Hi everyone,
I’m Sue, the VP of Identity’s Customer & Partner Success team, and I love having the opportunity to share stories from real customers via this blog series. We've designed this collection of stories from real customers that have been able to solve their identity and security challenges using Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra. I hope you find valuable insights and best practices that you can apply to your own projects.
Check out more from the blog series here: Voice of the Customer
In today’s spotlight, we’ll be focusing on the journey of one of our largest partners, Accenture, as they adopted passwordless authentication and reduced their exposure to phishing attacks.
With the rise of cyber-attacks, phishing is among the primary methods that attackers use to compromise your organization’s users. In Microsoft’s latest Digital Defense report, we see it as the highest attack vector on users' credentials.
Passwords have long been a weak credential and now attackers are increasing their focus on getting your users to just surrender the clear text password to them. As Accenture’s Simon Gooch, Managing Director – Global IT, Enterprise Technology, Security notes, “In the future, people will look back and wonder why we ever used passwords.”
Now, even though multifactor authentication (MFA) defeats over 90% of password breaches, it isn’t immune to phishing. Microsoft’s vision for a passwordless world emphasizes FIDO 2.0-powered inherently phish-resistant credentials like Windows Hello for Business and FIDO 2.0 External Security Keys. For more on how FIDO 2.0 credentials are phishing resistant, check out this blog by my colleague Pamela Dingle, our director of Identity Standards, and this video explaining the technical flow. These modern credentials are not only more secure, but they also create a more seamless and natural user experience. As Accenture shares in its case study, “We’ve proven the benefits. The adoption of passwordless has led to faster login times, more reliable experiences, fewer failed authentications, and improved overall security posture.”
The most impressive aspect for me throughout Accenture’s journey was the speed and efficiency with which it was executed – a journey that started in 2019 and in place by mid-2022. As we’ve shared in our Microsoft passwordless journey blog, getting to passwordless means getting your apps ready, your devices ready, and your registration campaigns thought out. Accenture moved thousands of applications to Azure AD so that the passwordless sign ins would accrue to MFA login for all these apps without requiring any further devices or gestures beyond the user’s natural sign in. They emphasized readiness on multiple devices, as you’ll be able to use the right passwordless form (Windows Hello for Business, FIDO2 Keys, or Phone Sign in) that matches the user's experiences.
The result at Accenture is 535,000 users enabled with Windows Hello for Business, more than 200,000 registered employees using the Microsoft Authenticator App for passwordless sign-in, 5,000 FIDO2 key users, and 70% Of Windows device sign-ins occur with a passwordless method.
For an alternative perspective on the implementation, I’d like to draw your attention to the detailed passwordless journey case study authored by our partners at Accenture. I trust you will agree with Accenture’s dual goals of improving security and the user experience.
Until next time,
Sue
Learn more about Microsoft identity:
- Get to know Microsoft Entra – a comprehensive identity and access product family
- Return to the Microsoft Entra (Azure AD) blog home
- Join the conversation on Twitter and LinkedIn
- Share product suggestions on the Entra (Azure AD) forum
Updated Aug 15, 2022
Version 6.0Sue Bohn
Microsoft
Joined September 27, 2018
Microsoft Entra Blog
Stay informed on how to secure access for workforce, customer, and workload identities, from anywhere, to multicloud and on-premises resources, with comprehensive identity and network access solutions.