Entra ID

Microsoft Entra ID Synced Passkeys Preview

3 min read

Summary

Microsoft has launched public previews of synced passkeys and high-assurance account recovery for Entra ID, allowing users to sign in passwordlessly with biometrics or a device PIN while syncing passkeys across devices through services like iCloud Keychain and Google Password Manager. The update matters because it aims to make phishing-resistant authentication much easier to adopt at scale, while giving administrators group-based controls over passkey policies to reduce rollout friction, improve user experience, and lower helpdesk costs.

Need help with Entra ID?Talk to an Expert

Introduction: why this matters

MFA adoption continues to rise, but many organizations still struggle with user friction, training overhead, and helpdesk cost—especially when users lose access to their authentication methods. At Ignite 2025, Microsoft introduced synced passkeys and high-assurance account recovery for Entra ID, now available in public preview, aiming to make strong authentication easier to deploy and simpler for end users.

What’s new

1) Synced passkeys (public preview)

Synced passkeys remove passwords entirely and let users sign in using biometrics or a device PIN, with passkeys syncing across devices via platforms like iCloud Keychain and Google Password Manager.

Key benefits highlighted by Microsoft:

  • Higher sign-in success versus legacy methods (Microsoft consumer data cited: 95% vs 30%).
  • Faster sign-in compared to password + code-based MFA (cited: 14x faster).
  • Phishing-resistant authentication, reducing exposure to credential theft and OTP interception.
  • Broad native OS support across major platforms.

2) Passkey profiles for granular admin control

To address common rollout concerns (enrollment friction, inconsistent UX, helpdesk tickets), Entra ID introduces group-based configuration for passkey authentication.

Admins can define requirements per group, such as:

  • Attestation requirements
  • Passkey type (device-bound vs synced)
  • Specific passkey provider controls

This shifts passkeys from a single tenant-wide toggle to a policy-driven deployment model aligned with real-world personas and risk profiles.

3) High-assurance account recovery with ID + biometrics (public preview)

When users lose access to their normal sign-in methods (including passkeys), recovery becomes the weak link—and a target for impersonation and social engineering. Microsoft’s new recovery flow uses government-issued ID verification plus an AI-powered biometric match.

How it works:

  • Users select “Recover my account” in the Entra sign-in experience.
  • They complete remote document verification (e.g., driver’s license, passport).
  • They perform a Face Check (liveness + selfie matched to the ID photo) using Microsoft Entra Verified ID Face Check powered by Azure AI services.
  • Entra ID matches verified attributes (e.g., name/address) against the organization’s directory/HR system.
  • After recovery, users are prompted to register a synced passkey to reduce future lockouts.

Organizations can choose ID verification providers via the Microsoft Security Store: Idemia, LexisNexis, and AU10TIX, with coverage across 192 countries.

Impact for IT admins and end users

  • Lower helpdesk volume and cost by reducing password resets and fragile recovery methods.
  • Improved security posture by pushing phishing-resistant auth and stronger recovery controls.
  • More predictable deployments using group-scoped passkey profiles and staged enablement.
  • Better end-user experience with fewer codes, fewer failures, and a guided recovery journey.

Action items / next steps

  1. Pilot synced passkeys with a controlled user group; validate device/platform readiness and user communications.
  2. Create passkey profiles by persona (e.g., frontline, contractors, privileged admins) and define provider/attestation requirements.
  3. Evaluate account recovery requirements (privacy, compliance, HR attribute matching) and run simulations before production enablement.
  4. Select an IDV provider in Microsoft Security Store and plan operational support for recovery scenarios.

Licensing notes

  • Passkeys: Included for all Microsoft Entra ID customers
  • Account recovery: Included with Microsoft Entra ID P1
  • Face Check: Add-on per verification or included with Microsoft Entra Suite
  • Government ID check: Pay-per-verification via Microsoft Security Store

Need help with Entra ID?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Entra IDpasskeysMFAaccount recoveryVerified ID

Related Posts

Entra ID

Microsoft Entra May 2026: Global Secure Access GA

Microsoft Entra’s May 2026 updates focus heavily on Global Secure Access, certificate-based authentication, and stronger privileged access controls. The new capabilities help IT teams extend Zero Trust protections to branch offices, mobile devices, external users, and AI workloads while improving usability and policy enforcement.

Entra ID

Microsoft Entra ID Passkeys: Fixing Recovery Gaps

Microsoft is expanding its passkey-first strategy in Entra ID by addressing the security gaps that remain after passkey deployment, including fallback credentials and weak account recovery. New capabilities such as Windows passkeys, passkey-preferred authentication, and generally available Entra ID account recovery help organizations reduce phishing and social engineering risk while improving user experience.

Entra ID

Microsoft Entra Webinar Series Strengthens Identity Security

Microsoft has launched a five-part Secure identity foundation with Microsoft Entra webinar series focused on passwordless authentication, Conditional Access, ID Protection, Tenant Governance, and Backup and Recovery. The series gives IT and security teams practical deployment guidance to strengthen access management, improve tenant visibility, and build more resilient identity protections across cloud and hybrid environments.

Entra ID

Microsoft Entra Internet Access Adds AI Security

Microsoft has announced new generally available and preview capabilities for Entra Internet Access and Entra Private Access, with a strong focus on securing AI, web, and private app traffic. The updates give IT teams more visibility into shadow AI, prompt injection risks, unmanaged devices, and private app access while extending Zero Trust controls across more scenarios.

Entra ID

SASE 101 in Microsoft Entra: How to Get Started

Microsoft’s latest Entra guidance explains SASE fundamentals for organizations modernizing secure access in cloud-first and hybrid work environments. The post clarifies how SASE differs from SSE, how it supports Zero Trust, and how teams can begin with Microsoft Global Secure Access.

Entra ID

Microsoft Entra Account Discovery Closes App Gaps

Microsoft has introduced Account Discovery in Microsoft Entra ID Governance public preview to help organizations identify existing user accounts and permissions inside connected applications. The feature gives identity teams a clearer view of matched, unassigned, and orphaned accounts so they can bring unmanaged access under policy and reduce identity risk.