Entra ID

Microsoft Entra ID Synced Passkeys Preview

3 min read

Summary

Microsoft has launched public previews of synced passkeys and high-assurance account recovery for Entra ID, allowing users to sign in passwordlessly with biometrics or a device PIN while syncing passkeys across devices through services like iCloud Keychain and Google Password Manager. The update matters because it aims to make phishing-resistant authentication much easier to adopt at scale, while giving administrators group-based controls over passkey policies to reduce rollout friction, improve user experience, and lower helpdesk costs.

Need help with Entra ID?Talk to an Expert

Introduction: why this matters

MFA adoption continues to rise, but many organizations still struggle with user friction, training overhead, and helpdesk cost—especially when users lose access to their authentication methods. At Ignite 2025, Microsoft introduced synced passkeys and high-assurance account recovery for Entra ID, now available in public preview, aiming to make strong authentication easier to deploy and simpler for end users.

What’s new

1) Synced passkeys (public preview)

Synced passkeys remove passwords entirely and let users sign in using biometrics or a device PIN, with passkeys syncing across devices via platforms like iCloud Keychain and Google Password Manager.

Key benefits highlighted by Microsoft:

  • Higher sign-in success versus legacy methods (Microsoft consumer data cited: 95% vs 30%).
  • Faster sign-in compared to password + code-based MFA (cited: 14x faster).
  • Phishing-resistant authentication, reducing exposure to credential theft and OTP interception.
  • Broad native OS support across major platforms.

2) Passkey profiles for granular admin control

To address common rollout concerns (enrollment friction, inconsistent UX, helpdesk tickets), Entra ID introduces group-based configuration for passkey authentication.

Admins can define requirements per group, such as:

  • Attestation requirements
  • Passkey type (device-bound vs synced)
  • Specific passkey provider controls

This shifts passkeys from a single tenant-wide toggle to a policy-driven deployment model aligned with real-world personas and risk profiles.

3) High-assurance account recovery with ID + biometrics (public preview)

When users lose access to their normal sign-in methods (including passkeys), recovery becomes the weak link—and a target for impersonation and social engineering. Microsoft’s new recovery flow uses government-issued ID verification plus an AI-powered biometric match.

How it works:

  • Users select “Recover my account” in the Entra sign-in experience.
  • They complete remote document verification (e.g., driver’s license, passport).
  • They perform a Face Check (liveness + selfie matched to the ID photo) using Microsoft Entra Verified ID Face Check powered by Azure AI services.
  • Entra ID matches verified attributes (e.g., name/address) against the organization’s directory/HR system.
  • After recovery, users are prompted to register a synced passkey to reduce future lockouts.

Organizations can choose ID verification providers via the Microsoft Security Store: Idemia, LexisNexis, and AU10TIX, with coverage across 192 countries.

Impact for IT admins and end users

  • Lower helpdesk volume and cost by reducing password resets and fragile recovery methods.
  • Improved security posture by pushing phishing-resistant auth and stronger recovery controls.
  • More predictable deployments using group-scoped passkey profiles and staged enablement.
  • Better end-user experience with fewer codes, fewer failures, and a guided recovery journey.

Action items / next steps

  1. Pilot synced passkeys with a controlled user group; validate device/platform readiness and user communications.
  2. Create passkey profiles by persona (e.g., frontline, contractors, privileged admins) and define provider/attestation requirements.
  3. Evaluate account recovery requirements (privacy, compliance, HR attribute matching) and run simulations before production enablement.
  4. Select an IDV provider in Microsoft Security Store and plan operational support for recovery scenarios.

Licensing notes

  • Passkeys: Included for all Microsoft Entra ID customers
  • Account recovery: Included with Microsoft Entra ID P1
  • Face Check: Add-on per verification or included with Microsoft Entra Suite
  • Government ID check: Pay-per-verification via Microsoft Security Store

Need help with Entra ID?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Entra IDpasskeysMFAaccount recoveryVerified ID

Related Posts

Entra ID

Microsoft Entra Backup and Recovery Enters Preview

Microsoft has launched Microsoft Entra Backup and Recovery in public preview, giving organizations a Microsoft-managed way to restore critical identity objects and configurations to a known-good state. The service helps IT teams recover faster from accidental admin changes, provisioning errors, and malicious modifications that could otherwise disrupt access and security.

Entra ID

Microsoft Entra External MFA Now Generally Available

Microsoft has announced general availability of external MFA in Microsoft Entra ID, allowing organizations to integrate trusted third-party MFA providers using OpenID Connect. The feature lets IT teams keep Microsoft Entra ID as the central identity control plane while maintaining Conditional Access, risk evaluation, and unified authentication method management.

Entra ID

Microsoft Entra RSAC 2026 Identity Security Updates

At RSAC 2026, Microsoft announced major Microsoft Entra updates aimed at securing not only users and devices but also AI agents, workloads, and modern multi-tenant environments. The new capabilities—such as expanded Entra Agent ID governance, shadow AI detection, prompt injection protection, passkey enhancements, and adaptive risk-based access—matter because they strengthen Zero Trust identity security as organizations adopt AI and face more dynamic access risks.

Entra ID

Microsoft Entra Secure Access Report 2026 on AI Risk

Microsoft’s Entra Secure Access Report 2026 says AI adoption is significantly increasing identity and network access risk, with 97% of organizations reporting an access-related incident in the past year and 70% tying incidents to AI activity. The report argues that fragmented identity and network tools are making the problem worse, which matters because more organizations are now moving toward consolidated access platforms to better secure AI tools, agents, and machine identities.

Entra ID

Microsoft Entra Conditional Access All Resources Update

Microsoft is updating Entra Conditional Access so policies targeting "All resources" will be enforced consistently even when resource exclusions exist, closing a gap where some sign-ins requesting only OIDC or limited directory scopes could bypass policy checks. Beginning March 27, 2026 and rolling out through June 2026, affected tenants may see more users prompted for MFA, device compliance, or other controls—making this important for organizations to review impacted Conditional Access policies and prepare for changes in sign-in behavior.

Entra ID

Microsoft Entra Access Priorities Webinar Series

Microsoft is launching the four-part Microsoft Entra Access Priorities webinar series to help IT teams turn its identity-first security strategy into practical deployment steps, with guidance on phishing-resistant authentication, adaptive access, least privilege, and securing AI-related access. The series matters because it gives organizations concrete tools, demos, and checklists to strengthen Zero Trust and prepare for an emerging Access Fabric model that spans users, apps, devices, and AI agents.