Skip to content
  • Home
  • About me
  • Contact

Everything Cloud

My notebook about everything related to Azure Cloud and Microsoft Security

Passwordless sign-in

New ‘My Profile Experience’

November 27, 2019June 26, 2023Wouter Visser1 Comment

Recently Microsoft made it possible to give users an overview in which they can manage their own security information, authentication methods (Security key & MFA), identity and devices etc. This is called the enhanced security info registration experience (figure 1).

Figure 1. Overview of security features from the enhanced security info registration page.

Not enabled by default

The enhanced security info registration experience is not yet enabled by default. When this feature isn’t enabled users will receive a notification such as displayed in figure 2 when they try to access https://myprofile.microsoft.com.

Figure 2. Notification in case the ‘My Profile Experience’ feature isn’t enabled.

Enable preview features for registering and managing enhanced security info

To give users access to these new security feature page, one must enable this feature in the organization’s tenant.

  • Sign into the Azure portal -> https://portal.azure.com
  • Go to Azure Active Directory -> User settings -> Manage user feature preview settings (figure 3).

Figure 3. Managing user features preview settings in Azure.

  • Enable the preview features for a group or all users, in my case I select All (figure 4).

Figure 4. Turn on the user features preview settings in Azure.

Now it’s possible for the users to make use of the new security experience by accessing the following URL’s:

  • https://myprofile.microsoft.com
  • https://mysignins.microsoft.com
Azure, Azure AD, FIDO2Azure AD, FIDO2, Passwordless sign-in, Security Keys

Passwordless Sign-in Azure AD with FIDO2

August 31, 2019June 26, 2023Wouter Visser2 Comments

As indicated in my previous blog post about passwordless sign-in via the Microsoft Authenticator, passwordless sign-in is becoming more and more popular. Using paswordless sign-in it is possible to authenticate with a fingerprint, face recognition or a Universal 2 Factor (U2F) open authentication standard such as the Yubikey FIDO2 (Fast IDentity Online) key, rather than with a username and password.

In this blog post I will describe the functionality and configuration of the Yubikey FIDO2 in combination with Microsoft Azure AD. Using this security key, it is not necessary to remember and use (unnecessarily complex) passwords. The use of passwords is outdated, since even the most complex passwords are vulnerable to phishing. Moreover, people often face difficulties in remembering passwords, which results in the use of weak and easy-to-retrieve passwords. The use of Yubikey FIDO2 is also considered strong because it requires a physical touch.

Passwordless authentication via the Microsoft Authenticator app or Yubikey is not a substitute of Multifactor Authentication (MFA). In addition to passwordless authentication, it is strongly recommended that also a second authentication factor is configured. In the case of a Yubikey, it could be a PIN or fingerprint and in the in the case of the Microsoft Authenticator app, a PIN, fingerprint or face recognition.

Yubikey FIDO2

Yubikey FIDO2 keys (figure 1) are hardware-based security keys that use the U2F open authentication standard which is backed by the FIDO Alliance. UF2 originates from the collaboration between Yubico and Google. The UF2 protocol is designed to replace weak and static passwords with strong hardware-backed public/ private key credentials.

Yubikey FIDO2 works with, amongst others, Microsoft Edge, Azure AD joined Windows 10 devices and Microsoft’s online services. In addition, also Google, Twitter, Paypal, Dropbox, Intel, Github and Lastpass use the know-how of FIDO2.

Figure 1. From left to right: Yubikey4, Yubikey 4 Nano, Yubikey NEO and Yubico FIDO2 U2F Security Key.

How does authentication work with the Yubikey FIDO2?

Authentication with Yubikey FIDO2 uses cryptographic public and private keys of which the public keys, together with random numbers, are sent back and forth between the physical key and the authentication server. This whole authentication process takes place in the background without the user being aware of the ongoing process. Depending on the type of FIDO2 key being used, the user only needs to put the FIDO2 key in the USB port and the authentication process is completed with a pin code, fingerprint and/ or just a touch on the FIDO2 key. The power of Yubikey FIDO2 lies in the physical contact that the user has with the key. This way phishing and a MiTM Attack (Man-in-the-middle attack) will be prevented.

“Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys”-  KrebsonSecurity 2018

Configuration of FIDO2 in Azure AD

Below the steps are described that are required to configure FIDO2 in Azure AD.

Note:    At the time of writing, passwordless sign-in for Azure AD is still a preview functionality, which means that the functionality is available for test purposes and proof-of-concept scenarios.

  • Sign into the Azure portal -> https://portal.azure.com
  • Go to Azure Active Directory -> Authentication methods (figure 2).

Figure 2. Authentication methods in Azure AD.

  • Click on -> Authentication method policy (Preview).
  • Select FIDO2 Security Key.
  • Select Enable -> Yes.
  • Target -> All users or Select Users.
  • General
    • Allow self-service setup -> Yes*.
    • Enforce attestation -> Yes*.
  • Key Restriction Policy.
    • Enforce key restrictions -> No (default).
  • Hit Save to save the policy (figure 3).

*At the time of writing it is advised to select “Yes” as a default for the configuration of “Allow self-service set up” and “Enforce attestation”. Microsoft plans to include a functionality to allow or block certain FIDO2 security keys based on their GUID.

Figure 3. Configuring passwordless sign-in in Azure AD.

Activate the FIDO2 key

Passwordless sign-in for the FIDO2 keys is now successfully configured and active. Make sure the user has the correct license, such as Enterprise Mobility + Security E3. Next, the security key needs to be activated in the user account. In my case I used the Yubico FIDO2 U2F Security Key with NFC. Keep in mind that the preview features for registering and managing security info – enhanced, must be enabled in the organization’s tenant (Enabling preview features). In order to manage your security info for MFA and self-service password reset (SSPR) in one single portal.

  • Sign in to ->https://mysignins.microsoft.com
  • Once logged in click on “Security info”.
  • Click on “Add method”, select “Security Key” and click “Add” (figure 4).

Figure 4. Adding the Security key as an authentication method.

  • In my case I used the FIDO2 key that included the NFC chip. Select “NFC Device” and click on “Next” (figure 5).

Note: In my test case I use a security key that supports NFC, therefore I configure and choose the “NFC Device”, but I will not use NFC functionality in this test.

Figure 5. Select the type of security key.

  • Make sure that the key is ready and click on “Next”.

Figure 6. Security key instructions displayed when configuring FIDO2.

  • Plug in the FIDO2 key and follow the instructions on the screen (figure 7).

Figure 7. Insert the FIDO2 key to continue the configuration.

  • Create a PIN for the FIDO2 key and click on “OK” (figure 8).

Figure 8. Create a PIN for your FIDO2 key.

  • When the FIDO2 key is blinking, press shortly on the FIDO2 key to continue (figure 9).

Figure 9. Take action on your security key.

  • Give the FIDO2 key a name and click on “Next” to continue (figure 10).

Figure 10. Fill in a name for your security key.

  • That’s it, the FIDO2 security key has been configured and added to the user account (figure 11).

Figure 11. The configuration of the FIDO2 key for the user is complete.

The figure below presents an overview of the different authentication methods.

Figure 12. Overview of the different sign-in methods in the user’s profile.

Passwordless sign-in User Experience with FIDO2

The configuration of the FIDO2 security key in Azure AD is now completed. In addition, the FIDO2 key is also added as an authentication method to the user’s profile. Now it is time to log into Microsoft’s online services with Yubikey FIDO2 to see what the user experience looks like. Not unimportant, it is also possible to log in to a Windows 10 (version 1809) Azure AD joined device with FIDO2!

  • Start an internet browser and go to: https://portal.office.com (figure 13).

Figure 13. Login screen for portal.office.com.

  • Type in the user account name and click on “Next”.
  • Instead of typing in the password select “Sign in with Windows Hello or a Security key” (figure 14).

Figure 14. Sign in with Windows Hello or a Security key.

  • If not already done, insert the Yubico FIDO2 key (figure 15).

Figure 15. Insert your security key into the USB-port.

  • Enter the security key PIN that was created earlier (figure 16).

Figure 16. Sign in with Windows Hello or a Security key.

  • The FIDO2 key will now start blinking. Next, touch the FIDO2 key to enable the second (physical) authentication factor to complete the authentication process (figure 17).

Figure 17. An action on the FIDO2 key is required to complete the sign-in process.

  • Performing the steps above will result in a successful authentication and log in to Microsoft’s Online services (figure 18).

Figure 18. The user is successfully logged into Microsoft’s Online services.

My opinion

More often organizations request complex passwords for their employees. However, one could argue whether this solves any problem. Complex passwords do not help users to protect their identity in case of a phishing or a MiTM attack.

I strongly believe that the user identity is the new security and that one needs to be careful with this, especially in a world where employees have access to company data, from any device and any location. Employees are no longer limited to the corporate network to perform their work. Therefore, it is very important that they can work in a safe manner, regardless of whether they are connected to an unsafe (WiFi) network or not. The use of a Yubikey FIDO2 contributes to the safety of a user’s identity, as the user does not have to remember and use a difficult password and/ or renew the password every so often. The Yubikey FIDO2 is easy to configure and, above all, very safe to use!

Resources:

For more information about the FIDO Alliance:
https://fidoalliance.org/fido2/

Overview of the different Yubico FIDO2 keys:
https://www.yubico.com/products/yubikey-hardware/compare-products-series/

What is FIDO2 and Web Authentication?
https://developers.yubico.com/WebAuthn/

A world without passwords with Azure Active Directory:
https://docs.microsoft.com/en-us/azure/security/fundamentals/ad-passwordless

Key Generation (UF2):
https://developers.yubico.com/U2F/Protocol_details/Key_generation.html

Enable passwordless security key sign in for Azure AD (preview):
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-authentication-passwordless-security-key#known-issues

Windows Hello FIDO2 certification gets you closer to passwordless:
https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-Hello-FIDO2-certification-gets-you-closer-to/ba-p/534592

Enable combined security information registration (preview):
https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-registration-mfa-sspr-combined

Azure, Azure AD, FIDO2, Passwordless sign-inAzure AD, FIDO2, Passwordless sign-in, Security Keys, Yubico, Yubikey

Passwordless Sign-in Azure AD

August 17, 2019June 26, 2023Wouter Visser1 Comment

Multifactor Authentication (MFA) can be used to make login more secure. In addition to MFA, passwordless sign-in becomes increasingly popular lately. Using passwordless sign-in, a password is not required at the time of logging into, for example, the Microsoft Online services. Passwordless sign-in ensures that the password is replaced by notifications that are received and approved via a mobile phone or by using FIDO2 keys. It is therefore not necessary to remember passwords and the use of passwordless sign-in makes logging in very easy and above all more secure.

Recently, the Microsoft authenticator app has been expanded with the passwordless sign-in functionality. This means that during the process of logging in, a push notification appears on the phone showing several numbers. The user must then select the correct number displayed on the phone which corresponds to the number presented on the login screen.

In this blog I describe the configuration of passwordless sign-in via the Microsoft Authenticator app in Azure AD and the associated user experience.

In the past it was only possible to activate passwordless sign-in via PowerShell. However, from the beginning of August 2019 it is also possible to do this via the Azure portal. Both options are described in this blog post.

Note:    At the time of writing, passwordless sign-in for Azure AD is still a preview functionality, which means that the functionality is available for test purposes and proof-of-concept scenarios.

Prerequisites

Prior to starting the passwordless sign-in via the Microsoft Authenticator app in Azure AD, the following steps should be taken:

  • Install the latest version of the Microsoft Authenticator app on a phone. At the time of writing, this is version 6.3.13. When using an iOS device, it should be made sure that the iOS device is at least on iOS 8.0 and Android devices the version to be used should be at least 6.0.
  • The Microsoft Authenticator push notifications must be enabled.
  • The phone must be registered in Azure Active Directory (Azure AD).
  • The user must have the correct license, such as Enterprise Mobility + Security E3.

Method 1: Activate passwordless sign-in via PowerShell

The steps to activate passwordless sign-in via PowerShell include the following:

  • Start PowerShell as an administrator.
  • Install the AzureADPreview module: “Install-Module -Name AzureADPreview”
  • Connect to Azure AD and login in with a global admin account: “Connect -AzureAD”
  • After authentication run “New-AzureADPolicy -Type AuthenticatorAppSignInPolicy -Definition ‘{“AuthenticatorAppSignInPolicy”:{“Enabled”:true}}’ -isOrganizationDefault $true -DisplayName       AuthenticatorAppSignIn” as shown in figure 1.

Figure 1. Output of enabling passwordless sign-in via PowerShell.

Method 2: Activate passwordless sign-in via the Azure Portal

The steps to activate passwordless sign-in via the Azure Portal include the following:

  • Sign into the Azure portal -> https://portal.azure.com
  • Go to Azure Active Directory -> Authentication methods (figure 2).

Figure 2. Authentication methods in Azure AD.

  • Click on -> Authentication method policy (Preview)
  • Select Microsoft Authenticator passwordless sign-in.
  • Select Enable -> Yes
  • Target -> All users or Select Users.
  • Hit Save to save the policy (figure 3).

Figure 3. Configuring passwordless sign-in in Azure AD.

Passwordless sign-in is now successfully configured and active. Next, the Microsoft Autenticator app should be configured.

Configure the Microsoft Authenticator app

The steps to configure the Microsoft Authenticator app include the following:

  • Open the Autenticator app on the phone, in this case this is an iPhone.
  • Select the account relevant for activating passwordless sign-in and click on the arrow on the right, please see figure 4.

Figure 4. Activating passwordless sign-in via the Authenticator app.

  • Click on “Enable phone sign-in”.
  • If the prerequisites are followed, the phone is already registered in Azure AD. Click on “Continue” (figure 5).

Figure 5. Configuring the Authenticator app for passwordless sign-in.

  • Select “Approve”. The phone is now ready to use passwordless sign-in (figure 6).

Figure 6. Notification to finalize the configuration of passwordless sign-in in the Authenticator app.

Passwordless sign-in User Experience

The steps below demonstrate the end-user experience when logging into Microsoft Online using passwordless sign-in.

  • Start an internet browser and go to: https://portal.office.com (figure 7).

Figure 7. Login screen for portal.office.com.

  • Type in the user account name and click on “Next”.
  • Instead of asking to enter a password, a code will appear (figure 8).

Figure 8. Notification for authentication when using passwordless sign-in.

  • At this time, the Authenticator app will also give a notification with the same code, please see figure 9. When the correct code is selected, the authentication process will be continued, and the user is logged in.

Figure 9. Notification in the Authenticator app, when using passwordless sign-in.

That’s all! Now the passwordless sign-in can be used in combination with the Microsoft Authenticator app. In my next blog I will describe the configuration and use of FIDO2 Keys. -> Passwordless Sign-In Azure AD with FIDO2

Azure, Azure AD, Passwordless sign-inAzure AD, Passwordless sign-in

Categories

  • Active Directory (1)
  • Announcements (1)
  • Apple (1)
  • Application Performance Monitoring (3)
  • Azure (8)
  • Azure AD (5)
  • Azure Information Protection (2)
  • Cloud App Security (1)
  • Conditional Access (3)
  • FIDO2 (2)
  • Intune (3)
  • iOS (1)
  • Mobile Application Management (2)
  • Mobile Device Management (2)
  • MS Exchange (2)
  • Office 365 (2)
  • Operations Manager (6)
  • OpsMgr Visio Add-in (1)
  • Passwordless sign-in (2)
  • Windows 10 (2)

Archives

  • June 2023 (1)
  • January 2020 (1)
  • November 2019 (1)
  • August 2019 (2)
  • March 2019 (1)
  • February 2019 (1)
  • September 2018 (1)
  • May 2018 (1)
  • July 2017 (1)
  • September 2016 (1)
  • August 2016 (1)
  • February 2016 (1)
  • January 2016 (1)
  • August 2015 (1)
  • July 2015 (1)
  • May 2015 (3)
  • April 2015 (1)
  • March 2015 (2)

Cloud

Active Directory Announcements Apple Application Performance Monitoring Azure Azure AD Azure Information Protection Cloud App Security Conditional Access FIDO2 Intune iOS Mobile Application Management Mobile Device Management MS Exchange Office 365 Operations Manager OpsMgr Visio Add-in Passwordless sign-in Windows 10

Follow me on Twitter

My Tweets

Enter your email address to follow this blog and receive notifications of new posts by email.

Create a website or blog at WordPress.com
  • Subscribe Subscribed
    • Everything Cloud
    • Already have a WordPress.com account? Log in now.
    • Everything Cloud
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...