Experimenting with FIDO2 Key with Azure Active Directory

1 minute read

I have always wanted to experiment with FIDO2 key with Azure Active Directory and I recently stumbled upon an affordable FIDO2 key on Amazon for $25 with next day delivery.
It is called HyperFIDO Pro Titanium and made by a company called Hypersecu. Researching on their website and I discovered that HyperFIDO Pro is Microsoft approced and AAD ready. So I cant resist but to buy it. Here’s the product link HyperFido Titanium Pro.

Let’s have fun!

Navigate to Azure Active Directory

Head down to Security > Authentication Methods > Policies

Enable FIDO2 Security Key

That’s it! And now you are ready to register the key by going to MFA Setup.

Click Add Sign-in method and select Security Key

Select the device accordingly, in my case here it’s USB Device

Ready your key, remove it from the packaging!

It passes it to Windows Security

Some warning.

Supply PIN numbers to protect the key

Touch your security key

Give it a name

Congrats! You’ve done it!

Now let’s test the key on an Incognito/Private web browser window and navigate to Azure Portal.
Then instead of typing your login email address as you normally would, go and click Sign-in options

Select Sign in with Windows Hello or a security key

That’s it for the web use.
However, you can take it further by allowing your AAD joined and Hybrid AAD joined devices to use the same security key to sign in to the computer. Essentially you go to Microsoft Endpoint Manager Admin Centre and create a configuration profile > Windows 10 and later > Templates > Identity Protection > enable Use security keys for sign-in.

Wait for the configuration to come down, you may need to restart your computer before the option becomes available.

Well done you!

Updated: