Your Entra ID Passkeys May Have Changed Automatically: What to Check After the 2026 Migration

Azure & Entra ID · Passwordless · Authentication · 2026
Passkey profiles reached GA in Entra ID in March 2026. If your tenant already had FIDO2 enabled, Microsoft may have migrated your configuration automatically. Here is what changed and what to review now.
🔑 Only affects tenants with FIDO2 already enabled 📋 MC1221452 ⚠️ Registration campaign defaults changed

Microsoft Entra ID passkey profiles reached General Availability in March 2026. The change replaced the existing flat Passkey (FIDO2) authentication method configuration with a profile-based model that supports group-level targeting, a new passkeyType property, and explicit control over device-bound versus synced passkeys.

For tenants that had Passkeys (FIDO2) already enabled and did not manually opt in to passkey profiles before the automatic migration window, Microsoft migrated the existing configuration into a Default passkey profile — starting in April 2026. The migration preserves existing user targeting and key restrictions, but the defaults applied may not match the security posture you intended, particularly around synced passkeys and registration campaign behaviour.

This article covers what changed, which tenants are affected, what the migration did to your configuration, and the specific settings to review and adjust now that passkey profiles are active.

⚠️
Only tenants with Passkeys (FIDO2) already enabled are affected by the automatic migration. If your tenant had the Passkey (FIDO2) authentication method disabled, no automatic migration occurred. You can still opt in to passkey profiles manually at any time. Check Message Center post MC1221452 for the official communication and current rollout status for your tenant.
1
Passkey profiles replace the flat FIDO2 policy. The old model was a single tenant-wide configuration. Passkey profiles allow different settings for different groups — admins can have stricter requirements (device-bound only, attestation enforced) while standard users can have broader access (synced passkeys allowed). This is the main architectural improvement.
2
The passkeyType property is new and critical. It controls whether users can register device-bound passkeys, synced passkeys, or both. The value assigned during auto-migration depends on your attestation settings at the time of migration — not a choice you explicitly made. Review it.
3
Registration campaign defaults changed for Microsoft-managed tenants. If your registration campaign was set to Microsoft-managed, the target authentication method shifted from Microsoft Authenticator to passkeys (FIDO2), the snooze period changed from 3 days to 1 day (no longer configurable), and user targeting expanded from voice/SMS users to all MFA-capable users. Users may have started seeing unexpected prompts.
4
What the migration preserved — and what it changed. Automatic migration preserved existing user targeting and AAGUID restrictions. But it introduced passkeyType defaults that may have changed passkey behaviour in your tenant — particularly whether synced passkeys are now allowed — without requiring any admin action.

Timeline — what happened and when

  • Early March 2026
    GA rollout begins — worldwidePasskey profiles and synced passkeys reach General Availability. Admins can opt in to passkey profiles manually. Existing FIDO2 configurations remain unchanged until the automatic migration window.
  • Late March 2026
    GA rollout complete — worldwideAll worldwide commercial tenants have access to passkey profiles. Opt-in still voluntary.
  • Early April 2026
    Automatic migration begins — worldwideTenants with Passkeys (FIDO2) enabled that have not opted in are automatically migrated to passkey profiles. Existing FIDO2 settings migrate to a Default passkey profile. Registration campaign changes apply to Microsoft-managed tenants.
  • Late May 2026
    Automatic migration complete — worldwideAll affected worldwide commercial tenants are now using passkey profiles.
  • April–June 2026
    GCC / GCC High / DoDGA begins in early April 2026. Automatic migration begins in early June 2026 and completes late June 2026.
📋
Always verify rollout and completion dates against your tenant's Message Center posts — dates and phases may have been updated since the original MC1221452 communication.

Device-bound vs synced passkeys — what the distinction means

The passkeyType property introduced with passkey profiles makes the distinction between these two models explicit and configurable. Understanding the difference matters for choosing the right profile settings.

Higher security
Device-bound passkeys
Private key created and stored on a single physical device — never leaves it
Examples: FIDO2 hardware security keys (YubiKey, etc.), Microsoft Authenticator with device-bound configuration
User must register each device separately
Cannot be exported, cloned, or synced — loss of the device means re-registration
Supports attestation — Microsoft can verify the key type and model
Recommended for privileged accounts, admins, and highly regulated environments
Phishing-resistant · MFA-capable
Higher convenience
Synced passkeys
Private key stored in a cloud provider (Apple iCloud Keychain, Google Password Manager) and synchronised across the user's devices
Register once, sign in from any device where the passkey syncs
By design, the key can be exported and moved — cross-device availability is the feature
Does not support attestation — Entra ID cannot verify the underlying security of the storage
Suitable for standard users who need cross-device access
Requires careful Conditional Access design if device compliance is enforced
Phishing-resistant · More convenient
💡
Both types are phishing-resistant and a significant upgrade over password-based MFA. The choice between device-bound and synced is about the trade-off between security rigidity and operational flexibility — not between secure and insecure. Microsoft's own data shows synced passkeys have a 99% successful registration rate and are 14× faster than password + MFA combinations. The correct choice depends on the user population and your organisation's risk posture.

What the automatic migration changed in your tenant

If your tenant was automatically migrated, here is exactly what happened to each part of your configuration.

Setting
Before migration
After migration
Configuration model
Flat tenant-wide Passkey (FIDO2) policy
Default passkey profile (profile-based)
User targeting
Existing group targeting preserved
Migrated to Default profile — unchanged
Key restrictions (AAGUID)
Existing restrictions preserved
Migrated to Default profile — unchanged
passkeyType — attestation ON
n/a (property did not exist)
Set to device-bound only
passkeyType — attestation OFF
n/a (property did not exist)
Set to both device-bound and synced
Registration campaign target (MS-managed)
Microsoft Authenticator
Passkeys (FIDO2)
Registration campaign snooze (MS-managed)
3 days (configurable)
1 day (no longer configurable)
Limited snoozes (MS-managed)
Enabled (configurable)
Disabled (no longer configurable)
Campaign user targeting (MS-managed)
Voice call or text message users
All MFA-capable users
🔴
If your attestation was not enforced, synced passkeys are now enabled. This means users whose tenant was migrated with attestation off will have passkeyType set to allow both device-bound and synced passkeys. If your security policy requires device-bound only — hardware keys, no cloud-synced passkeys — you need to update the Default passkey profile explicitly. The migration did not change your attestation setting, but it did set passkeyType based on it.

What to review now

Most tenants only need to review a handful of settings — but those settings matter. The three areas below cover the changes most likely to have an operational impact.

1 — Check passkeyType in your Default passkey profile

Navigate to Entra admin center → Protection → Authentication methods → Passkeys (FIDO2) → Passkey profiles. Open the Default passkey profile and check the passkeyType setting. Confirm it matches your intended security posture: device-bound only, synced only, or both. If the value does not match your intent, update it now — this is the most operationally important review item.

2 — Check your registration campaign if it was Microsoft-managed

If your registration campaign was in Microsoft-managed state, verify whether users have started receiving passkey registration prompts. Check the Authentication methods activity report for a spike in passkey registrations. If you want to control the rollout more carefully — targeting only specific groups or continuing to push Authenticator — switch the campaign from Microsoft-managed to Enabled state and configure the target explicitly.

3 — Review Conditional Access policies that reference authentication strength

Passkey profiles change the underlying FIDO2 configuration schema. If you have Conditional Access policies that enforce phishing-resistant MFA or specific authentication strengths, verify they still evaluate correctly after the migration. Pay particular attention to policies that require compliant or managed devices — synced passkeys enabled on personal devices can create authentication failures if those devices are not compliant.


Configure passkey profiles — beyond the Default

The Default passkey profile covers all users not targeted by a custom profile. For most organisations, creating at least one additional profile for privileged accounts is worth doing now that the profile-based model is in place.

1
Create a separate profile for privileged accounts
Entra admin center → Protection → Authentication methods → Passkeys (FIDO2) → Passkey profiles → + Create profile. Set passkeyType to Device-bound only, enable attestation enforcement, and restrict AAGUIDs to approved hardware key models. Assign to Global Admins, Privileged Role Admins, and Security Admins. Privileged accounts should not use synced passkeys from cloud providers.
2
Update the Default profile for standard users
For standard users, allowing both device-bound and synced is typically appropriate. If you want to restrict which cloud passkey providers are accepted — for example, Apple or Google but not arbitrary password managers — configure AAGUID restrictions in the Default profile without blocking synced passkeys entirely.
3
Control the registration campaign
Change the campaign from Microsoft-managed to Enabled if you need explicit control over which users are targeted and which authentication method is promoted. If you want to continue pushing Microsoft Authenticator before rolling out passkeys more broadly, set the target method to Authenticator in the Enabled campaign.
4
Enforce passkey sign-in for sensitive resources via Conditional Access
Create a Conditional Access policy with Authentication strength → Phishing-resistant MFA and assign it to high-value applications. Passkeys satisfy this requirement without additional configuration — both device-bound and synced passkeys qualify as phishing-resistant.

Conditional Access — what to verify

Passkey profiles change the FIDO2 configuration schema but are designed to be backwards-compatible with Conditional Access. There are two scenarios worth explicitly verifying.

⚠️
Synced passkeys + device compliance policies. If you have a Conditional Access policy that requires a compliant or Hybrid Azure AD joined device, and a user has a synced passkey on a personal device (not enrolled in Intune), the passkey authentication may succeed but the device compliance check will fail. The user gets a passkey prompt — which works — and then a device compliance block. This creates a confusing experience. Review policies that combine authentication strength with device compliance and determine whether the user population now includes personal devices with synced passkeys. This is not a passkey failure — it is a policy design mismatch.
💡
AAGUID-based restrictions without attestation have limits. If you configure AAGUID restrictions in a passkey profile to allow only specific hardware keys, but do not enforce attestation, an attacker who has compromised an account could register a passkey claiming to be an approved key model by spoofing the AAGUID. AAGUID restrictions are effective for limiting what ordinary users can register, but should be combined with attestation enforcement for privileged accounts where this risk is material.

Review checklist

  • Confirm whether your tenant was auto-migratedCheck Message Center for MC1221452 and review whether Passkeys (FIDO2) was enabled in your tenant before March 2026. If it was enabled, your tenant was migrated. Navigate to Entra admin center → Protection → Authentication methods → Passkeys (FIDO2) and confirm passkey profiles are now active.
  • Review passkeyType in the Default passkey profileOpen the Default passkey profile and check the passkeyType setting. If your attestation was not enforced at migration time, passkeyType will be set to allow both synced and device-bound. Confirm this matches your intended posture — if you require device-bound only, update the profile now.
  • Check registration campaign state and targetIf your campaign was Microsoft-managed, verify whether the target authentication method has shifted to passkeys (FIDO2) and whether the broader user targeting has caused unexpected registration prompts. Switch to Enabled state if you need explicit control over rollout scope and timing.
  • Create a separate profile for privileged accounts with device-bound onlyCreate a custom passkey profile with passkeyType set to device-bound only, attestation enforced, and AAGUID restrictions for approved hardware key models. Assign it to Global Admins, Privileged Role Admins, and other high-value accounts.
  • Verify Conditional Access policies that reference authentication strengthTest that phishing-resistant MFA or FIDO2-specific CA policies still evaluate correctly after the migration. Particularly check policies that combine authentication strength with device compliance requirements.
  • Review synced passkey behaviour against device compliance policiesIf synced passkeys are now enabled (passkeyType allows both), identify whether users can authenticate from personal devices where the passkey syncs. If your CA policies require device compliance, determine whether this creates an authentication path that then hits a compliance block.
  • Update helpdesk runbooks and user communicationsIf the registration campaign now targets a broader user group, helpdesk may receive tickets about unexpected passkey registration prompts. Brief the support team on what passkeys are, why users are seeing prompts, and how to assist with registration. Update any user-facing documentation that references MFA methods.
  • Review authentication methods activity report for anomaliesEntra admin center → Protection → Authentication methods → Activity. Check for spikes in passkey registrations around the migration window and confirm the registrations look legitimate — expected users, expected locations. Flag unexpected registration patterns for investigation.
  • Document your intended passkey posture for standard users vs privileged accountsThis is the central architectural decision: which users get device-bound only, which get synced allowed, and which hardware models are approved. Document it explicitly so the configuration can be reviewed, updated, and handed over without ambiguity. Passkey profile settings are easy to change — the posture decision behind them should not be implicit.

Get in touch
Questions about passkey configuration in Entra ID?
If you are reviewing an Entra ID tenant after the March/April 2026 passkey changes, or deciding between device-bound and synced passkeys for different user populations, get in touch.
Next
Next

Why Traditional MFA Fails: Enforcing Phishing-Resistant Access with Entra ID & Conditional Access