occur for tenants that have Passkeys (FIDO2) enabled and have not opted in themselves, moving them to the passkey profiles schema. This is expected to run from April through the end of May.

Supported passkey types (passkeyType)

  • Device-bound passkeys
  • Synced passkeys
  • Both

Passkey profiles

Currently we can create up to 3 passkey profiles. In each profile we can set different requirements for passkeys, such as requiring attestation, specific AAGUIDs, or a supported passkey type. Profiles are then assigned to user groups.

We can assign multiple profiles to a single group, combining the available options. A passkey must then meet the conditions of at least one profile in order to be registered and used for authentication. If we disable synced passkeys, even existing ones cannot be used for authentication. In contrast, a registered Security Key can still be used (even after its type has been blocked).

Enabling passkey profiles

  • Microsoft Entra admin center - Entra ID - Authentication methods - Policies
  • select the Passkey (FIDO2) method
  • at the top there is a banner with the text Upgrade to the new experience to opt in to profiles
  • a Default passkey profile is automatically created containing the original settings
  • we must edit it and choose the Passkey type
Entra ID - Authentication methods - Upgrade to the new experience

Creating or editing a profile

  • Microsoft Entra admin center - Entra ID - Authentication methods - Policies
  • in the Passkey (FIDO2) method, switch to Configure
  • we must have Allow self-service set up enabled so users can register passkeys
  • we can edit an existing profile or add a new one using Add profile
Entra ID - Authentication methods - Passkey (FIDO2) - Configure
  • the settings are the same as before, except for the new passkey type option
  • Passkey types allows choosing Device-bound, Synced, or both; to allow synced passkeys, Enforce attestation must not be set
  • save the new profile using the Save button
Entra ID - Authentication methods - Add passkey profile

Applying a profile to a group

  • Microsoft Entra admin center - Entra ID - Authentication methods - Policies
  • in the Passkey (FIDO2) method, switch to Enable and Target
  • passkey usage (the method) must be set to Enabled
  • using Add target we can add All users or Select targets, where we choose specific groups
  • under Passkey profiles select the profiles you want to assign to a specific target
  • save the settings using the Save button
Entra ID - Authentication methods - Passkey (FIDO2) Enable and Target

Synced passkeys

If we enable synced passkeys, the question is how and where to try or start using them. So far I have run a few tests with Google Password Manager, which is integrated into Google Chrome, and I tested it on both an Android device and on Windows.

Registering a passkey to Google Password Manager on Android

Users typically manage their authentication methods within their My Account under Security Info. Here it is possible to add (register) a new method.

  • use Google Chrome on an Android device
  • open the Security Info page and sign in (you must have been authenticated within the previous 5 minutes)
  • click Add sign-in method
  • choose Passkey
  • information about creating a passkey is displayed; you have the option to choose creation on another device; continue with Next
  • the passkey setup begins; a Google Password Manager dialog appears where you must authenticate
Google Password Manager Android - Add Entra ID passekey 1
  • back on the Security Info page, enter a name for the passkey and it will be created
Google Password Manager Android - Add Entra ID passekey 2

Registering a passkey to Google Password Manager on Windows

The process works similarly when using Google Chrome on a Windows device where our Google account is signed in.

  • open the Security Info page and sign in
  • click Add sign-in method
  • choose Passkey
  • information about creating a passkey is displayed; continue with Next
Google Password Manager Windows - Add Entra ID passekey 1
  • at this point it depends on which passkey providers are available on the system; in my case a dialog for using a Security key appeared first, which I dismissed with the Cancel button
  • a Google dialog then appeared offering Google Password Manager, which we select
  • there is information that a passkey will be created; we proceed with the Create button and then must authenticate
Google Password Manager Windows - Add Entra ID passekey 2
  • enter a name for the passkey and it will be created
Google Password Manager Windows - Add Entra ID passekey 3

Note: While running my tests I was constantly creating and deleting passkeys. I repeatedly encountered a problem with creation. When I deleted an existing passkey from my account in Security Info but not on the device, for example in Google Password Manager, then upon creating a new one, the passkey would be created (and visible) in Google Password Manager, but the wizard would end with a Passkey not registered error. It was necessary to delete the passkey from the given storage first, after which creation succeeded.

Passkey in Security Info for the account

A newly registered passkey in My Security Info is marked with a passkey icon and the text Passkey (Synced) Google Password Manager. Next to it our entered name Google Password Manager is displayed.

Microsoft My Security Info - Passkey (Synced)

Signing in with a passkey

When signing in to an Entra ID account, the new passkey is offered among other passkeys in various places. Below is a screenshot of the Microsoft login dialog in the Chrome browser, which has the Google Password Manager integrated.

Microsoft Sign in passkey
Author:

Related articles:

FIDO Authentication

FIDO authentication is based on the FIDO2 standard (WebAuthn and CTAP2). It brings a more secure option to log in to online services. It belongs to Passwordless MFA (multi-factor authentication without a password). At the same time, it increases the convenience of users (it supports the use of biometrics). These are, for example, Windows Hello for Business, FIDO2 security key and generally passkeys (access keys).

Azure AD / Entra ID identity and authentication

Articles related to user and device identity (not only) in Microsoft Entra ID. Different login and authentication options. Areas such as modern authentication, multi-factor authentication, password-less login, etc. Often involving the use of FIDO Authentication, for example using the FIDO2 security key or Windows Hello for Business.

If you want write something about this article use comments.

Comments

There are no comments yet.

Add comment

Insert tag: strong em link

Help:
  • maximum length of comment is 2000 characters
  • HTML tags are not allowed (they will be removed), you can use only the special tags listed above the input field
  • new line (ENTER) ends paragraph and start new one
  • when you respond to a comment, put the original comment number in squar brackets at the beginning of the paragraph (line)