Microsoft Entra Blog
Microsoft Entra ID: Troubleshoot Missing Passkey Registration Options
Scope of the failure
This article is about one specific failure pattern:
- the user goes to Security info
- the user expects to add Passkey
- the option is missing, blocked, or never completes registration
That failure is usually not caused by "passkeys being broken." In Microsoft Entra ID, passkey registration depends on several independent control points:
- Authentication Methods policy
- the passkey registration flow
- a valid strong-authentication bootstrap path
- the supported platform and authenticator combination documented in the passkey compatibility matrix
When the option is missing, the useful question is not "does this device support passkeys in general?" The useful question is:
At which layer did Entra stop offering or accepting the registration path?
How the registration path actually works
As documented in Register a passkey (FIDO2), browser-based registration starts in Security info. The user selects Add sign-in method, chooses Passkey, and must satisfy MFA before registration continues. Microsoft explicitly states there that if the user does not already have at least one MFA method, they must add one first, or an admin can issue a Temporary Access Pass to bootstrap strong authentication.
That sequence matters because it tells you where the control-plane checks happen:
- Entra determines whether the user is allowed to configure passkeys.
- Entra checks whether the user can strongly authenticate.
- The browser and operating system decide which passkey storage options to show.
- The selected authenticator path succeeds or fails based on platform support and policy.
If any one of those stages fails, the user experiences the same vague symptom: "I don’t see passkey."
Root cause 1: the user is not enabled for Passkey (FIDO2)
The first check should be the Authentication Methods policy, not the mobile device.
As Microsoft describes in the Authentication Methods management documentation, each method is enabled and targeted independently. If Passkey (FIDO2) is disabled for the user or group, Security info does not have to present the method at all.
What to verify
- Open Entra admin center > Protection > Authentication methods > Policies.
- Open Passkey (FIDO2).
- Confirm the user is in scope through direct or group targeting.
- If passkey profiles are in use, confirm the effective profile still allows the intended authenticator.
Why this breaks registration
This is a control-plane denial, not a device failure. The user never reaches a valid passkey enrollment path because Entra does not consider the method available for that identity. The frontend symptom is "the option is missing," but the backend reality is that the tenant never exposed the capability to that principal.
Root cause 2: the user cannot satisfy the MFA prerequisite
Microsoft states in Register a passkey (FIDO2) that the user must sign in with MFA before adding a passkey. Microsoft also documents in Configure Temporary Access Pass to register passwordless authentication methods that TAP is specifically intended to bootstrap passwordless methods such as passkeys.
What to verify
- Confirm the user already has at least one usable MFA method.
- If not, issue and test a Temporary Access Pass.
- Re-run registration through Security info after the user can strongly authenticate.
Why this breaks registration
Passkeys are not universally the first method in the lifecycle. In many tenants, the failure is simply that the rollout design skipped the bootstrap requirement documented by Microsoft.
Root cause 3: the browser or operating system does not expose the expected storage options
Microsoft notes in Register a passkey (FIDO2) that the options shown during registration vary by device and operating system. The passkey compatibility matrix is therefore not a side note. It is part of the registration control path.
What to verify
- Identify whether the user is attempting:
- a same-device passkey
- cross-device registration
- registration on a physical FIDO2 key
- Compare the exact browser, operating system, and authenticator combination against the Microsoft matrix.
- If the matrix does not support the exact combination, stop troubleshooting policy and switch to a supported path.
Why this breaks registration
The registration UX is built on platform capabilities. If the local platform does not expose a supported passkey path, Entra cannot force the missing option to appear.
Root cause 4: Microsoft Authenticator passkeys are being attempted on an unsupported mobile path
Microsoft’s Enable passkeys in Authenticator and Authenticator passkey FAQ are explicit about platform expectations.
Two details matter operationally:
- Microsoft documents iOS 17+ and Android 14+ for supported Authenticator passkey scenarios.
- Microsoft documents that on Android, Authenticator stores the private key only if the device has secure hardware available through Android Keystore, specifically a Secure Element (SE) or Trusted Execution Environment (TEE).
What to verify
- Check the device OS version against the current Microsoft documentation.
- If Android is involved, confirm the problem is not tied to device hardware capability.
- If you need a fast isolation test, attempt the same user registration with a supported FIDO2 security key.
Why this breaks registration
This is not an Entra policy problem. It is a local authenticator capability problem. The registration path reaches the authenticator, but the authenticator cannot create or store the credential in the manner Microsoft requires. Once you are in that failure mode, changing directory policy is usually noise; the real decision is whether to change device, browser path, or authenticator type.
Root cause 5: attestation or passkey profile policy rejects the authenticator
If the tenant uses passkey profiles or attestation-related restrictions, the failure may be intentional. Microsoft documents there that profiles can control the target passkey type and authenticator characteristics.
What to verify
- Review whether the pilot group is scoped to a passkey profile.
- Review whether attestation or AAGUID restrictions narrow the allowed authenticators.
- Compare the user’s attempted authenticator against the profile design.
Why this breaks registration
The user is not failing because registration is generically unavailable. The user is failing because the selected authenticator does not satisfy the tenant’s allowed authenticator model.
Root cause 6: the admin is mixing sign-in support with registration support
This is a frequent design error. A browser or device can be usable for some Entra sign-in scenarios and still be the wrong path for the specific passkey registration flow being attempted.
Microsoft states in Register a passkey (FIDO2) that the save-location options vary by platform. Microsoft separately documents exact support combinations in the compatibility matrix. Those two sources together imply an important troubleshooting rule:
do not infer registration support from generic sign-in success
Recommended diagnostic sequence
Use this order:
- Confirm the user is targeted for Passkey (FIDO2) in Authentication Methods policy.
- Confirm the user can meet the MFA prerequisite or has a valid Temporary Access Pass.
- Confirm whether the intended path is Authenticator, hardware key, same-device, or cross-device registration.
- Validate the exact browser and OS combination against the passkey compatibility matrix.
- If Authenticator on Android is involved, validate OS version and secure-hardware support using the Authenticator FAQ.
- If profiles or stricter authenticator controls are in use, validate the selected authenticator against the passkey profiles documentation.
That diagnostic order follows Microsoft’s documented control flow instead of guessing at symptoms.
Final takeaway
When the passkey option is missing, the failure is usually one of four documented causes:
- the method is not enabled for the user
- the user cannot satisfy the MFA bootstrap requirement
- the platform path is unsupported
- the selected authenticator does not satisfy the tenant’s passkey policy
Treat it as a registration pipeline problem, not as a generic "passkeys are broken" problem.
Microsoft References
- Manage authentication methods for Microsoft Entra ID
- Register a passkey (FIDO2)
- Configure Temporary Access Pass to register passwordless authentication methods
- Enable passkeys in Authenticator
- Passkeys in Microsoft Authenticator FAQ
- Passkey authentication matrix with Microsoft Entra ID
- Enable passkey (FIDO2) profiles in Microsoft Entra ID