{"id":96416,"date":"2019-07-10T16:18:12","date_gmt":"2019-07-10T16:18:12","guid":{"rendered":"https:\/\/news.microsoft.com\/?p=433575"},"modified":"2019-07-10T16:18:12","modified_gmt":"2019-07-10T16:18:12","slug":"announcing-the-public-preview-of-azure-ad-support-for-fido2-based-passwordless-sign-in","status":"publish","type":"post","link":"https:\/\/sickgaming.net\/blog\/2019\/07\/10\/announcing-the-public-preview-of-azure-ad-support-for-fido2-based-passwordless-sign-in\/","title":{"rendered":"Announcing the public preview of Azure AD support for FIDO2-based passwordless sign-in"},"content":{"rendered":"<p>Howdy folks,<\/p>\n<p>I\u2019m thrilled to let you know that you can now go passwordless with the public preview of FIDO2 security keys support in Azure Active Directory (Azure AD)! Many teams across Microsoft have been involved in this effort, and we\u2019re proud to deliver on our vision of making FIDO2 technologies a reality to provide you with seamless, secure, and <strong>passwordless <\/strong>access to all your Azure AD-connected apps and services.<\/p>\n<p>In addition, we turned on a new set of admin capabilities in the Azure AD portal that enable you to manage authentication factors for users and groups in your organization. In this first release, you can use them to manage a staged rollout of passwordless authentication using FIDO2 security keys and\/or the Microsoft Authenticator application. Going forward you\u2019ll see us add the ability to manage all our traditional authentication factors (Multi-Factor Authentication (MFA), OATH Tokens, phone number sign in, etc.). Our goal is to enable you to use this one tool to manage all your authentication factors.<\/p>\n<h3 id=\"toc-hId-1595089301\">Why do we feel so strongly about passwordless?<\/h3>\n<p>Every day, more and more of our customers move to cloud services and applications. They need to know that the data and services stored in these services are secure. Unfortunately, passwords are no longer an effective security mechanism. We know from industry analysts that 81 percent of successful cyberattacks begin with a compromised username and password. Additionally, traditional MFA, while very effective, can be hard to use and has a very low adoption rate.<\/p>\n<p>It\u2019s clear we need to provide our customers with authentication options that are secure <strong>and<\/strong> easy to use, so they can confidently access information without having to worry about hackers taking over their accounts.<\/p>\n<p>This is where passwordless authentication comes in. We believe it will help to significantly and permanently reduce the risk of account compromise.<\/p>\n<p><span class=\"lia-inline-image-display-wrapper lia-image-align-left\"><img decoding=\"async\" src=\"http:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2019\/07\/announcing-the-public-preview-of-azure-ad-support-for-fido2-based-passwordless-sign-in.png\" alt=\"Passwordless sign in flow 2.png\" title=\"Passwordless sign in flow 2.png\" class=\"lia-media-image\"><\/span><\/p>\n<p>Now, all Azure AD users can sign in password-free using a FIDO2 security key, the Microsoft Authenticator app, or Windows Hello. These strong authentication factors are based off the same world class, public key\/private key encryption standards and protocols, which are protected by a biometric factor (fingerprint or facial recognition) or a PIN. Users apply the biometric factor or PIN to unlock the private key stored securely on the device. The key is then used to prove who the user and the device are to the service.&nbsp;<\/p>\n<p><span class=\"lia-inline-image-display-wrapper lia-image-align-inline\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2019\/07\/announcing-the-public-preview-of-azure-ad-support-for-fido2-based-passwordless-sign-in.jpg\" width=\"502\" height=\"548\" alt=\"Public preview of Azure AD support for FIDO2 based passwordless 2.jpg\" title=\"Public preview of Azure AD support for FIDO2 based passwordless 2.jpg\" class=\"lia-media-image\"><\/span><\/p>\n<p><a href=\"http:\/\/aka.ms\/passwordlessvideo\" target=\"_blank\" rel=\"noopener noreferrer\">Check out this video<\/a> where Joy Chik, corporate vice president of Identity, and I talk more about this new standard for signing in. To learn more about why this should be a priority for you and your organization, read our <a href=\"http:\/\/aka.ms\/gopasswordless\" target=\"_blank\" rel=\"noopener noreferrer\">whitepaper<\/a>.<\/p>\n<h3 id=\"toc-hId--957067660\">Let\u2019s get you started!<\/h3>\n<p>To help you get started on your own <a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/authentication\/concept-authentication-passwordless\" target=\"_blank\" rel=\"noopener noreferrer\">passwordless<\/a> journey, this week we\u2019re rolling out a bonanza of public preview capabilities. These new features include:<\/p>\n<ul>\n<li>A new Authentication methods blade in your Azure AD admin portal that allows you to <a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/authentication\/howto-authentication-passwordless-enable#enable-new-passwordless-authentication-methods\" target=\"_blank\" rel=\"noopener noreferrer\">assign passwordless credentials<\/a> using FIDO2 security keys and passwordless sign-in with Microsoft Authenticator to users and groups.<\/li>\n<\/ul>\n<p><span class=\"lia-inline-image-display-wrapper lia-image-align-inline\"><img decoding=\"async\" src=\"http:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2019\/07\/announcing-the-public-preview-of-azure-ad-support-for-fido2-based-passwordless-sign-in-1.png\" alt=\"Public preview of Azure AD support for FIDO2 based passwordless 3.png\" title=\"Public preview of Azure AD support for FIDO2 based passwordless 3.png\" class=\"lia-media-image\"><\/span><\/p>\n<p><span class=\"lia-inline-image-display-wrapper lia-image-align-inline\"><img decoding=\"async\" src=\"http:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2019\/07\/announcing-the-public-preview-of-azure-ad-support-for-fido2-based-passwordless-sign-in-2.png\" alt=\"Public preview of Azure AD support for FIDO2 based passwordless 4.png\" title=\"Public preview of Azure AD support for FIDO2 based passwordless 4.png\" class=\"lia-media-image\"><\/span><\/p>\n<p><span class=\"lia-inline-image-display-wrapper lia-image-align-inline\"><img decoding=\"async\" src=\"http:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2019\/07\/announcing-the-public-preview-of-azure-ad-support-for-fido2-based-passwordless-sign-in-3.png\" alt=\"Public preview of Azure AD support for FIDO2 based passwordless 5.png\" title=\"Public preview of Azure AD support for FIDO2 based passwordless 5.png\" class=\"lia-media-image\"><\/span><\/p>\n<h3 id=\"toc-hId-785742675\">FIDO2 hardware<\/h3>\n<p>Microsoft has teamed up with leading hardware partners, Feitian Technologies, HID Global, and Yubico, to make sure we have a range of FIDO2 form factors available at launch, including keys connecting via USB and NFC protocols. Sue Bohn has more <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Azure-Active-Directory-Identity\/Microsoft-passwordless-partnership-leads-to-innovation-and-great\/ba-p\/566493\" target=\"_self\" rel=\"noopener noreferrer\"><span>details on those partnerships<\/span><\/a>.<\/p>\n<p>Please be sure to verify that any FIDO2 security keys you\u2019re considering for your organization meet the additional options required to be <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/identity-protection\/hello-for-business\/microsoft-compatible-security-key\" target=\"_blank\" rel=\"noopener noreferrer\">compatible with Microsoft\u2019s implementation<\/a>.<\/p>\n<p><span class=\"lia-inline-image-display-wrapper lia-image-align-inline\"><img decoding=\"async\" src=\"http:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2019\/07\/announcing-the-public-preview-of-azure-ad-support-for-fido2-based-passwordless-sign-in-1.jpg\" alt=\"passwordless.jpg\" title=\"passwordless.jpg\" class=\"lia-media-image\"><\/span><\/p>\n<h3 id=\"toc-hId--1766414286\">Our passwordless strategy<\/h3>\n<p>Our passwordless strategy is a four-step approach where we deploy replacement offerings, reduce the password surface area, transition to password deployment, and finally eliminate passwords:<\/p>\n<p><span class=\"lia-inline-image-display-wrapper lia-image-align-inline\"><img decoding=\"async\" src=\"http:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2019\/07\/announcing-the-public-preview-of-azure-ad-support-for-fido2-based-passwordless-sign-in-4.png\" alt=\"Public preview of Azure AD support for FIDO2 based passwordless 8.png\" title=\"Public preview of Azure AD support for FIDO2 based passwordless 8.png\" class=\"lia-media-image\"><\/span><\/p>\n<p>Today\u2019s product launches are an important milestone for getting to passwordless. In addition, the engineering work we did to provide authentication methods management for administrators and user registration and management, will allow us to move even faster to improve credentials management experiences, as well as bring new capabilities and credentials online more simply. We\u2019re working with our Windows security engineering team to make FIDO2 authentication work for hybrid-joined devices.<\/p>\n<p>Of course, we look forward to <a href=\"http:\/\/aka.ms\/AzureADFeedback\" target=\"_blank\" rel=\"noopener noreferrer\">feedback from you<\/a> across all of these features, to help us improve before we make them generally available.<\/p>\n<p>Regards,<\/p>\n<p>&nbsp;Alex (Twitter: <a href=\"https:\/\/twitter.com\/Alex_A_Simons\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">@Alex_A_Simons<\/a>)<\/p>\n<p>&nbsp;Corporate VP of Program Management<\/p>\n<p>&nbsp;Microsoft Identity Division<\/p>\n<h3 id=\"toc-hId--23603951\">Additional links<\/h3>\n","protected":false},"excerpt":{"rendered":"<p>Howdy folks, I\u2019m thrilled to let you know that you can now go passwordless with the public preview of FIDO2 security keys support in Azure Active Directory (Azure AD)! Many teams across Microsoft have been involved in this effort, and we\u2019re proud to deliver on our vision of making FIDO2 technologies a reality to provide [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":96417,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49],"tags":[54,50],"class_list":["post-96416","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-news","tag-azure","tag-recent-news"],"_links":{"self":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/96416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/comments?post=96416"}],"version-history":[{"count":0,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/96416\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media\/96417"}],"wp:attachment":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media?parent=96416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/categories?post=96416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/tags?post=96416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}