Home
%3CLINGO-SUB%20id%3D%22lingo-sub-354350%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20Ignite%20Recap%203%3A%20start%20your%20journey%20to%20password-less!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-354350%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%20for%20your%20reply.%20I'm%20really%20looking%20forward%20that.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-333660%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20Ignite%20Recap%203%3A%20start%20your%20journey%20to%20password-less!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-333660%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F278185%22%20target%3D%22_blank%22%3E%40TakuyaHirose%3C%2FA%3E%3C%2FP%3E%3CBLOCKQUOTE%3E%22This%20summer%2C%20enterprise%20customers%20will%20be%20able%20to%20preview%20the%20ability%20to%20sign%20in%20to%20Windows%20and%20the%20web%20using%20their%20FIDO2%20security%20key.%22%3C%2FBLOCKQUOTE%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-332072%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20Ignite%20Recap%203%3A%20start%20your%20journey%20to%20password-less!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-332072%22%20slang%3D%22en-US%22%3E%3CP%3EWhen%20the%20function%20of%20password-less%20sign-in%20with%20FIDO%20device%20deploy%20to%20School%20%26amp%3B%20Work%20Account%20holders%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-616045%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20AD%20Ignite%20Recap%203%3A%20start%20your%20journey%20to%20password-less!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-616045%22%20slang%3D%22en-US%22%3EHi%2C%20can%20i%20use%20the%20Windows%20Hello%20for%20Business%20token%20and%20WebAuthN%20from%20my%20Azure%20AD%20joined%20computers%20to%20archive%20the%20same%20that%20Kerberos%20and%20Windows%20Integrated%20Authentication%20offers%20for%20AD%20joined%20computers%20now%3F%20-%20So%20i%20can%20use%20web%20applications%20or%203rd%20party%20identity%20providers%20without%20any%20form-based%20login%20screen%20on%20all%20major%20browsers%3F%20Which%20version%20of%20Windows%2010%20do%20I%20need%20to%20archive%20this%20and%20do%20I%20need%20the%20preview%20version%20of%20Azure%20AD%20mentioned%20above%3F%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-331439%22%20slang%3D%22en-US%22%3EAzure%20AD%20Ignite%20Recap%203%3A%20start%20your%20journey%20to%20password-less!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-331439%22%20slang%3D%22en-US%22%3E%3CP%3EHey%20there%20folks!%20It%E2%80%99s%20been%20a%20great%20(and%20busy)%20few%20months%20since%20the%20last%20update.%20For%20this%20third%20recap%2C%20we%E2%80%99re%20going%20to%20focus%20on%20something%20really%20critical%20to%20our%20long%20term%20security%20strategy.%20Every%20day%2C%20the%20Identity%20Security%20and%20Protection%20(for%20which%20I%20serve%20as%20Group%20Program%20Manager)%20intercepts%20around%20400M%20criminal%20login%20attempts.%20Do%20the%20math%2C%20and%20we%E2%80%99re%20talking%20something%20like%2012%20billion%20fraudulent%20requests%20a%20month!%20Virtually%20all%20of%20these%20are%20opportunistic%20attacks%20which%20rely%20on%20password%20re-use%2C%20guessable%20passwords%2C%20and%20password%20phishing.%20What%E2%80%99s%20the%20common%20denominator%3F%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EThere%20are%20plenty%20of%20things%20we%20can%20do%20now%20to%20harden%20systems%20(like%20using%20MFA!)%2C%20but%20ultimately%20great%20usable%20security%20will%20take%20us%20away%20from%20the%20password.%20For%20most%20Microsoft%20employees%2C%20the%20password%20has%20no%20part%20in%20our%20day-to-day.%20That%E2%80%99s%20because%20Windows%20Hello%20gives%20us%20login%20based%20on%20a%20known%20device%20as%20the%20first%20factor%2C%20and%20we%20can%20use%20a%20pin%2C%20fingerprint%2C%20or%20our%20smiling%20faces%20for%20the%20second.%20This%20is%20strong%2C%20effortless%20authentication%2C%20and%20it%E2%80%99s%20awesome.%20We%20have%20been%20working%20hard%20to%20get%20to%20the%20world%20without%20passwords.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20use%20multi-factor%20authentication%20in%20each%20of%20the%20many%20work%20and%20personal%20systems%20where%20I%20have%20an%20account.%20Typically%20this%20means%20entering%20a%20password%20in%20conjunction%20with%20a%20code%20generated%20by%20my%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Faccount%2Fauthenticator%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Authenticator%20App%3C%2FA%3E%2C%20but%20for%20my%20Microsoft%20account%20and%20Azure%20AD%20accounts%2C%20I%20can%20sign%20in%20with%20the%20app%20directly.%20This%20is%20both%20much%20easier%20and%20more%20fun%20and%20more%20secure%20than%20old-style%20multi-factor%20authentication.%20Lately%20I%20have%20been%20having%20a%20blast%20showing%20off%20FIDO2%20logins%20to%20my%20Microsoft%20accounts%20(you%20can%20learn%20a%20ton%20about%20the%20protocols%20in%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FIdentity-Standards-Blog%2FAll-about-FIDO2-CTAP2-and-WebAuthn%2Fba-p%2F288910%22%20target%3D%22_self%22%3Ethis%20blog%20post%3C%2FA%3E%20from%20Pam%20Dingle%20(%40pamelarosiedee).%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EOf%20course%2C%20to%20some%20extent%20I%20know%20I%20am%20preaching%20to%20the%20converted%20here%20%E2%80%93%20while%20we%20had%20a%20great%20time%20showing%20you%20password-less%20options%20at%20Ignite%202018%2C%20but%20even%20more%20amazing%20to%20see%20your%20enthusiasm%2C%20with%20tremendous%20turnout%20for%20the%20talks%20(if%20you%20didn%E2%80%99t%20get%20a%20chance%20to%20see%20it%2C%20or%20want%20to%20see%20it%20again%2C%20it%E2%80%99s%20%3CA%20href%3D%22https%3A%2F%2Fmyignite.techcommunity.microsoft.com%2Fsessions%2F64557%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Eright%20here%3C%2FA%3E!).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fmyignite.techcommunity.microsoft.com%2Fsessions%2F64557%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F72058i9EACDD10D16C6FEC%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22PasswordlessPresoStage.jpg%22%20title%3D%22PasswordlessPresoStage.jpg%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EAlex%20and%20Manini%20presenting%20password-less!%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EOk%2C%20enough%20from%20me%20%E2%80%93%20with%20no%20further%20ado%2C%20here%E2%80%99s%20the%20latest%20on%20passwordless%20from%20Manini%20(%40manini_roy)%20and%20Libby%20(%40TruBluDevil)%2C%20who%20champion%20our%20FIDO%20and%20phone%20app%20efforts%2C%20respectively.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EStay%20safe!%26nbsp%3B%3C%2FP%3E%0A%3CP%3E-Alex%20(%40alex_t_weinert)%3C%2FP%3E%0A%3CP%3E---%3CBR%20%2F%3EIt%E2%80%99s%20been%20a%20few%20months%20since%20Ignite%20so%20we%20want%20to%20provide%20an%20update%20of%20all%20the%20progress%20and%20let%20you%20know%20how%20you%20can%20get%20started%20on%20your%20password-less%20journey.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EIt%E2%80%99s%20always%20hard%20to%20take%20the%20first%20step%20on%20a%20new%20journey.%20With%20our%20password-less%20technologies%20you%20can%20choose%20where%20to%20start%20with%20options%20including%20Windows%20Hello%2C%20Microsoft%20Authenticator%2C%20and%20FIDO%20keys.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F72059i8EA29EEE77C445B9%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Getting%20to%20a%20world%20without%20passwords.png%22%20title%3D%22Getting%20to%20a%20world%20without%20passwords.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EMoving%20to%20a%20password-less%20environment%20requires%20technologies%20that%20can%20support%20it%E2%80%94and%20time%20for%20your%20organization%20and%20users%20to%20adopt%20them.%20Based%20on%20customer%20interactions%2C%20we%20have%20a%20new%20whitepaper%20that%20learn%20more%20about%20why%20you%20should%20reduce%20reliance%20on%20passwords%2C%20introduce%20new%20password%20replacement%20technologies%20in%20your%20organization%2C%20and%20help%20make%20a%20sea%20change%20in%20both%20security%20and%20productivity.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EDownload%20the%20whitepaper%20now%3A%20%3CA%20href%3D%22https%3A%2F%2Fquery.prod.cms.rt.microsoft.com%2Fcms%2Fapi%2Fam%2Fbinary%2FRE2KEup%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Password-less%20Protection%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESince%20our%20announcements%20at%20Ignite%2C%20we%20want%20to%20share%20some%20key%20updates%20around%20our%20password-less%20solutions%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3EAuthenticator%20app%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%E2%80%99ve%20seen%20great%20interest%20in%20the%20public%20preview%20of%20signing%20in%20password-lessly%20with%20Microsoft%20Authenticator!%20Since%20Ignite%2C%20over%201%2C200%20tenants%20have%20acted%20to%20enable%20the%20policy%20and%20begin%20using%20it%2C%20and%20our%20weekly%20active%20usage%20has%20more%20than%20tripled.%20If%20you%20are%20interested%20in%20trying%20it%20out%20for%20your%20tenant%2C%20please%20be%20sure%20to%20read%20%3CA%20href%3D%22http%3A%2F%2Faka.ms%2Fpasswordless%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EPassword-less%20phone%20sign-in%20with%20the%20Microsoft%20Authenticator%20app%3C%2FA%3E%20for%20instructions%20and%20known%20issues.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20also%20heard%20your%20requests%20to%20have%20a%20more%20granular%20level%20of%20control%20for%20the%20use%20of%20this%20credential.%20In%20the%20first%20half%20of%202019%2C%20we%20will%20be%20adding%20a%20powerful%20tool-the%20ability%20to%20assign%20use%20of%20this%20credential%2C%20and%20others%2C%20to%20users%20and%20groups-to%20help%20you%20with%20your%20pilot%20and%20rollout%20projects.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3EFast%20Identity%20Online%20(FIDO)%20Alliance%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOn%20November%2020%2C%202018%2C%20we%20started%20rolling%20out%20the%20ability%20for%20our%20Microsoft%20account%20users%20to%20sign%20in%20to%20Microsoft%20Edge%20using%20a%20FIDO2%20device%20or%20Windows%20Hello.%20This%20will%20allow%20about%20800%20million%20users%20to%20access%20their%20Microsoft%20services%20on%20the%20web%20without%20a%20password%20(or%20even%20a%20username).%20Under%20the%20covers%2C%20we%E2%80%99ve%20implemented%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fblog%2F2018%2F04%2F12%2Fbig-news-in-our-drive-to-eliminate-passwords-fido2-webauthn-reaches-candidate-recommendation-status%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EWebAuthn%20and%20CTAP2%3C%2FA%3E%20specifications%20from%20the%20FIDO2%20standard%20into%20our%20services%20to%20make%20this%20a%20reality.%20As%20a%20member%20of%20the%20FIDO%20Alliance%2C%20we%20have%20been%20working%20with%20other%20alliance%20members%20to%20develop%20open%20standards%20for%20the%20next%20generation%20of%20authentication.%20We%20are%20happy%20that%20Microsoft%20is%20the%20first%20company%20to%20support%20password-less%20authentication%20with%20FIDO2.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20more%20information%20and%20to%20try%20it%20out%2C%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fblog%2F2018%2F11%2F20%2Fsign-in-to-your-microsoft-account-without-a-password-using-windows-hello-or-a-security-key%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Eread%20this%20blog%20post%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EWe%20have%20tons%20of%20great%20things%20coming%20out%20as%20part%20of%20our%20efforts%20to%20reduce%20and%20even%20eliminate%20the%20use%20of%20passwords%20through%20FIDO2.%20This%20summer%2C%20enterprise%20customers%20will%20be%20able%20to%20preview%20the%20ability%20to%20sign%20in%20to%20Windows%20and%20the%20web%20using%20their%20FIDO2%20security%20key.%20Admins%20will%20have%20the%20ability%20to%20turn%20on%20and%20configure%20FIDO2%20for%20their%20tenant%20and%20allow%20their%20employees%20to%20set%20up%20their%20own%20security%20keys%20for%20their%20account.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOverall%2C%20we%20are%20making%20great%20progress%20and%20you%20can%20start%20your%20password-less%20journey%20today.%20We%20have%20enabled%20our%20password-less%20solutions%20to%20work%20in%20cloud%20scenarios%2C%20so%20as%20you%20are%20making%20your%20move%20to%20Azure%20Active%20Directory%20(Azure%20AD)%2C%20it%E2%80%99s%20a%20great%20opportunity%20to%20envision%20what%20the%20future%20of%20authentication%20will%20look%20like%20without%20breaking%20any%20of%20your%20existing%20scenarios.%20It%E2%80%99s%20also%20important%20to%20pilot%20and%20deploy%20the%20solutions%20that%20are%20available%20in%20order%20to%20get%20your%20employees%20to%20stop%20relying%20on%20passwords%20for%20their%20everyday%20authentication.%20It%E2%80%99ll%20make%20their%20lives%20easier%20day-to-day%20and%20they%E2%80%99ll%20be%20more%20suspicious%20when%20asked%20for%20their%20username%20and%20password%20by%20phishing%20scams%20and%20malware.%20In%20the%20meantime%2C%20as%20you%20are%20piloting%20these%20solutions%2C%20you%20can%20tell%20us%20what%20you%20think%20so%20your%20feedback%20can%20feed%20into%20the%20product%20design%20cycle.%20It%E2%80%99s%20a%20win-win%20for%20all%20of%20us!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3EGet%20started%20on%20your%20password-less%20journey%20%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EExcited%3F%20Start%20by%20reading%20the%20%3CA%20href%3D%22https%3A%2F%2Fquery.prod.cms.rt.microsoft.com%2Fcms%2Fapi%2Fam%2Fbinary%2FRE2KEup%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Password-less%20protection%20document%3C%2FA%3E%20and%20then%20start%20piloting%20one%20of%20the%20Microsoft%20password-less%20solutions.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F72060i510A7726623AD396%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22PWLessNextSteps.png%22%20title%3D%22PWLessNextSteps.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EStay%20tuned%20for%20more%20awesomeness!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-331439%22%20slang%3D%22en-US%22%3E%3CP%3EHey%20there%20folks!%20It%E2%80%99s%20been%20a%20great%20(and%20busy)%20few%20months%20since%20the%20last%20update.%20For%20this%20third%20recap%2C%20we%E2%80%99re%20going%20to%20focus%20on%20something%20really%20critical%20to%20our%20long%20term%20security%20strategy.%20Every%20day%2C%20the%20Identity%20Security%20and%20Protection%20(for%20which%20I%20serve%20as%20Group%20Program%20Manager)%20intercepts%20around%20400M%20criminal%20login%20attempts.%20Do%20the%20math%2C%20and%20we%E2%80%99re%20talking%20something%20like%2012%20billion%20fraudulent%20requests%20a%20month!%20Virtually%20all%20of%20these%20are%20opportunistic%20attacks%20which%20rely%20on%20password%20re-use%2C%20guessable%20passwords%2C%20and%20password%20phishing.%20What%E2%80%99s%20the%20common%20denominator%3F%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-331439%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EEvents%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Hey there folks! It’s been a great (and busy) few months since the last update. For this third recap, we’re going to focus on something really critical to our long term security strategy. Every day, the Identity Security and Protection (for which I serve as Group Program Manager) intercepts around 400M criminal login attempts. Do the math, and we’re talking something like 12 billion fraudulent requests a month! Virtually all of these are opportunistic attacks which rely on password re-use, guessable passwords, and password phishing. What’s the common denominator?


There are plenty of things we can do now to harden systems (like using MFA!), but ultimately great usable security will take us away from the password. For most Microsoft employees, the password has no part in our day-to-day. That’s because Windows Hello gives us login based on a known device as the first factor, and we can use a pin, fingerprint, or our smiling faces for the second. This is strong, effortless authentication, and it’s awesome. We have been working hard to get to the world without passwords.

 

I use multi-factor authentication in each of the many work and personal systems where I have an account. Typically this means entering a password in conjunction with a code generated by my Microsoft Authenticator App, but for my Microsoft account and Azure AD accounts, I can sign in with the app directly. This is both much easier and more fun and more secure than old-style multi-factor authentication. Lately I have been having a blast showing off FIDO2 logins to my Microsoft accounts (you can learn a ton about the protocols in this blog post from Pam Dingle (@pamelarosiedee).


Of course, to some extent I know I am preaching to the converted here – while we had a great time showing you password-less options at Ignite 2018, but even more amazing to see your enthusiasm, with tremendous turnout for the talks (if you didn’t get a chance to see it, or want to see it again, it’s right here!).

 

PasswordlessPresoStage.jpgAlex and Manini presenting password-less!


Ok, enough from me – with no further ado, here’s the latest on passwordless from Manini (@manini_roy) and Libby (@TruBluDevil), who champion our FIDO and phone app efforts, respectively.

 

Stay safe! 

-Alex (@alex_t_weinert)

---
It’s been a few months since Ignite so we want to provide an update of all the progress and let you know how you can get started on your password-less journey.


It’s always hard to take the first step on a new journey. With our password-less technologies you can choose where to start with options including Windows Hello, Microsoft Authenticator, and FIDO keys.

 

Getting to a world without passwords.png


Moving to a password-less environment requires technologies that can support it—and time for your organization and users to adopt them. Based on customer interactions, we have a new whitepaper that learn more about why you should reduce reliance on passwords, introduce new password replacement technologies in your organization, and help make a sea change in both security and productivity.

 

Download the whitepaper now: Microsoft Password-less Protection

 

Since our announcements at Ignite, we want to share some key updates around our password-less solutions:

 

Authenticator app

 

We’ve seen great interest in the public preview of signing in password-lessly with Microsoft Authenticator! Since Ignite, over 1,200 tenants have acted to enable the policy and begin using it, and our weekly active usage has more than tripled. If you are interested in trying it out for your tenant, please be sure to read Password-less phone sign-in with the Microsoft Authenticator app for instructions and known issues.

 

We also heard your requests to have a more granular level of control for the use of this credential. In the first half of 2019, we will be adding a powerful tool-the ability to assign use of this credential, and others, to users and groups-to help you with your pilot and rollout projects.

 

Fast Identity Online (FIDO) Alliance

 

On November 20, 2018, we started rolling out the ability for our Microsoft account users to sign in to Microsoft Edge using a FIDO2 device or Windows Hello. This will allow about 800 million users to access their Microsoft services on the web without a password (or even a username). Under the covers, we’ve implemented the WebAuthn and CTAP2 specifications from the FIDO2 standard into our services to make this a reality. As a member of the FIDO Alliance, we have been working with other alliance members to develop open standards for the next generation of authentication. We are happy that Microsoft is the first company to support password-less authentication with FIDO2.

 

For more information and to try it out, read this blog post.


We have tons of great things coming out as part of our efforts to reduce and even eliminate the use of passwords through FIDO2. This summer, enterprise customers will be able to preview the ability to sign in to Windows and the web using their FIDO2 security key. Admins will have the ability to turn on and configure FIDO2 for their tenant and allow their employees to set up their own security keys for their account.

 

Overall, we are making great progress and you can start your password-less journey today. We have enabled our password-less solutions to work in cloud scenarios, so as you are making your move to Azure Active Directory (Azure AD), it’s a great opportunity to envision what the future of authentication will look like without breaking any of your existing scenarios. It’s also important to pilot and deploy the solutions that are available in order to get your employees to stop relying on passwords for their everyday authentication. It’ll make their lives easier day-to-day and they’ll be more suspicious when asked for their username and password by phishing scams and malware. In the meantime, as you are piloting these solutions, you can tell us what you think so your feedback can feed into the product design cycle. It’s a win-win for all of us!

 

Get started on your password-less journey

 

Excited? Start by reading the Microsoft Password-less protection document and then start piloting one of the Microsoft password-less solutions.

 

PWLessNextSteps.png


Stay tuned for more awesomeness!

4 Comments
Senior Member

When the function of password-less sign-in with FIDO device deploy to School & Work Account holders?

 

Occasional Contributor

@TakuyaHirose

"This summer, enterprise customers will be able to preview the ability to sign in to Windows and the web using their FIDO2 security key."
Senior Member

Thank you for your reply. I'm really looking forward that.

Occasional Visitor
Hi, can i use the Windows Hello for Business token and WebAuthN from my Azure AD joined computers to archive the same that Kerberos and Windows Integrated Authentication offers for AD joined computers now? - So i can use web applications or 3rd party identity providers without any form-based login screen on all major browsers? Which version of Windows 10 do I need to archive this and do I need the preview version of Azure AD mentioned above?