As indicated in my previous blog post about passwordless sign-in via the Microsoft Authenticator, passwordless sign-in is becoming more and more popular. Using paswordless sign-in it is possible to authenticate with a fingerprint, face recognition or a Universal 2 Factor (U2F) open authentication standard such as the Yubikey FIDO2 (Fast IDentity Online) key, rather than with a username and password.
In this blog post I will describe the functionality and configuration of the Yubikey FIDO2 in combination with Microsoft Azure AD. Using this security key, it is not necessary to remember and use (unnecessarily complex) passwords. The use of passwords is outdated, since even the most complex passwords are vulnerable to phishing. Moreover, people often face difficulties in remembering passwords, which results in the use of weak and easy-to-retrieve passwords. The use of Yubikey FIDO2 is also considered strong because it requires a physical touch.
Passwordless authentication via the Microsoft Authenticator app or Yubikey is not a substitute of Multifactor Authentication (MFA). In addition to passwordless authentication, it is strongly recommended that also a second authentication factor is configured. In the case of a Yubikey, it could be a PIN or fingerprint and in the in the case of the Microsoft Authenticator app, a PIN, fingerprint or face recognition.
Yubikey FIDO2 keys (figure 1) are hardware-based security keys that use the U2F open authentication standard which is backed by the FIDO Alliance. UF2 originates from the collaboration between Yubico and Google. The UF2 protocol is designed to replace weak and static passwords with strong hardware-backed public/ private key credentials.
Yubikey FIDO2 works with, amongst others, Microsoft Edge, Azure AD joined Windows 10 devices and Microsoft’s online services. In addition, also Google, Twitter, Paypal, Dropbox, Intel, Github and Lastpass use the know-how of FIDO2.
Figure 1. From left to right: Yubikey4, Yubikey 4 Nano, Yubikey NEO and Yubico FIDO2 U2F Security Key.
How does authentication work with the Yubikey FIDO2?
Authentication with Yubikey FIDO2 uses cryptographic public and private keys of which the public keys, together with random numbers, are sent back and forth between the physical key and the authentication server. This whole authentication process takes place in the background without the user being aware of the ongoing process. Depending on the type of FIDO2 key being used, the user only needs to put the FIDO2 key in the USB port and the authentication process is completed with a pin code, fingerprint and/ or just a touch on the FIDO2 key. The power of Yubikey FIDO2 lies in the physical contact that the user has with the key. This way phishing and a MiTM Attack (Man-in-the-middle attack) will be prevented.
“Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys”- KrebsonSecurity 2018
Configuration of FIDO2 in Azure AD
Below the steps are described that are required to configure FIDO2 in Azure AD.
Note: At the time of writing, passwordless sign-in for Azure AD is still a preview functionality, which means that the functionality is available for test purposes and proof-of-concept scenarios.
- Sign into the Azure portal -> https://portal.azure.com
- Go to Azure Active Directory -> Authentication methods (figure 2).
Figure 2. Authentication methods in Azure AD.
- Click on -> Authentication method policy (Preview).
- Select FIDO2 Security Key.
- Select Enable -> Yes.
- Target -> All users or Select Users.
- Allow self-service setup -> Yes*.
- Enforce attestation -> Yes*.
- Key Restriction Policy.
- Enforce key restrictions -> No (default).
- Hit Save to save the policy (figure 3).
*At the time of writing it is advised to select “Yes” as a default for the configuration of “Allow self-service set up” and “Enforce attestation”. Microsoft plans to include a functionality to allow or block certain FIDO2 security keys based on their GUID.
Figure 3. Configuring passwordless sign-in in Azure AD.
Activate the FIDO2 key
Passwordless sign-in for the FIDO2 keys is now successfully configured and active. Make sure the user has the correct license, such as Enterprise Mobility + Security E3. Next, the security key needs to be activated in the user account. In my case I used the Yubico FIDO2 U2F Security Key with NFC. Keep in mind that the preview features for registering and managing security info – enhanced, must be enabled in the organization’s tenant (Enabling preview features). In order to manage your security info for MFA and self-service password reset (SSPR) in one single portal.
- Sign in to ->https://mysignins.microsoft.com
- Once logged in click on “Security info”.
- Click on “Add method”, select “Security Key” and click “Add” (figure 4).
Figure 4. Adding the Security key as an authentication method.
- In my case I used the FIDO2 key that included the NFC chip. Select “NFC Device” and click on “Next” (figure 5).
Note: In my test case I use a security key that supports NFC, therefore I configure and choose the “NFC Device”, but I will not use NFC functionality in this test.
Figure 5. Select the type of security key.
- Make sure that the key is ready and click on “Next”.
Figure 6. Security key instructions displayed when configuring FIDO2.
- Plug in the FIDO2 key and follow the instructions on the screen (figure 7).
Figure 7. Insert the FIDO2 key to continue the configuration.
- Create a PIN for the FIDO2 key and click on “OK” (figure 8).
Figure 8. Create a PIN for your FIDO2 key.
- When the FIDO2 key is blinking, press shortly on the FIDO2 key to continue (figure 9).
Figure 9. Take action on your security key.
- Give the FIDO2 key a name and click on “Next” to continue (figure 10).
Figure 10. Fill in a name for your security key.
- That’s it, the FIDO2 security key has been configured and added to the user account (figure 11).
Figure 11. The configuration of the FIDO2 key for the user is complete.
The figure below presents an overview of the different authentication methods.
Figure 12. Overview of the different sign-in methods in the user’s profile.
Passwordless sign-in User Experience with FIDO2
The configuration of the FIDO2 security key in Azure AD is now completed. In addition, the FIDO2 key is also added as an authentication method to the user’s profile. Now it is time to log into Microsoft’s online services with Yubikey FIDO2 to see what the user experience looks like. Not unimportant, it is also possible to log in to a Windows 10 (version 1809) Azure AD joined device with FIDO2!
- Start an internet browser and go to: https://portal.office.com (figure 13).
Figure 13. Login screen for portal.office.com.
- Type in the user account name and click on “Next”.
- Instead of typing in the password select “Sign in with Windows Hello or a Security key” (figure 14).
Figure 14. Sign in with Windows Hello or a Security key.
- If not already done, insert the Yubico FIDO2 key (figure 15).
Figure 15. Insert your security key into the USB-port.
- Enter the security key PIN that was created earlier (figure 16).
Figure 16. Sign in with Windows Hello or a Security key.
- The FIDO2 key will now start blinking. Next, touch the FIDO2 key to enable the second (physical) authentication factor to complete the authentication process (figure 17).
Figure 17. An action on the FIDO2 key is required to complete the sign-in process.
- Performing the steps above will result in a successful authentication and log in to Microsoft’s Online services (figure 18).
Figure 18. The user is successfully logged into Microsoft’s Online services.
More often organizations request complex passwords for their employees. However, one could argue whether this solves any problem. Complex passwords do not help users to protect their identity in case of a phishing or a MiTM attack.
I strongly believe that the user identity is the new security and that one needs to be careful with this, especially in a world where employees have access to company data, from any device and any location. Employees are no longer limited to the corporate network to perform their work. Therefore, it is very important that they can work in a safe manner, regardless of whether they are connected to an unsafe (WiFi) network or not. The use of a Yubikey FIDO2 contributes to the safety of a user’s identity, as the user does not have to remember and use a difficult password and/ or renew the password every so often. The Yubikey FIDO2 is easy to configure and, above all, very safe to use!
For more information about the FIDO Alliance:
Overview of the different Yubico FIDO2 keys:
What is FIDO2 and Web Authentication?
A world without passwords with Azure Active Directory:
Key Generation (UF2):
Enable passwordless security key sign in for Azure AD (preview):
Windows Hello FIDO2 certification gets you closer to passwordless:
Enable combined security information registration (preview):
2 thoughts on “Passwordless Sign-in Azure AD with FIDO2”
I would say the main benefit offered by authenticating with a Fido key is the anti-phishing protection, and the solution for protecting against phishing also means that less sensitive data is also stored on each authentication server (i.e. no cross server seed data vulnerabilities).