[email protected]
  • Home
  • Team
  • Events
    • MC2MC Live: The Matrix of Innovation (22/05/2025)
    • MC2MC Live: Voyage to the Edge of the Cloud (26/06/2025)
    • Past events gallery
  • Speakers
    • Call for Speakers
    • Speaker information
  • Photos
  • Contact
  • Sponsors
  • About
    • Code of Conduct
    • Privacy Policy

Passwordless sign-in, practical example!

Posted on December 22, 2019

It is time to break up your relationship with passwords. Passwords have been good to us in the past, but in today’s digital workplace they have become a relatively easy attack vector for hackers. Hackers love passwords and it’s not difficult to see why when you consider that most commonly rejected passwords in Azure Active Directory (Azure AD) include terms like the year, the month, the season, or a local sports team. Furthermore, research has shown that traditional recommendations for password management such as length requirements, complexity requirements, and change frequencies are counterproductive for a variety of reasons related to human nature.

Short demo

First, enable Multi-Factor Authentication

There are a lot of blogs & articles written how to enable MFA in your organisation. How to setup MFA in short: https://aka.ms/mfasetup

Users can register their devices (by default, users can)

Tap your account, tap Sign-in by phone.

Register your device which you would like to use for the PasswordLess sign-in.

Do you need more information about the Devices registration: https://docs.microsoft.com/en-us/azure/active-directory/devices/overview#getting-devices-under-the-control-of-azure-ad or the Authenticator APP: https://aka.ms/authappstart

The only step you to enable Passwordless phone sign-in:

Create a AzureADPolicy with a global or security admin in your tenant.

New-AzureADPolicy -Type AuthenticatorAppSignInPolicy -Definition ‘{“AuthenticatorAppSignInPolicy”:{“Enabled”:true}}’ -isOrganizationDefault $true -DisplayName AuthenticatorAppSignIn

don’t forget to install the “Install-Module AzureADPreview”, but first uninstall your current module “UnInstall-Module AzureAD”

That’s it! You are now ready to use your authenticator app!

Jasper Bernaers
Previous Post
Windows Hello for Business Multi Factor unlock with MEM – Intune
Next Post
Create security tasks in MEM Intune from MDATP to take action on exploits

Recent Posts

  • MC2MC Live: Jurassic Cloud Adventures (24/04/25) April 28, 2025
  • MC2MC Live: Cloudy with a Chance of Data (20/03/25) March 22, 2025
  • MC2MC Live: Forward to the Past (2024) December 23, 2024
  • MC2MC Live: The Cloud Strikes Back (2024) November 18, 2024
  • MC2MC Live: Safeguarding the Digital Frontier (2024) September 30, 2024

Categories

  • Autopilot (1)
  • Azure (29)
  • Azure AD (2)
  • Azure Virtual Desktop (2)
  • Big Data (1)
  • ConfigMgr (3)
  • Containers (2)
  • EMS (7)
  • GitHub (3)
  • Guides (6)
  • Hyper-V (1)
  • IaC (1)
  • Intune (20)
  • M365 (20)
  • MC2MC (39)
  • MC2MC Live (2)
  • MDATP (3)
  • PowerApps (3)
  • PowerAutomate (6)
  • PowerShell (4)
  • Security (10)
  • Veeam (1)
  • Visual Studio Code (1)
  • Viva (1)
  • Windows 10 (16)
  • Windows 11 (1)
  • Windows 365 (2)
  • Windows Autopilot (3)
  • Windows Server (1)
  • Windows Updates (1)
  • Windows365 (1)
  • Women In Tech (2)

RSS Jasper Bernaers

  • How a modern and secure workplace can help your organization become relevant
  • Actionable steps to decrease the risk of a Cyberattack
  • Cybersecurity in a remote connected world
  • Cybersecurity for local governments – in 10 steps

RSS Wim Matthyssen

  • Azure Arc: Keep your Azure Connected Machine agent up-to-date on a Windows Server
  • Azure Arc: Securely connect to an Azure Arc-enabled Windows Server with RDP over SSH
  • How to install OpenSSH on a Windows Server 2019/2022/2025 using a PowerShell script
  • PowerShell script: BgInfo deployment script for Windows Server 2025

RSS Tim De Keukelaere

  • How to configure RBAC permissions for available uninstall in Intune
  • WMUG NL Tuesdays – Latest and greatest in the world of Configuration Manager
  • Microsoft MVP 2020-2021 Award
  • A first look at the Configuration Manager Community Hub

RSS Micha Wets

  • AVD Client Cleanup script/tool
  • MSIX app attach Start Menu fixed in Windows Virtual Desktop
  • Windows Virtual Desktop Workshop December update
  • Windows Virtual Desktop Spring 2020 edition workshop

RSS Robbe Van den Daele

  • Detecting non-privileged Windows Hello abuse
  • MDE Device Discovery - Improving the monitored network page
  • Correlating Defender for Endpoint and Global Secure Access Logs
  • Parsing CEF messages without Azure Monitor Agent

© 2025 MC2MC vzw