- 17 Apr 2025
- 1 Minute to read
- Print
- DarkLight
- PDF
Configuring Microsoft EntraID for passwordless authentication
- Updated on 17 Apr 2025
- 1 Minute to read
- Print
- DarkLight
- PDF
OneSpan's innovative FIDO2 passwordless technology allows users to securely sign in to Azure AD (Microsoft Entra ID) using a USB key, completely removing the need for traditional passwords. Once set up, users can effortlessly access their accounts and log onto their Windows devices (whether joined to EntraAD or Hybrid AD) with OneSpan’s FX7 FIDO2 security keys. This method ensures robust two-factor authentication by requiring both the physical security key and a PIN or biometric verification (such as a fingerprint) configured on the FIDO2 security keys.
This guide provides step-by-step instructions on how to enable Digipass FX7 passkeys in EntraID and set them as the default security measure for Microsoft 365 logins. Follow these steps to adopt a modern, passwordless authentication method and enhance your organization's security.
The Entra ID Admin center is available at https://entra.microsoft.com.
Enable the Passkey (FIDO2) authentication method
Select Protection > Authentication Methods.
Click Passkey (FIDO2) settings.
Enable All Users.
Switch to the Configure tab.
Use the following configuration:
Allow self-service setup: YES
Enforce attestation: YES
Enforce key restrictions: YES
Restrict specific keys: Allow
Clear the Microsoft Authenticator box.
Click Add AAGUID of the FX7 device.
The AAGUID for the OneSpan FX7 is 30b5035e-d297-4ff7-b00b-addc96ba6a98.
Configure the authentication strengths
Select Protection > Authentication Methods.
Select Manage > Authentication Strengths.
Click New Authentication Strength to add a new authentication method and use the following configuration:
Name: Passkeys (FX7) Only
Check: Passkeys (FIDO2)
Under Advanced Options:
Click Add AAGUID and type 30b5035e-d297-4ff7-b00b-addc96ba6a98.
Click Save.
Select Temporary Access Pass (Multi-Use).
Click Next.
Click Save.
Disable the security defaults
Sign in to the Microsoft Entra admin center as at least a security administrator.
Select Identity > Overview > Properties.
Click Manage security defaults.
Set Security defaults to Disabled.
Click Save.
Create a group for PasskeyOnly users
Select Users > Groups > All Groups.
Click New Group and use the following configuration:
Group Name: PasskeyOnly
Group Type: Security
Add users to the group that should use Passkeys Only for MFA.
Configure conditional access
Select Protection > Conditional Access.
Switch to Policies.
Click New Policy to create a new policy and use the following configuration:
Name: Require multifactor authentication for group passkeys only
Users: Select the PasskeyOnly group previously created.
Switch to Access Controls and configure:
Select Grant Access
Select Require Authentication Strength.
Select Passkeys (FX7) Only in the drop-down list.
Click Select.
Set Enable Policy to On.
Click Save.
Assign a temporary access pass to a user
Select Users > All Users.
Select a user account.
Switch to Authentication Methods.
Click Add Authentication Method to configure a new method and use the following configuration settings:
Choose Method: Temporary Access Pass
Set a duration value.
Set One-Time use according to your organizational policies.
Click Add.