

Policies related to passwordless credentials are now in MSGraph V1. In the portal, you also can now see and delete passwordless methods on the User blade, for example revoking a FIDO2 Security Key registration if the user has lost it. We’ve merged management of credentials in the Microsoft Authenticator app so that an admin can set one policy for both passwordless and standard push multi-factor authentication.

In this space, you’ll continue to see more credentials added to the Authentication Methods blade both in the Azure Portal and via Microsoft Graph, to access and manage authentication methods policies and user credentials for your organization. These policies provide IT admins with more granular control of authentication methods usage within their organizations. This time limited passcode ties the onboarding and recovery story of passwordless together for an end-to-end passwordless experience from day one.Īuthentication methods policies form the foundation of our passwordless story.

One of the most impactful updates is the new Temporary Access Pass, now in public preview. Thanks in large part to the feedback we’ve received since we launched public preview in July 2019, we added a fleet of new features to improve the management and usability of these credentials, including Authentication methods management, step-up authentication, and passwordless APIs. Users get a familiar, simple to use authentication experience that offers industry best security and works across an increasingly broad set of devices and services. This is a major milestone in Microsoft’s strategy to encourage all our users and organizations to go passwordless! Now organizations can rollout passwordless authentication across their hybrid environments at scale. Today we’re announcing our passwordless solution is now generally available! Last year was a breakthrough year, and the start of the movement to passwordless sign in. Our team has been working hard to make passwords a thing of the past.
