A blog website to…

Build. Secure. Automate.

Platform, Security, Workplace

Security

Passkeys vs Security Keys: Choosing the right phishing-resistant authentication in Azure

Passkeys vs Security Keys: Choosing the right phishing-resistant authentication in Azure

Passwords are slowly disappearing and honestly, they should. For years, organizations relied on passwords combined with MFA apps or SMS codes. While that was a step forward, attackers adapted quickly with phishing kits, MFA fatigue attacks, and session hijacking. The security industry’s response has been clear: move to phishing-resistant authentication in Azure. Two technologies lead that shift today: Passkeys and Security Keys. Both build on FIDO standards, both remove passwords, and Entra ID supports both. But they serve slightly different purposes. Understanding when to use each, especially across different user roles, can make the difference between a smooth rollout and a frustrating one.

Traditional authentication relies on something users know—a password. The problem is that attackers can phish, reuse, leak, or brute-force passwords. Phishing-resistant authentication changes the model entirely. Instead of secrets that can be stolen, authentication uses cryptographic keys stored on a device. The private key never leaves the device, and authentication only works with the legitimate service. That’s where Passkeys and Security Keys come in.

Passkeys are the most user-friendly implementation of FIDO authentication. They rely on the device you already use your phone, laptop, or tablet. When a user signs in, authentication happens using biometrics or a device PIN. Behind the scenes, the device uses a cryptographic key to confirm identity. Typical examples include: Face ID, Windows Hello, Touch ID, Android biometrics

Instead of typing a password, users simply unlock their device. Why passkeys work so well for end users? Passkeys remove nearly all friction from authentication: No passwords to remember, No codes to type, Resistant to phishing attacks, Built into modern devices

When a passkey is created a private key is stored securely on the user’s device and the public key is stored by the service (for example Microsoft Entra ID). During login, the device signs a challenge with the private key. The service verifies the signature with the stored public key. Because the authentication is tied to the origin of the website or application, passkeys cannot be used on phishing sites.  Passkeys typically fall into two categories:

Synced Passkeys
Cloud providers like Apple iCloud Keychain or Google Password Manager synchronize these passkeys across devices such as Apple iCloud Keychain or Google Password Manager.

Advantages:
Seamless cross-device usage
No additional hardware required
Easier recovery if a device is lost
Trade-offs:
Security partly depends on the cloud ecosystem protecting the passkey.

Device-Bound Passkeys
These passkeys stay on a single device and do not sync across others.

Advantages:
Stronger device control
Better assurance of device identity
Trade-offs:
Harder to recover if the device is lost.

In Entra ID, Entra ID supports passkeys through FIDO2 authentication methods like Windows Hello for Business or platform authenticators. For most organizations, passkeys are the ideal default authentication method for standard users. They are simple, scalable, and require almost no additional hardware.

Security keys are also FIDO-based but use a physical hardware token instead of the built-in device authenticator. Common examples include keys from companies like YubiKey. Users authenticate by inserting the key into a device (USB) or tapping it via NFC. Because the key is physically separate from the device, it offers additional protection against device compromise.

Why security keys matter for administrators? Administrative accounts represent the highest-value targets in an organization, If an attacker compromises an admin account, they can often: Reset user passwords, Create backdoor accounts, Disable security controls, Access sensitive data

Security keys mitigate many of these risks because Authentication requires physical possession of the key, Keys cannot be duplicated and they resist phishing and man-in-the-middle attacks. For privileged accounts, this extra layer of assurance is worth the small inconvenience of carrying a hardware token.

Although both technologies rely on the same FIDO2 standard, their primary difference lies in where the cryptographic key is stored.As this is a public preview, there are some key points to understand:

FeaturePasskeysSecurity Keys
Storage LocationDevice (phone, laptop)External hardware token
User ExperienceSeamlessRequire hardware
CostNo extra costRequire purchasing keys
Security LevelVery StrongExtremely strong
Best forGeneral workforceHigh privileged roles

Think of it like this: Passkeys optimize usability and Security keys optimize assurance. Most organizations benefit from using both, depending on the user role.

A smart deployment of phishing-resistant authentication in Azure should align with identity risk levels. Not every account needs the same level of protection. In Entra ID environments, a common model looks like this for standard users is to use Passkeys with the Microsoft Authenticator Application on Apple iOS or Google Android. The benefits are: No extra hardware required, Very low support overhead and High user adoption.

However, the best way is when it is for new users to make sure that they first enroll into MFA and then switch to Passkeys for an easier transition because at this time its not a good idea to go straight to passkeys due to poor user experience.

Administrators should use FIDO2 Security Keys because Administrative accounts. Attackers constantly target administrative accounts. Hardware-based authentication ensures: Physical possession, Authentication requires physical possession of the key, Phishing attempts fail and Credential replay attacks are impossible. Many organizations even issue two security keys per administrator: Primary key and a Backup key stored securely.

Every Azure tenant should maintain emergency break-glass accounts. These accounts should: Require security keys, Be excluded from conditional access policies and be monitored heavily. They should only be used if normal authentication methods fail.

Technology is rarely the hardest part. The real challenge is getting users comfortable with a new authentication method. Passkeys help enormously here because the experience is so natural, users simply unlock their device. Security keys require a bit more explanation, but administrators typically understand the need for stronger protection. A successful rollout usually includes: Clear user communication, Simple enrollment instructions, Backup authentication methods

The industry is quickly adopting passkeys as the default authentication model across the industry. Major platforms like Apple, Google, and Microsoft have already committed to a passwordless future. Security keys will continue to play an important role for high-risk identities, but for everyday users, passkeys will likely replace passwords entirely. For organizations using Azure, the best approach isn’t choosing one over the other. It’s using both strategically: Passkeys for usability and Security keys for privilege Together, they create a security model that is both strong and practical.

And finally, after decades of password pain, that’s something users might actually enjoy.

nterested in managing passkeys at scale? Read more about Passkey Profiles and synced passkeys in Intune.

Leave a Reply

Your email address will not be published. Required fields are marked *