{"id":15949,"date":"2026-04-16T02:03:01","date_gmt":"2026-04-15T17:03:01","guid":{"rendered":"https:\/\/m365jp.net\/?p=15949"},"modified":"2026-04-16T02:06:24","modified_gmt":"2026-04-15T17:06:24","slug":"mc1221452-updatemicrosoft-entra-id-general-availability-of-passkey-profiles-and-migration-for-existing-passkeys-fido2-tenants-2","status":"publish","type":"post","link":"https:\/\/m365jp.net\/index.php\/2026-04-16-mc1221452-updatemicrosoft-entra-id-general-availability-of-passkey-profiles-and-migration-for-existing-passkeys-fido2-tenants-2","title":{"rendered":"MC1221452 | (Update)Microsoft Entra ID: General Availability of passkey profiles and migration for existing Passkeys (FIDO2) tenants"},"content":{"rendered":"<div class=\"postie-post\">\n<div>\n<hr>\n<table id=\"section\">\n<tbody>\n<tr>\n<th width=\"95%\">MC1221452 | (Update)Microsoft Entra ID: General Availability of passkey profiles and migration for existing Passkeys (FIDO2) tenants<\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr>\n<table id=\"data\">\n<tbody>\n<tr>\n<th>Classification<\/th>\n<td>planForChange<\/td>\n<\/tr>\n<tr>\n<th>Last Updated<\/th>\n<td>04\/15\/2026 16:21:22<\/td>\n<\/tr>\n<tr>\n<th>Start Time<\/th>\n<td>01\/23\/2026 00:54:46<\/td>\n<\/tr>\n<tr>\n<th>End Time<\/th>\n<td>10\/05\/2026 07:00:00<\/td>\n<\/tr>\n<tr>\n<th>Message Content<\/th>\n<td>\n<p>Updated April 15, 2026: We have updated the content. Thank you for your patience.<\/p>\n<p><b>[Introduction]<\/b><\/p>\n<p>Starting in <b>March 2026<\/b>, Microsoft Entra ID will introduce <b>passkey profiles  <\/b>and <b>synced passkeys<\/b> to General Availability (GA). This update allows administrators to opt in to a new passkey profiles experience that supports group-based passkey configurations and introduces a new  <b>passkeyType<\/b> property.<\/p>\n<p><b>Important:<\/b> Only tenants that <b>already have Passkeys (FIDO2) enabled<\/b> are affected by this update.&nbsp;<\/p>\n<p>  <\/p>\n<p>  <\/p>\n<p>  <\/p>\n<p>The <b>passkeyType<\/b>&nbsp;property enables admins to configure:<\/p>\n<ul>\n<li>Device-bound passkeys<\/li>\n<li>Synced passkeys<\/li>\n<li>Both<\/li>\n<\/ul>\n<p>If your tenant already has Passkeys (FIDO2) enabled and you do not opt in to passkey profiles during the initial rollout window, your tenant will be automatically migrated to the passkey profiles schema at the date range specified below. When this occurs:&nbsp;<\/p>\n<ul>\n<li>Existing Passkey (FIDO2) authentication method configurations will be moved into a  <b>Default passkey profile.<\/b>&nbsp;<\/li>\n<li>The <b>passkeyType<\/b> value will be set based on the tenant\u2019s current attestation settings. Synced passkeys will be enabled for tenants with attestation enforcement disabled.&nbsp;<\/li>\n<li>No new authentication methods are enabled as part of this migration.&nbsp;<\/li>\n<li>This migration also impacts Authentication methods registration campaign set to \u201cMicrosoft managed\u201d state, which uses passkey configuration settings to determine which registration prompts are shown to users.<\/li>\n<\/ul>\n<p><b>Authentication Methods Registration Campaign changes (Microsoft-Managed Only)<\/b><\/p>\n<p>Tenants are impacted when all the following conditions are met:<\/p>\n<ul>\n<li>The Passkeys (FIDO2) authentication method policy is Enabled<\/li>\n<li>Authentication methods registration campaign is set to \u201cMicrosoft managed\u201d state<\/li>\n<li>Allow self-service setup is Enabled<\/li>\n<li>Target specific AAGUIDs is not selected (no AAGUID restrictions configured)<\/li>\n<li>The Authentication Methods Registration Campaign state is set to Microsoft-managed<\/li>\n<li>The tenant has at least one user enabled for <b>both<\/b> synced passkeys and device\u2011bound passkeys\n<ul>\n<li>Only users who are&nbsp;enabled for both synced passkeys&nbsp;and&nbsp;device\u2011bound&nbsp;passkeys, with no&nbsp;passkey profile restrictions&nbsp;configured&nbsp;(i.e.&nbsp;attestation enforcement, AAGUID restrictions), will receive a passkey registration nudge during&nbsp;sign\u2011in.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>For these tenants, Microsoft-managed registration campaign settings will be updated after passkey profile automatic migration is complete. We will roll out changes incrementally to in-scope tenants according to the timeline outlined below.&nbsp;<\/p>\n<p><b>[When this will happen]<\/b><\/p>\n<p><b>Passkey profile and Synced passkeys General Availability<\/b><\/p>\n<ul>\n<li><b>Public cloud Worldwide:<\/b> Rollout begins in early March 2026 and is expected to complete by late March 2026&nbsp;<\/li>\n<li><b>GCC, GCC High, DoD clouds:<\/b> Rollout begins in early May 2026 and is expected to complete by late May 2026&nbsp;<\/li>\n<li><b>USNat, USSec:<\/b> Rollout begins in early July 2026 and is expected to complete by late July 2026&nbsp;<\/li>\n<\/ul>\n<p><b>Automatic migration for existing passkeys (FIDO2) enabled tenants<\/b><\/p>\n<ul>\n<li><b>Public cloud Worldwide: <\/b>Rollout begins in early May 2026 and is expected to complete by late June 2026<\/li>\n<li><b>GCC, GCC High, DoD clouds: <\/b>Rollout begins in early August 2026 and is expected to complete by late August 2026<\/li>\n<li><b>USNat, USSec<\/b>: Rollout begins in early August 2026 and is expected to complete by late August 2026<\/li>\n<\/ul>\n<p><b>Authentication Methods registration campaign changes in Microsoft-Managed state (for in-scope tenants):<\/b><\/p>\n<ul>\n<li><b>Public cloud Worldwide: <\/b>Rollout begins in early May 2026 and is expected to complete by late June 2026&nbsp;<\/li>\n<p>  <\/ul>\n<p>  <\/p>\n<p><b>[How this affects your organization]<\/b><\/p>\n<p>  <\/p>\n<p><b>Automatic migration for existing passkeys (FIDO2) enabled tenants&nbsp;<\/b><\/p>\n<p><i>What will happen:<\/i><\/p>\n<p>If you have not opted in to passkey profiles by your automatic enablement period, your tenant will be migrated to passkey profiles.<\/p>\n<p>  <\/p>\n<ul>  <\/p>\n<li>Your existing Passkey (FIDO2) configurations will be migrated into a <b>Default passkey profile<\/b><\/li>\n<li>New <b>passkeyType <\/b>property will be auto-populated\n<ul>\n<li>If <b>enforce attestation <\/b>is <b>enabled<\/b>, then device-bound allowed<\/li>\n<li>If <b>enforce attestation <\/b>is <b>disabled<\/b>, then device-bound and synced allowed<\/li>\n<\/ul>\n<\/li>\n<li>Any existing <b>key restrictions <\/b>will remain intact<\/li>\n<li>Any existing <b>user targets <\/b>will be assigned to the <b>Default passkey profile<\/b><\/li>\n<\/ul>\n<p><b>Authentication Methods registration campaign changes in Microsoft-Managed state (for in-scope tenants)&nbsp;&nbsp;<\/b><\/p>\n<p><i>What will happen:<\/i><\/p>\n<p>Microsoft-managed registration campaign settings will be updated:&nbsp;<\/p>\n<ul>\n<li>&#8220;Targeted authentication method\u201d will change from Microsoft Authenticator to \u201cpasskeys (FIDO2)\u201d.&nbsp;<\/li>\n<li>\u201cDays allowed to snooze\u201d setting will change from 3days to \u201c1 day\u201d. This setting will no longer be configurable.&nbsp;<\/li>\n<li>\u201cLimited number of snoozes\u201d setting will change from Enabled to &#8220;Disabled\u201d. This setting will no longer be configurable.&nbsp;<\/li>\n<li>The default user targeting will be updated from voice call or text message users to all multifactor authentication (MFA) capable users.&nbsp;&nbsp;<\/li>\n<\/ul>\n<p>What is the end user impact:&nbsp;<\/p>\n<p>Once the above changes have taken effect, users targeted in the registration campaign will begin to receive passkey registration nudges during sign-in flows after they have completed multifactor authentication.&nbsp;<\/p>\n<ul>  <\/ul>\n<p><b>[What you can do to prepare]<\/b><\/p>\n<p>If you want a configuration different from the migration defaults, review the timeline above and opt in to passkey profiles  <b>before your tenant\u2019s automatic enablement window begins<\/b>. Then configure the Default passkey profile\u2019s<b> passkeyType<\/b> to your preferred values.<\/p>\n<p>We also recommend:<\/p>\n<ul>\n<li>Review your <b>registration campaign <\/b>configuration,<b> especially if its set to Microsoft-managed<\/b>. If you do not want registration campaign to target passkeys, you can:&nbsp;\n<ul>\n<li>Switch the registration campaign state to<b><i> Enabled<\/i><\/b> and continue targeting Microsoft Authenticator, or&nbsp;<\/li>\n<li>Set the registration campaign state to <b><i>Disabled<\/i><\/b>.<\/li>\n<\/ul>\n<\/li>\n<li>Update runbooks and help content so your help desk and end users understand any changes in passkey availability or behavior.&nbsp;<\/li>\n<\/ul>\n<p>Learn more:<\/p>\n<ul>\n<li><a href=\"https:\/\/learn.microsoft.com\/entra\/identity\/authentication\/how-to-enable-passkey-fido2#enable-passkey-fido2-authentication-method\">Enable passkeys for your organization &#8211; Microsoft Entra ID | Microsoft Learn<\/a>&nbsp;<\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/entra\/identity\/authentication\/how-to-authentication-passkey-profiles\" target=\"_blank\">How to Enable Passkey (FIDO2) Profiles in Microsoft Entra ID (preview) &#8211; Microsoft Entra ID | Microsoft Learn<\/a><\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/entra\/identity\/authentication\/how-to-authentication-synced-passkeys\" target=\"_blank\">How to Enable Synced Passkeys (FIDO2) in Microsoft Entra ID (preview) &#8211; Microsoft Entra ID | Microsoft Learn<\/a><\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/entra\/identity\/authentication\/synced-passkey-faq\" target=\"_blank\">Synced passkeys FAQ &#8211; Microsoft Entra ID | Microsoft Learn<\/a><\/li>\n<\/ul>\n<p>  <\/p>\n<p><b>[Compliance considerations]<\/b><\/p>\n<p>  <\/p>\n<p>No compliance considerations identified. Review as appropriate for your organization.<\/p>\n<p>  <\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>MC1221452 | (Update)Microsoft Entra ID: General Availability of passkey profiles and migration for existing Pa [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15949","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts\/15949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/comments?post=15949"}],"version-history":[{"count":0,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts\/15949\/revisions"}],"wp:attachment":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/media?parent=15949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/categories?post=15949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/tags?post=15949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}