In today's weekly digest for coming updates in Microsoft 365 there are two mentions of passkeys with some information on expected release windows and a bunch of other information.
For those that have access to the Microsoft 365 admin center, you can search for the two headers and MC numbers below and/or take a look at https://www.microsoft.com/sv-SE/microsoft-365/roadmap?filters=&searchterms=182056 in their public roadmap. I've included the information in spoiler tags (for brevity) for those that don't have access to the admin center.
Microsoft Entra ID: Authentication strength improvements to support passkeys - MC718260
!
! Summary
!
! Conditional Access authentication strengths in Microsoft Entra ID will be improved to support registration of device-bound passkeys (https://passkeys.dev/docs/reference/terms/#device-bound-passkey) stored on computers, security keys, and mobile devices.
!
! This message is associated with Microsoft 365 Roadmap ID https://www.microsoft.com/microsoft-365/roadmap?filters=&searchterms=182056.
!
! When this will happen:
!
! Public Preview: We will begin rolling out early March 2024 and expect to complete by mid-March 2024.
!
! Worldwide, GCC, GCC High, DoD: We will begin rolling out late April 2024 and expect to complete by early May 2024.
!
! How this will affect your organization:
!
! End user registration
!
! Prior to this change, users who were in-scope for authentication strength enforcement who could not satisfy passkey (FIDO2) authentication requirements received an error message asking users to manually register the passkey (FIDO2) method.
!
! With this rollout, in My Security Info, new registration options called Passkey (preview) and Passkey in Microsoft Authenticator (preview) will be shown to users who are interrupted to register a passkey (FIDO2) method to satisfy authentication strength requirements. Users that are required to register a passkey in Microsoft Authenticator will see a dedicated registration experience. Users whose organization requires specific passkeys from various vendors and manufacturers will be shown allowable AAGUIDS of the passkeys they can choose to register. No changes are expected to existing Conditional Access policies targeting security information registration.
!
! Current:
!
!
!
! New:
!
!
!
! What you need to do to prepare:
!
! For more information on changes to Microsoft Entra support for passkeys (FIDO2), please review our previous message center post MC690185: (Updated) Prepare for device-bound passkeys in Microsoft Entra ID (changes to FIDO2 and Windows Hello for Business), (November 2023).
!
! No action is needed to prepare for this change. You may want to notify your users about this change and update any relevant documentation as appropriate.
(Updated) Prepare for device-bound passkeys in Microsoft Entra ID (changes to FIDO2 and Windows Hello for Business) - MC690185
! Summary
!
! Updated February 19, 2024: We have updated the rollout timeline below. Thank you for your patience.
!
! Beginning mid-March 2024, Microsoft Entra ID will support https://passkeys.dev/docs/reference/terms/#device-bound-passkey stored on computers and mobile devices as an authentication method in preview, in addition to the existing support for FIDO2 security keys. This enables your users to perform phishing-resistant authentication using the devices that they already have.
!
! We will be expanding the existing FIDO2 authentication methods policy and end user experiences to support this preview release. If your organization uses FIDO2 authentication or Windows Hello for Business, please continue reading to learn more and prepare for the upcoming changes.
!
! Admin Configuration
!
! In the Entra admin portal, we will be renaming “FIDO2 security keys” to “Passkeys (FIDO2)” within the authentication methods policy and Conditional Access authentication strengths policy.
!
! For your organization to opt-in to this preview, you will need to enforce key restrictions to allow specified passkey providers in your FIDO2 policy. Here are the possible configuration states for FIDO2 key restrictions during the preview:
!
! * No key restrictions (FIDO2 policy default): Tenant allows all security key models. Device-bound passkey providers on computers and mobile devices are not allowed.
! * Key restrictions set to "Allow": Tenant only allows the explicitly added AAGUIDs. To enable a device-bound passkey provider, add their AAGUID(s) to the key restrictions list.
! * Key restrictions set to "Block": Tenant blocks the explicitly added AAGUIDs and allows all other security key models. Device-bound passkey providers on computers and mobile devices are not allowed.
!
!
!
! End User Registration Experience
!
! In the My Security Info portal, a new registration option called "Passkey (preview)" will be shown to end users for registering a device-bound passkey on computers, mobile devices, or security keys.
!
!
!
! Towards the end of 2024, the existing security key registration option will be replaced by the newly introduced passkey option.
!
! **End User Sign-in Experience*
!
! The existing end user sign-in option for Windows Hello for Business and FIDO2 security keys will be renamed to “Face, fingerprint, PIN, or security key”. The term "passkey" will be mentioned in the updated sign-in experience to be inclusive of passkey credentials presented from security keys, computers, and mobile devices.
!
! * Text displayed to users today:
! * “Sign in with Windows Hello or security key”
! * "Sign in with a security key”
! * "Signing in with Windows Hello or security key"
! * Text displayed to users in January 2024:
! * “Face, fingerprint, PIN, or security key”
! * "Signing in with a passkey"
!
!
!
Confirming I am still unable to add a Passkey for my (work) Microsoft 365 account... The correct policies are enabled in Entra so I am not sure what the problem is...
This opens the question whether 1Password passkeys are considered device bound. Furthermore, how to determine the Authenticator Attestation GUID (AAGUID) needed to approve 1Password passkeys?
"Beginning January 2024, Microsoft Entra ID will support device-bound passkeys stored on computers and mobile devices as an authentication method in public preview, in addition to the existing support for FIDO2 security keys. This enables your users to perform phishing-resistant authentication using the devices that they already have."
"Beginning January 2024, Microsoft Entra ID will support device-bound passkeys stored on computers and mobile devices as an authentication method in public preview, in addition to the existing support for FIDO2 security keys. This enables your users to perform phishing-resistant authentication using the devices that they already have."
"Beginning January 2024, Microsoft Entra ID will support device-bound passkeys stored on computers and mobile devices as an authentication method in public preview, in addition to the existing support for FIDO2 security keys. This enables your users to perform phishing-resistant authentication using the devices that they already have."
"Beginning January 2024, Microsoft Entra ID will support device-bound passkeys stored on computers and mobile devices as an authentication method in public preview, in addition to the existing support for FIDO2 security keys. This enables your users to perform phishing-resistant authentication using the devices that they already have."
Just hopping in to add my experience with this as well. Like others, I am unable to use iOS or MacOS (Safari) to add a passkey for my personal Microsoft account. Considering 1Password knows that I only use Apple devices, it would be nice to have the alert in 1Password to add a passkey removed until such a time as 1Password has verified support for my devices with the account in question! steph_giles
Confirming same issue as above.
Edge: Version 119.0.2151.44 (x64)
1Password for Windows 8.10.20 (81020020)
Windows 10 22H2, 11 22H2 and 11 22H3, all recent updates applied.