Microsoft Enter Passwords reaches Windows: password-free authentication, physical-resistant and governance for managed, personal and unregistered devices

Published 3 min de lectura 97 reading

Microsoft has announced that, from the end of April and with general availability planned for mid-June 2026, it will deploy support for passkeys for password-free and phishing-resistant authentication in Microsoft-protected resources Enter from Windows devices. This measure extends passwordless authentication not only to managed devices, but also to personal and shared devices not registered or not linked to Entre, which represents a major change in Microsoft's business platform access strategy.

The implementation uses FIDO2 credentials linked to the device and stored in the safe container of Windows Hello; users authenticate with local methods such as facial recognition, footprint or PIN. According to Microsoft, you're credentials never leave the device, so they cannot be intercepted during phishing attacks or by traditional techniques of credentials theft, which raises the barrier against recent waves of campaigns that pointed to SSO accounts from Entre with stolen credentials.

Microsoft Enter Passwords reaches Windows: password-free authentication, physical-resistant and governance for managed, personal and unregistered devices
Image generated with IA.

From the point of view of administration and governance, Entre will be able to control deployment through the policies of Authentication Methods and Conditional Access; i.e., administrators may decide in which scenarios and for which groups the use of passwords is enabled, and apply exceptions or restrictions depending on the condition of the device and the risk of access. This facilitates the incremental and targeted adoption of technology without indiscriminately exposing all access.

The main technical gain is the reduction of the dependence on traditional passwords and MFAs that are based on reusable or phishing-susceptible factors. However, applying passwords does not eliminate all risks: security now also depends on the integrity of the local device and how registration and re-establishment flows are managed. Companies should evaluate complementary attack vectors, such as device engagement by malware or social engineering directed during the registration of a passkey.

I recommend that security and IT officials include this change in their identity road map: Enable and test Passwords into a pilot group, update or create Conditional Access policies that include personal and shared devices, require MFA registration where appropriate, and document recovery flows that do not rely on passwords only. It is key to implement authentication and alert monitoring to detect abnormal attempts during and after deployment.

Microsoft Enter Passwords reaches Windows: password-free authentication, physical-resistant and governance for managed, personal and unregistered devices
Image generated with IA.

Equally important is user training: explain what a passkey is, how Windows Hello is used to authenticate and what the procedure is in case of loss or theft of the device. From a continuity perspective, it is appropriate to offer authorized alternatives (e.g., managed hardware keys or Microsoft Authenticator) and restoration tests to avoid mass blockages.

The arrival of Entre passwords on Windows is consistent with wider sector initiatives to abandon passwords: organisms and standards such as the FIDO Alliance promote the use of public keys and safe devices, and suppliers and technical guides explain the practical benefits of passwords (e.g. this technical introduction of Cloudflare: Passkeys - Cloudflare). Microsoft has also framed similar actions within its Secure Future Initiative, which seeks to boost measures such as compulsory MFA in certain scenarios and transition to password-free accounts.

In conclusion, the extension of passwords to unmanaged Windows devices closes an important operational gap and reduces the attack surface linked to passwords, but is not a panacea. Safe adoption requires planning, risk-based access controls, preparation of recovery processes and continuous monitoring. Organizations that address these points will be able to significantly improve their identity position while migrating in a controlled manner towards a phishing-resistant passwordless model.

Coverage

Related

More news on the same subject.