Microsoft has announced that, from the end of April and with general availability planned for mid-June 2026, it will deploy support for passkeys for password-free and phishing-resistant authentication in Microsoft-protected resources Enter from Windows devices. This measure extends passwordless authentication not only to managed devices, but also to personal and shared devices not registered or not linked to Entre, which represents a major change in Microsoft's business platform access strategy.
The implementation uses FIDO2 credentials linked to the device and stored in the safe container of Windows Hello; users authenticate with local methods such as facial recognition, footprint or PIN. According to Microsoft, you're credentials never leave the device, so they cannot be intercepted during phishing attacks or by traditional techniques of credentials theft, which raises the barrier against recent waves of campaigns that pointed to SSO accounts from Entre with stolen credentials.

From the point of view of administration and governance, Entre will be able to control deployment through the policies of Authentication Methods and Conditional Access; i.e., administrators may decide in which scenarios and for which groups the use of passwords is enabled, and apply exceptions or restrictions depending on the condition of the device and the risk of access. This facilitates the incremental and targeted adoption of technology without indiscriminately exposing all access.
The main technical gain is the reduction of the dependence on traditional passwords and MFAs that are based on reusable or phishing-susceptible factors. However, applying passwords does not eliminate all risks: security now also depends on the integrity of the local device and how registration and re-establishment flows are managed. Companies should evaluate complementary attack vectors, such as device engagement by malware or social engineering directed during the registration of a passkey.
I recommend that security and IT officials include this change in their identity road map: Enable and test Passwords into a pilot group, update or create Conditional Access policies that include personal and shared devices, require MFA registration where appropriate, and document recovery flows that do not rely on passwords only. It is key to implement authentication and alert monitoring to detect abnormal attempts during and after deployment.

Equally important is user training: explain what a passkey is, how Windows Hello is used to authenticate and what the procedure is in case of loss or theft of the device. From a continuity perspective, it is appropriate to offer authorized alternatives (e.g., managed hardware keys or Microsoft Authenticator) and restoration tests to avoid mass blockages.
The arrival of Entre passwords on Windows is consistent with wider sector initiatives to abandon passwords: organisms and standards such as the FIDO Alliance promote the use of public keys and safe devices, and suppliers and technical guides explain the practical benefits of passwords (e.g. this technical introduction of Cloudflare: Passkeys - Cloudflare). Microsoft has also framed similar actions within its Secure Future Initiative, which seeks to boost measures such as compulsory MFA in certain scenarios and transition to password-free accounts.
In conclusion, the extension of passwords to unmanaged Windows devices closes an important operational gap and reduces the attack surface linked to passwords, but is not a panacea. Safe adoption requires planning, risk-based access controls, preparation of recovery processes and continuous monitoring. Organizations that address these points will be able to significantly improve their identity position while migrating in a controlled manner towards a phishing-resistant passwordless model.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...