Microsoft Entra passkeys on Windows are generally available from late April 2026, enabling passwordless, phishing-resistant sign-in on Windows devices without explicit admin opt-in. This supports corporate, personal, and shared devices, with control via Authentication Methods policies and Conditional Access. No action is needed unless blocking is desired.
Introduction
Microsoft Entra passkeys on Windows are now Generally Available, enabling phishing‑resistant, passwordless sign‑in to Microsoft Entra‑protected resources from Windows devices.
The Public Preview of this capability was previously announced in MC1247893.
Users can create device‑bound passkeys stored in the Windows Hello container and authenticate using Windows Hello methods (face, fingerprint, or PIN). This expands passwordless authentication support to Windows devices that aren’t Microsoft Entra‑joined or registered, helping organizations strengthen security and reduce reliance on passwords across corporate‑managed, personal, and shared device scenarios.
When this will happen:
How this affects your organization:
Who is affected:
Organizations using Microsoft Entra ID with passkeys enabled in the Authentication Methods policy whose users sign in from Windows devices, including:
What will happen:
With this General Availability release:
What you can do to prepare:
No action is required for most organizations.
If you do not want users to register or use Microsoft Entra passkeys on Windows:
Learn more: Enable Microsoft Entra passkey on Windows | Microsoft Learn (will be updated before GA rollout)
Compliance considerations:
| Compliance area | Explanation |
| Does the change modify, interrupt, or disable Conditional Access policies? | Existing Conditional Access policies continue to govern whether passkeys can be created or used on unmanaged Windows devices. |
| Does the change include an admin control and can it be controlled through Entra ID group membership? | Admins can control passkey availability through Authentication Methods policies and FIDO2 passkey profiles scoped to Microsoft Entra ID groups. |
| Does the change allow a user to enable and disable the feature themselves? | Users may register Microsoft Entra passkeys on Windows devices if permitted by administrator policy configuration. |