Microsoft is rolling out two Entra ID changes this spring that take effect automatically.
Passkey profiles move to GA in March. Tenants that do not opt in will be auto-migrated starting in April (through late May for Worldwide, late June for GCC/GCC High/DoD). If attestation is disabled, synced passkeys become allowed by default, meaning credentials can sync via iCloud Keychain and Google Password Manager without an explicit decision to allow synced passkeys.
Conditional Access is closing an enforcement gap starting March 27. Policies targeting "All resources" with resource exclusions will now enforce on sign-ins where apps request only OIDC or limited directory scopes. These flows were previously not being evaluated..
I published a breakdown covering:
• Auto-migration logic and default configuration behavior
• PowerShell scripts to audit your tenant
• A three-profile passkey architecture for role-based separation
• How to identify affected Conditional Access policies
• Key gotchas (silent campaign shifts, retroactive AAGUID removal, destructive preview opt-out)
The post includes links to MC1221452, the Microsoft Tech Community announcement, and the relevant Microsoft Learn documentation.
https://nineliveszerotrust.com/blog/entra-march-2026-passkeys-ca/
#EntraID #Identity #ZeroTrust #Passkeys #ConditionalAccess #CloudSecurity #MFA