Skip to main content
Skip table of contents

Microsoft Entra Passkeys integration

This section provides an overview of the Microsoft Entra Passkeys integration available. It includes steps for configuring the Microsoft Entra connector, passkey registration, and policy management.

Register Microsoft Entra Application

The Veridium Manager Entra Connector requires a registered Microsoft Entra application to call Microsoft Graph APIs securely.

Log in to the Microsoft Entra admin center.

  1. Navigate to:

    • Applications > App registrations > + New registration

  2. Configure the application:

    • Name: Veridium Entra Connector

    • Supported account types: Accounts in this organizational directory only

    • Redirect URI: (Optional – leave blank for service-to-service communication)

  3. Click Register.

After registration, copy the Application ID (clientId) and Directory ID (tenantId). These are required for Veridium Manager configuration.

Add API Permissions for Passkey Management

To allow Veridium to manage passkeys through the Microsoft Graph API, grant the appropriate permissions.

  1. In the app registration, go to API permissions > + Add a permission.

  2. Choose:

    • Microsoft Graph

    • Application permissions

  3. Add the following permission:

  4. Click Add permissions.

  5. Select Grant admin consent for [Tenant Name] to authorize the permission tenant-wide.

UserAuthMethod-Passkey.ReadWrite.All permission allows Veridium to create, read, update, and delete passkey authentication methods for users in the organization.

Application Credentials

Veridium Microsoft Entra connector uses client credentials to authenticate against Microsoft Entra. The credentials may be either Certificate or Client Secret.

Option A: Create a Client Secret

  1. Go to the registered app > Certificates & secrets

  2. Under Client secrets, click + New client secret

  3. Add a description (e.g., Veridium Client Secret)

  4. Select an expiration duration (e.g., 6 or 12 months)

  5. Click Add

  6. Copy the generated value immediately — it will be hidden after you leave the page.

Option B: Upload a Certificate

  1. Generate a certificate from your internal PKI:

    1. Use your internal CA tools (e.g., Microsoft CA, OpenSSL) to generate the certificate.

    2. Export the public key certificate in .cer or .pem format. Private key must never be exposed or shared during this process. It will be uploaded separately on Veridium Manager during Microsoft Entra Connector configuration.

  2. Go to Certificates & secrets > Certificates

  3. Click Upload certificate

  4. Browse and select your certificate file

  5. Click Add

Microsoft recommends that you use certificate credentials instead of client secrets when moving applications to a production environment.
Certificates offer enhanced security because the private key never leaves your infrastructure, whereas client secrets are transmitted during token requests and are prone to leakage or mismanagement.

Configure Microsoft Entra connector

This section of the Veridium Manager allows you to configure integration with Microsoft Entra ID using Microsoft Graph API. It enables secure communication between the Veridium platform and Microsoft services for managing authentication-related tasks.

e8430b8b-c9b2-49a6-9d30-52934d07a6af.png

Field

Description

Enabled

Toggle to enable or disable Microsoft Graph integration.

HTTP Debug Enabled

Optional toggle for verbose HTTP request logging (for troubleshooting).

Client ID*

Application (client) ID from your Entra app registration.

Tenant ID*

Directory (tenant) ID from your Entra app registration.

Client Secret

Secret generated under Certificates & secrets in the Entra app. Used for client authentication unless a certificate is configured.

Client Certificate

Upload a certificate to use for secure, certificate-based authentication.

FIDO2 Creation Options Challenge Timeout (minutes)

Time limit for FIDO2 registration challenge validity. Align this with your security policy.

In production environments, it is strongly recommended to use client certificate credentials instead of client secrets.

Available Actions

  • Validate Certificate: Verifies the uploaded client certificate before you save the configuration.

  • Test Connection: Sends a test request to Microsoft Graph to confirm the settings are working properly.

Enrollment Policy

Once the configuration of Microsoft Entra integration is completed, the Entra Passkey policy may be enabled for the users.

  1. Navigate to Veridium Manager / Orchestrator

  2. From the left panel select Policy

  3. Edit the targeted Policy

  4. Set Entra Passkey to:

    • OPTIONAL — users may skip enrollment

    • TRUE — enrollment is mandatory

image-20250407-113834.png

Enabling Entra Passkey for users not managed in Microsoft Entra, or without a valid connector configuration, will cause enrollment errors in the Veridium Mobile Application.

If the policy is set to TRUE (mandatory), affected users will be unable to complete enrollment.

Enrollment Overview

The Veridium mobile application is a certified FIDO2 Passkey provider, fully integrated with Microsoft Entra ID. As part of Veridium’s enrollment process, Passkeys are securely generated and registered directly with Microsoft Entra, enabling strong, phishing-resistant authentication.

Enrollment Workflow

  1. The user completes identity validation through Veridium’s secure onboarding process.

  2. The Veridium mobile app, acting as a certified FIDO2 Passkey provider, generates a new FIDO2 Passkey credential that is registered with Microsoft Entra ID using the Microsoft Entra Connector configured on Veridium services.

  3. The Passkey generated is a device-bound credential securely stored within the device.

  4. The registered Passkey becomes an authentication method available to the user in Microsoft Entra.

This design ensures that Passkey registration is performed within a trusted, managed environment, centralizing control via the Veridium platform.

Only Passkeys registered through this process — leveraging the Microsoft Entra Connector on Veridium services — are managed and governed (non-exclusively) by the Veridium platform.

Passkeys registered outside this flow (e.g., via http://myaccount.microsoft.com , Microsoft Authenticator etc) are not visible to or manageable within Veridium services.

Device Removal and Passkey Revocation

When a device is removed or deregistered from the Veridium platform, the corresponding Passkeys are also revoked and removed from Microsoft Entra to ensure security and prevent unauthorized access.

  • Upon device removal, the Veridium platform triggers the de-registration of all Passkeys associated with that device.

  • The Microsoft Entra Connector, configured on Veridium services, communicates with Microsoft Entra to remove the Passkey credentials from the user’s account.

  • This process ensures that Passkeys stored only on the removed device can no longer be used for authentication against Microsoft Entra resources.

  • The revocation is recorded within Veridium’s audit logs, maintaining a complete security trail.

Benefits

  • Ensures that compromised or lost devices cannot be used to authenticate

  • Maintains alignment between device lifecycle and credential validity

  • Provides centralized control over Passkey lifecycle and security compliance

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.