MC1097225 - Entra ID: Upcoming changes to support passkey profiles in the authentication methods policy (preview)

Service

Microsoft Entra

Last Updated

Oct 20, 2025

Published Jun 17, 2025

Tag

Major change
Updated message
Feature update
User impact
Admin impact
Retirement

Summary

In November 2025, Microsoft Entra ID will support passkey profiles in public preview, enabling group-based passkey configurations and new API schema changes. Rollout occurs worldwide early November to December, with GCC regions mid-November to mid-December. No admin action is needed before rollout.

More information

Updated October 20, 2025: We have updated the rollout timelines and content below. Thank you for your patience.

In November 2025, we will expand the passkey (FIDO2) authentication methods policy in Microsoft Entra ID to support passkey profiles in public preview. This update will enable granular, group-based control over passkey configurations and introduce new API schema changes.

When this will happen:

Public Preview (Worldwide): We will begin rolling out early November 2025 and expect to complete by early December 2025.

Public Preview (GCC, GCC High, DoD): We will begin rolling out mid-November 2025 and expect to complete by mid-December 2025.

How this will affect your organization:

After this rollout, you'll be able to apply different passkey configurations per user group. For example, you will be able to:

  • Allow the use of specific FIDO2 security key models for user group A
  • Allow the use of passkeys in Microsoft Authenticator for user group B

Important: If your organization opts-in to the new admin UX and modifies the Default passkey profile, the new schema will take effect. If you continue using Graph API or third-party tools to modify the policy, the schema will not change until General Availability.

These new settings will be available at Microsoft 365 admin center > Home > Security > Authentication methods > Passkey (FIDO2) settings:

admin controls

As part of this update in November 2025, if Enforce attestation is disabled, we will start accepting security key or passkey providers using the following attestation statements:

  • “none” 
  • “tpm” 
  • “packed” (AttCA type only) 
  • Custom attestation formats ≤ 32 characters 

This will allow a wider range of security keys and passkey providers to be accepted for registration and authentication in Microsoft Entra ID. To compare this upcoming update with the current behavior, refer to Microsoft Entra ID attestation for FIDO2 security key vendors

What you need to do to prepare:

This rollout will happen automatically by the specified dates with no admin action required before the rollout. You may want to review your current passkey configuration, notify your admins about this change, and update internal documentation.

Learn more about passkeys in Microsoft Entra ID: Enable passkeys for your organization - Microsoft Entra ID | Microsoft Learn (will be updated before rollout)