CloudServus - Microsoft Consulting Blog

FIDO2 Security Key for Windows 10 (Part 1) - Microsoft Consulting Services - CloudServus - United States

Written by cloudservuscom | Oct 29, 2020 9:45:04 AM

FIDO2 Security Key for Windows 10 (Part 1)

As companies like Yubico announce the next generation of YubiKeys with biometrics, let’s take a look at what is actually possible today with Azure AD Joined Windows 10 devices.  Microsoft pushes us closer and closer to passwordless login options, but without a domain and GPOs available, some of our clients are left wanting.  In this series of blog posts, I am going to walk through the setup of a FIDO2 device in Azure AD and Windows 10, and later apply Intune policies to alter login options.

Few notes before you get started:

  1. Be sure your Windows 10 pilot devices are at least 1909 (preferably 2004).
  2. Combined registration for Self-Service Password Reset (SSPR) and Multi-Factor Authentication (MFA) Preview must be enabled in your tenant. https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-registration-mfa-sspr-combined

 

Allowing FIDO2 Security Key authentication for users (Still in preview)

Open the Azure AD Portal, and browse to Authentication methods:

https://portal.azure.com/#blade/Microsoft_AAD_IAM/AuthenticationMethodsMenuBlade/AdminAuthMethods

To pilot this, I am just going to enable a single user.  Choose FIDO2 Security Key, then click Enable, select your user or group of pilot users  and finally click Save.

This user or group of users will now be able to setup a security key, in this example I will be using a YubiKey 5 on a Windows 10 device that is Azure AD Joined.

 

User FIDO2 Key Setup

On your Windows 10 machine, open Edge and browse to:   https://myprofile.microsoft.com/

Click UPDATE INFO under Security Info.

Click Add method, then choose Security Key.  You will be prompted for MFA.

In this case, I am setting up a USB C YubiKey 5, so selecting USB Device at the prompt.

Insert your device, then click Next.

Click OK at the prompts to add your sign-in to the YubiKey, then create a PIN.

All that is left is to give your key a name in Azure AD.  You can have multiple keys, so being able to tell them apart is important.

Finished!

 

 

Testing Windows 10 Login on Azure AD Joined Device

All that is left to do is test the login on our Windows 10 machine, so at the Lock Screen there is now an option for Windows password, FIDO security key, or Windows Hello for Business PIN.

Click Sign-in options, then FIDO security key.

Insert your security key and you will be prompted for the key’s PIN (not a Windows Hello for Business PIN).

YubiKeys have a physical button to touch, so once the correct PIN is entered, all that is left to do is touch the key and login is successful without a password!

 

Azure AD Sign-ins Log

What does this look like in Azure AD?  It will show as a multi-factor login with FIDO2 security key:

 

Next Steps

The option is still available for username and password login to Windows 10, so what is possible with Intune policies to try to enforce a smart card type login?  We will look at those in the next post…

 

Blog Post Written By:  Nick Krenek (Principal M365 Security Consultant at CloudServus)