Microsoft Entra ID (Azure AD) adds FIDO2 support on iOS and Conditional Access Authentication Strengths now generally available

In an effort to protect the nation’s infrastructure and improve cybersecurity, the Executive Order 14028 and the Office of Management and Budget Memo M-22-09 took a strong stance to require phishing-resistant authentication for all federal agencies. The M-22-09 memo also specifies two standards-based authentication protocols that will satisfy the phishing-resistant requirements, FIDO2/WebAuthn and PIV smart cards.  

In the Microsoft ecosystem, PIV smart cards have long been supported for desktop systems on Windows and macOS. Recently, the company announced a great win for government agencies and organizations already using smart cards by expanding support for PIV smart cards on mobile devices using YubiKeys. 

If you read Joe Scalone’s take on FIDO2 for the federal government, you may be asking about the Microsoft customers that don’t have the PKI infrastructure to support smart card issuance, or for government users that are not PIV eligible. Or, about customers that are wanting to move to more modern FIDO2 based authentication and need to have support on mobile devices. These are great questions.

Entra ID (Azure AD) has supported the use of YubiKeys for FIDO2 passwordless sign-in since 2021, and customers have been waiting ever since to sign-in with their YubiKey from their mobile devices. Now, the tide is beginning to change. Microsoft recently announced General Availability for using FIDO2 security keys with Safari, and this new support goes beyond desktops and includes iPhones and iPads. 

Now users can sign-in to any Entra ID protected web application on their iPhone or iPad using any of the supported browsers. This is what it looks like when you sign-in to office.com on an iPhone with a YubiKey 5Ci.

1. Open Safari and go to office.com2. Select Sign-in options3. Select Sign-in with a security key4. Select Security key or simply touch the YubiKey if it’s already plugged in.
5. Insert and touch the YubiKey6. Enter the YubiKey PIN7. Touch the YubiKey again8. You are signed in!

                             
Conditional Access Policy Authentication Strengths

By now, every organization should be well on their way to a passwordless and Zero Trust journey. With support for mobile, organizations can now get a step further in their journey.

Conditional Access Policy Authentication Strengths was also announced by Microsoft this spring, allowing customers the flexibility to require PIV or FIDO2 everywhere except for the edge-cases where the protocols aren’t supported yet. This enables organizations to get closer and closer to a modern passwordless end-state where end-users are no longer allowed to use phishable authentication methods when accessing applications. 

These Conditional Access Policies are powerful and flexible. With authentication strengths, organizations will be able to enable:

  • Out-of-the-box policies that require phishing-resistant authentication including enforcing:
  • Custom policies that require FIDO2 security keys, including enforcing:
    • Users use any FIDO2 security keys like YubiKeys to access the environment.
    • Users use specific YubiKey 5 FIPS series or other models by specifying the exact AAGUIDs. AAGUIDs are the IDs that FIDO2 security key vendors use to uniquely identify their device models. 
  • Custom policies that require certificate-based authentication, including enforcing:
    • Users use YubiKeys as PIV smart cards to access the environment.

Remember how I said it was a journey? Well, native apps don’t support FIDO2 authentication yet on macOS and iOS. And yes, Android does not support FIDO2 authentication yet. Microsoft has committed to deliver these features, but they aren’t here yet. Nevertheless, we celebrate these great milestones and look forward to when organizations can finally get to passwordless everywhere. 

How to get started using YubiKeys with Safari

If your YubiKey does not have a PIN set on it yet, then you will first need to set a PIN since Safari will not support setting the PIN. On iOS, there are not any convenient options to do this. The following steps will use macOS desktop with Yubico Authenticator to set the PIN, but other options exist such as using YubiKey Manager or using Chrome on macOS. 

Set a PIN on macOS.

  1. Install Yubico Authenticator on macOS
  2. Open Yubico Authenticator
  3. Insert the YubiKey
  4. Select WebAuthn and select the Configure YubiKey options in the top-right
  5. Select Set PIN
  6. Set the desired PIN and select Save

A FIDO2 PIN is now set on the YubiKey.  You can now register the YubiKey with Entra ID. You can now register using Safari on your iPhone, iPad or macOS desktop. 

1. Open Safari and go to aka.ms/mysecurityinfo and type in username and select Next.2. Sign-in to your account using an authentication method(s) that is considered multi-factor, here we will use Temporary Access Pass (TAP).
Type in TAP code and select Sign in
3.Select + Add sign-in method
4. Select Security key and continue to follow the prompts
5.Indicate whether you are using NFC or  USB (this also includes Lightning connector)6. Select Security key or simply touch the YubiKey if it is already inserted7. Insert the YubiKey or tap the YubiKey on the back of the phone and type in the PIN8. Scan or insert the YubiKey again and touch it
9. Provide a nickname for the YubiKey and select Next10. Select Done11. Verify the new YubiKey is listed as a new authentication method 

——

For more information on how Yubico and Microsoft work together to help organizations prevent phishing with enforced FIDO and Azure AD CBA and YubiKeys on mobile devices, check out our webinar series here.

Talk to our teamTalk to our team

Share this article:


  • Yubico’s commitment to innovation: Phishing-resistance as a cornerstone for cyber resilienceAs phishing attacks have reached an unprecedented level of frequency and sophistication, enterprises must prioritize authentication that is phishing-resistant – regardless of the business scenario, platform or device users are working with. This is why Yubico prioritizes consistent product innovations that deliver on our customer’s needs for modern, phishing-resistant authentication solutions that enable businesses to […]Read more
  • CEO Corner: Wrapping up a strong year, and looking ahead to 2025 and beyondIt’s no secret that 2024 was a big year of growth for Yubico, highlighted across many notable achievements by our team and increasing demand from our customers. As discussed in my previous post, following a transformative year driven by key cybersecurity trends like passkeys and AI, the year culminated in the significant step of Yubico […]Read moreCEOEarningsMattias Danielsson
  • The rise of AI-driven phishing attacks: What to know and how to be secureAs businesses continue learning the benefits that artificial intelligence (AI) assisted computing tools provide, we’re continuing to see rapid interest and adoption of the technology – especially within the enterprise. Most conversations up until recently have revolved around ChatGPT, but now another new AI-powered large language model tool – DeepSeek – is creating a lot […]Read more
  • Works with YubiKey Spotlight: Expanded partnerships redefining phishing-resistance in 20252024 was an exciting year for Yubico and our partners. Together, we achieved remarkable milestones, launching innovative solutions and forging stronger partnerships – all aimed at delivering the most impactful cybersecurity solutions and user experience for our customers and partners. At the heart of these efforts lies a shared commitment to phishing-resistance.  From registration to […]Read moreWorks with YubiKeywwyk