

Now it’s time to sign-in with the provisioned FIDO2 keys on the Windows 10 device.

Note: As already described by Microsoft and mentioned in this blog post, I’ve seen no activity or changes in “Azure AD Connect” or “Active Directory” during the registration process. Next, we will check the audit logs and properties of the users…Īzure AD’s sign-in logs shows the initial authentication with “Temporary Access Pass” to the “Microsoft Authentication Broker”:Īudit logs of Azure AD gives you an overview about the various steps of the security key registration process: This offers the opportunity to complete the user on-boarding and registration of the FIDO2 security key from the assigned device of the user or any shared device.Īfter the initial sign-in you should start with registering your FIDO2 key as your next step. I’m using the “Web Sign-in” option in Windows 10 to redeem the TAP for the first sign-in. This limitation does not apply to a Temporary Access Pass that can be used more than once. When using a one-time Temporary Access Pass to register a Passwordless method such as FIDO2 or Phone sign-in, the user must complete the registration within 10 minutes of sign-in with the one-time Temporary Access Pass. Important note from the “Limitations” section of the TAP documentation: In my use case, I’ve limited the creation of TAPs to a “user deployment group” and restrict them as “one-time use”:Īfterwards, you should be able to create a TAP for users within this policy as well as delegated Graph API or “ Azure AD Directory Role” permissions are assigned. In the first part of the blog post, you should have already seen the pre-requisites to enable “Temporary Access Pass” (TAP). Attack scenarios on Kerberos (Azure AD-joined device).

Analyzing the original source of unresolved “Device names” by IP address.Consideration of detections by “Microsoft Defender for Identity”.Monitoring of sign-in events to Active Directory.

Authentication to Active Directory and On-Premises Resources.VPN connectivity to on-premises network.Monitoring of sign-in events to cloud resources.Authentication to Azure AD-integrated apps and resources.
