Microsoft Entra Passkeys integration
This document outlines how to integrate Veridium’s passkey capabilities with Microsoft Entra (formerly Azure AD), leveraging Veridium's certified FIDO2 authenticator and the Entra Connector within Veridium Manager. This integration enables organizations to enforce secure, device-bound passkey authentication managed centrally via Veridium and synchronized with Microsoft Entra ID.
By following this setup, organizations ensure that passkey credentials are generated securely on user devices and managed under your governance — while appearing natively as authentication methods within Microsoft Entra. Additionally, passkey lifecycle (enrollment and revocation) can be fully orchestrated and audited via the Veridium platform.
Overview
Register a Microsoft Entra Application
Create a new application in the Microsoft Entra admin center to represent the Veridium Entra Connector. This allows Veridium to securely interface with Microsoft Graph APIs.Assign Required API Permissions
Grant the necessary Microsoft Graph application permissions to allow Veridium to manage passkey credentials for users.Configure Application Credentials
Set up secure authentication for the Veridium Entra Connector using either a client secret or a trusted client certificate.Configure the Entra Connector in Veridium Manager
In the Veridium Manager, configure the connector with the required IDs and credentials. This establishes a trusted, authenticated connection to Microsoft Entra.Enable Passkey Enrollment Policy
Set the Entra Passkey policy for users/groups within Veridium Manager to define whether passkey registration is required, optional, or disabled during enrollment. Optinally, Pin Synchronization may be enabled to offer Veridium PIN verification as alternative user verification method for cases where biometrics is not available.User Enrollment and Passkey Registration
During user onboarding, the Veridium mobile app generates a FIDO2 passkey and registers it with Microsoft Entra. The passkey remains bound to the device and is recognized by Entra as a valid sign-in method.Lifecycle Management and Revocation
If a user device is removed or deprovisioned in Veridium, the connector automatically revokes the associated passkey in Microsoft Entra, ensuring proper credential hygiene and compliance.
Register Microsoft Entra Application
The Veridium Manager Entra Connector requires a registered Microsoft Entra application to call Microsoft Graph APIs securely.
Log in to the Microsoft Entra admin center.
Navigate to:
Applications > App registrations > + New registration
Configure the application:
Name:
Veridium Entra ConnectorSupported account types: Accounts in this organizational directory only
Redirect URI: (Optional – leave blank for service-to-service communication)
Click Register.
After registration, copy the Application ID (clientId) and Directory ID (tenantId). These are required for Veridium Manager configuration.
Add API Permissions for Passkey Management
To allow Veridium to manage passkeys through the Microsoft Graph API, grant the appropriate permissions.
In the app registration, go to API permissions > + Add a permission.
Choose:
Microsoft Graph
Application permissions
Add the following permission:
Click Add permissions.
Select Grant admin consent for [Tenant Name] to authorize the permission tenant-wide.
UserAuthMethod-Passkey.ReadWrite.All permission allows Veridium to create, read, update, and delete passkey authentication methods for users in the organization.
Application Credentials
Veridium Microsoft Entra connector uses client credentials to authenticate against Microsoft Entra. The credentials may be either Certificate or Client Secret.
Option A: Create a Client Secret
Go to the registered app > Certificates & secrets
Under Client secrets, click + New client secret
Add a description (e.g.,
Veridium Client Secret)Select an expiration duration (e.g., 6 or 12 months)
Click Add
Copy the generated value immediately — it will be hidden after you leave the page.
Option B: Upload a Certificate
Generate a certificate from your internal PKI:
Use your internal CA tools (e.g., Microsoft CA, OpenSSL) to generate the certificate.
Export the public key certificate in
.ceror.pemformat. Private key must never be exposed or shared during this process. It will be uploaded separately on Veridium Manager during Microsoft Entra Connector configuration.
Go to Certificates & secrets > Certificates
Click Upload certificate
Browse and select your certificate file
Click Add
Microsoft recommends that you use certificate credentials instead of client secrets when moving applications to a production environment.
Certificates offer enhanced security because the private key never leaves your infrastructure, whereas client secrets are transmitted during token requests and are prone to leakage or mismanagement.
Configure Microsoft Entra connector
This section of the Veridium Manager allows you to configure integration with Microsoft Entra ID using Microsoft Graph API. It enables secure communication between the Veridium platform and Microsoft services for managing authentication-related tasks.

Field | Description |
|---|---|
Enabled | Toggle to enable or disable Microsoft Graph integration. |
HTTP Debug Enabled | Optional toggle for verbose HTTP request logging (for troubleshooting). |
Client ID* | Application (client) ID from your Entra app registration. |
Tenant ID* | Directory (tenant) ID from your Entra app registration. |
Client Secret | Secret generated under Certificates & secrets in the Entra app. Used for client authentication unless a certificate is configured. |
Client Certificate | Upload a certificate to use for secure, certificate-based authentication. |
FIDO2 Creation Options Challenge Timeout (minutes) | Time limit for FIDO2 registration challenge validity. Align this with your security policy. |
In production environments, it is strongly recommended to use client certificate credentials instead of client secrets.
Available Actions
Validate Certificate: Verifies the uploaded client certificate before you save the configuration.
Test Connection: Sends a test request to Microsoft Graph to confirm the settings are working properly.
Enrollment Policy
Once the configuration of Microsoft Entra integration is completed, the Entra Passkey policy may be enabled for the users.
Navigate to Veridium Manager / Orchestrator
From the left panel select Policy
Edit the targeted Policy
Set Entra Passkey to:
OPTIONAL — users may skip enrollment
TRUE — enrollment is mandatory

Enabling Entra Passkey for users not managed in Microsoft Entra, or without a valid connector configuration, will cause enrollment errors in the Veridium Mobile Application.
The enrollment workflow may be continued when the Entra Passkey authentication method policy is OPTIONAL. When the policy for Entra Passkey authentication method is TRUE, succesful registration of the passkey in Microsoft Entra becomes mandatory and the enrollment may not be completed otherwise
Enrollment Overview
The Veridium mobile application is a certified FIDO2 Passkey provider, fully integrated with Microsoft Entra ID. As part of Veridium’s enrollment process, Passkeys are securely generated and registered directly with Microsoft Entra, enabling strong, phishing-resistant authentication.
Enrollment Workflow
The user completes identity validation through Veridium’s secure onboarding process.
The Veridium mobile app, acting as a certified FIDO2 Passkey provider, generates a new FIDO2 Passkey credential that is registered with Microsoft Entra ID using the Microsoft Entra Connector configured on Veridium services.
The Passkey generated is a device-bound credential securely stored within the device.
The registered Passkey becomes an authentication method available to the user in Microsoft Entra.
This design ensures that Passkey registration is performed within a trusted, managed environment, centralizing control via the Veridium platform.
Only Passkeys registered through this process — leveraging the Microsoft Entra Connector on Veridium services — are managed and governed by the Veridium platform.
Passkeys registered outside this flow (e.g., via http://myaccount.microsoft.com , Microsoft Authenticator etc) are not visible to or manageable within Veridium services.
User verification methods
The user may use the Native Mobile Biometrics (e.g. FaceID on iOS or Fingerprint on Android) as user verification during enrolment or authentication using Passkeys.
Alternatively, Veridium PIN may be used when Native Mobile Biometrics is not available on the device. This method requires Pin Synchronization to be enabled on Veridium service.
Using Veridium PIN for Passkeys is subject of configuration. Follow PIN Synchronization - Secure Offline Usage for detailed steps on how to enable and manage this feature within your environment.
Device Removal and Passkey Revocation
When a device is removed or deregistered from the Veridium platform, the corresponding Passkeys are also revoked and removed from Microsoft Entra to ensure security and prevent unauthorized access.
Upon device removal, the Veridium platform triggers the de-registration of all Passkeys associated with that device.
The Microsoft Entra Connector, configured on Veridium services, communicates with Microsoft Entra to remove the Passkey credentials from the user’s account.
This process ensures that Passkeys stored only on the removed device can no longer be used for authentication against Microsoft Entra resources.
The revocation is recorded within Veridium’s audit logs, maintaining a complete security trail.
Advantages of passkey management
Ensures that compromised or lost devices cannot be used to authenticate
Maintains alignment between device lifecycle and credential validity
Provides centralized control over Passkey lifecycle and security compliance