FIDO2 security keys– Planning and Implementing Authentication


Physical tokens, such as the Fast Identity Online 2 (FIDO2)-based token or security key, are another password-less option that can be used. While the Microsoft Authenticator app is a soft token, FIDO2 tokens are physical pieces of hardware that are typically either connected to the computer (in the form of a USB device) or that communicate wirelessly (via Bluetooth or NFC).

You can access the security key login process during a browser session by selecting the Sign in with Windows Hello or a security key option from the sign-in page:

Figure 7.5 – Password-less authentication dialog with FIDO2 security token

The data flow for a FIDO2-based login follows a similar pattern as both WHFB and the Microsoft Authenticator app. For example, to log on to a device using FIDO2, this process is followed:

Figure 7.6 – FIDO2 authentication sequence

The steps are as follows:

  1. The user plugs in a FIDO2 security key.
  2. Windows detects the security key.
  3. Windows sends an authentication request to Azure AD.
  4. Azure AD responds by sending a nonce back to the login device.
  5. The user authenticates to the FIDO2 key, unlocking the secure storage area containing the private key.
  6. The FIDO2 key signs the nonce with the private key and sends it to Windows.
  7. Windows generates a PRT request and sends it with the signed nonce to Azure AD.
  8. Azure AD verifies the signed nonce with the FIDO2 device’s public key.
  9. Azure AD returns the PRT to the login device.

FIDO2, such as Windows Hello, has specific requirements for supported hardware.

Supported FIDO2 security tokens

You can see an up-to-date list of supported FIDO2 security keys or tokens here: https://learn.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-password-less#fido2-security-key-providers.

As you’ve seen from the diagrams, each of the password-less options (Windows Hello, Microsoft Authenticator, and FIDO2) follows a similar authentication workflow, based on PKI.

Leave a Reply

Your email address will not be published. Required fields are marked *