Forum Discussion

luvsql's avatar
luvsql
Steel Contributor
Sep 28, 2021
Solved

Use FIDO2 as MFA token

We are trying to replace the need to have a phone number (cellphone or office phone or authenticator app) for many of our users that refuse to use a personal phone for authentication.  This is also f...
  • ChristianJBergstrom's avatar
    Sep 28, 2021

    luvsql Hello again, I had to try it using security defaults as I'm pretty sure you're using that. You have no Intune, Conditional access or MFA registration policy in your subscriptions.

     

    So, when simply using security defaults with enforced MFA you get the prompt to add security info/details, and can skip this for 14 days. When enabling the Temporary Access Pass policy and activating that for a newly created user in Azure AD it instead becomes the first prompt.

     

    This is how it looks like and takes you to https://aka.ms/mysecurityinfo page where one can configure additional options, such as the security key. I could not proceed as I do not have a key to put in the laptop.

     

     

    *My reply is being updated as you can actually use TAP to add a security key (as the pictures show) with security defaults. For the sake of it I even asked Microsoft who verified the method.

     

    To wrap up the above.

     

    1. Enable security defaults.

    2. Enable TAP and assign to user.

    3. User logs in using TAP and adds FIDO2 key.

    4. Next sign-in when prompted for MFA user uses FIDO2 key (as FIDO2 satisfies MFA).

Resources