Enforcing YubiKeys with Azure Privileged Identity Manager (PIM)

Privileged access management is a critical identity governance component of a cybersecurity risk reduction strategy. Threat actors often target over-privileged accounts to gain unauthorized access, exfiltrate sensitive data, introduce malicious activity, or engage in other forms of malicious behavior. By employing effective privilege management tools, organizations can significantly reduce their attack surface and mitigate the potential damage from security breaches or insider threats. Policies that support the principle of least privilege and restrict access to privileged resources can help to limit the risk of security incidents and preserve the confidentiality, integrity, and availability of critical data and assets.

Azure Active Directory (AAD) Privileged Identity Management (PIM) facilitates the management of privileged access to Azure AD and Azure resources by enforcing a Zero Standing Privilege (ZSP) security model. This model only grants users elevated access privileges when necessary and for a limited time, instead of providing persistent access. With PIM, organizations can grant Just-in-Time (JIT) access to privileged roles, assign temporary or time-bound roles, and require multi-factor authentication for role elevation. These controls help organizations reduce the attack surface and prevent unauthorized access to sensitive data and resources, thereby improving their overall security posture.

To further enhance security, organizations can enforce the use of hardware security keys, such as YubiKeys, for privilege elevation activation with PIM, driven by Conditional Access using Authentication Strengths and Authentication Context. Authentication Strengths can now allow organizations to granularly enforce strong, phishing-resistant multi-factor authentication (MFA) based on applicable threat models, such as requiring YubiKeys using FIDO2 or Certificate-Based Authentication (CBA). This approach provides greater control in strengthening an organization’s security posture.

Step-up authentication is a security measure that requires users to provide additional verification when accessing important resources or performing sensitive tasks. This can include things like multifactor authentication, where users must provide additional information beyond their usual login credentials. With Conditional Access Authentication Context, organizations can enforce strong security measures for sensitive tasks, such as requiring the use of a hardware authenticator like the YubiKey. By using context-based policy enforcement, organizations can ensure that sensitive operations are always verified using the strongest possible authentication methods.

Identity is now the control plane, and enabling MFA is the single most crucial step organizations can take to secure their users. Privileged identities require stricter controls, as they are more vulnerable to identity-related attacks that can compromise information, disrupt operations, and cause reputational damage. Therefore, it is crucial to implement solutions that can securely manage and monitor privileged access across the digital estate. 

With Azure PIM, Conditional Access Authentication Context and Authentication Strengths, organizations can secure privilege elevation by providing JIT access and enforce MFA to activate any privileged role using YubiKeys.

For additional information on Privileged Access Management and what it means for your business, check out our page here. For a step-by-step setup of how to get the Azure PIM solution enabled with your YubiKey, watch our video below.

Talk to our teamTalk to our team

Share this article:


  • CEO Corner: Entering the second half of 2025 with momentumAs we continue to move further into the second half of 2025, I want to share a look back at our journey so far this year and as well as lay out Yubico’s strategic path ahead.  Resurgence in order growth and key segment wins While net sales declined for Q2, the end of the quarter […]Read moreCEOCEO CornerEarningsMattias Danielsson
  • Survey says: Your dog’s name isn’t a passwordWe all know we should be protecting our digital lives, but what are Americans actually doing? Yubico recently commissioned a survey, conducted by Talker Research, which asked 5,000 Americans in 10 major metro cities across the U.S. about their online security habits. Here’s a closer look at what they found (hint: they’re not as secure as they […]Read moreCompany Newssurvey
  • Passkeys are winning, but security leaders must raise the barPasswords are on their way out. In their place is a new form of login called passkeys that promises stronger security and less frustration. All passkeys offer the rare combination of improved usability and stronger security, especially when compared to passwords alone. But unless we act now, millions could be left more vulnerable than ever. […]Read moreDevice-bound passkeysHardware passkeypasskeyssynced passkeys
  • Your top YubiKey questions, answeredOver the 10+ years I’ve been at Yubico, I’ve had the pleasure of meeting customers, partners and many others talking about digital security. While every conversation is different, I am often asked many of the same questions about YubiKeys. One thing remains consistent: many people know they need better security, but they’re not sure what […]Read moreFAQYubiKey