← Back to blog
Security

Microsoft Entra ID automatically enables passkeys — what you need to do now

By Zarioh Digital Solutions·14 March 2026
Share
Microsoft Entra ID automatically enables passkeys — what you need to do now

From April 2026, Microsoft Entra ID will automatically enable passkey profiles for all tenants. A major step towards passwordless sign-in. What does this mean for your organisation and what should you prepare right now?

Microsoft is making one of the most significant changes to enterprise authentication in years. From April 2026, Microsoft Entra ID will automatically enable passkey profiles for all tenants that have not already done so. Organisations that do not act proactively will have settings applied automatically.

What are passkeys?

A passkey replaces the password entirely. When a passkey is created, two cryptographic keys are generated: a public key stored with Microsoft, and a private key that never leaves the user's device. At sign-in, the device proves it holds the corresponding private key, without the key itself ever being transmitted.

For the user, the experience is simple: sign in with facial recognition, fingerprint or a PIN on their trusted device. No password to remember, no MFA code to copy. And critically, passkeys cannot be intercepted through phishing, because the private key never leaves the device.

Synced versus device-bound passkeys

Microsoft distinguishes between two types of passkeys. Synced passkeys are stored in the passkey provider's cloud — such as Apple's iCloud Keychain or Google Password Manager — and are automatically available across all of the user's devices. This is ideal for employees who work across multiple devices.

Device-bound passkeys remain on a single specific device and cannot be synchronised. This type offers maximum security and is the default for tenants already enforcing attestation, such as organisations in financial services or government.

Group-based passkey profiles

One of the most practical new features is support for group-based passkey profiles. Admins can now set passkey policy per user group rather than at the tenant level. This enables phased rollout strategies: start with the IT department, extend to management, then roll out to all employees.

What should administrators do now?

First: opt in early. By proactively enabling passkey profiles now, you retain control over the configuration and avoid surprises in April. In the Entra admin centre, go to Security > Authentication methods > Passkey (FIDO2) and enable the profile.

Second: review existing FIDO2 settings. Existing FIDO2 configurations will be automatically migrated into a default passkey profile. Tenants enforcing attestation will default to device-bound passkeys. Verify that this aligns with your security requirements.

Third: communicate with employees. The transition to passkeys is straightforward for end users but does require a one-time registration. Plan a registration campaign with clear instructions for iOS, Android and Windows Hello.

Impact on Conditional Access

Passkeys are phishing-resistant and are recognised by Microsoft Entra as a strong authentication method. This has a direct effect on Conditional Access policies: signing in with a passkey automatically satisfies requirements for phishing-resistant MFA, eliminating additional prompts. This significantly improves the user experience while maintaining a strong security posture.

Need help configuring passkeys or rolling out a passwordless policy for your organisation? Contact Zarioh Digital Solutions.

← Back to all articles
Share