(Thread hasn't been updated in several months, but I've found it more than once while Googling related questions, so here's a solution. Hopefully it'll help someone.)
You don't need Yubico Login for Windows for a MS passwordless account, if your computer is AzureAD-joined (might work for Hybrid-Joined, as well, but I've only tried on AzureAD-joined machines).
I have done this on my Windows 11 machine and a Windows 10 VM (VirtualBox allows SecurityKey passthrough, Hyper-V does not).
MS Instructions for enabling FIDO Keys in Azure AD:
MS Instructions for adding the security key to your MS Account:
Restart your system after these steps to apply the AzureAD changes. (You may have to wait 10-15 mins for the change to be applied, in my limited experience.)
This step may or may not be necessary, but I've never tried without this step:
- After restarting, goto Start>Settings>Accounts>Sign-In Options>Security Key and click [Manage].
- You'll be asked to insert your key and put in its PIN. Close the window that loads (resetting the key or the pin from this interface will likely remove the credentials from your key).
--
Log off to test. You should get the standard pwd/pin prompt, but inserting your key (and/or selecting more options and the selecting USB-looking icon for a Security Key) it'll ask for your PIN. Once you do this the first time, the default login method will be Security Key.
The only way I've found to REQUIRE the key for Windows is here:
https://swjm.blog/three-ways-of-enforcing-security-key-sign-in-on-windows-10-windows-11-4f0f27227372
It says 3 Ways, but really it's just 3 different ways to do the same thing - disable all Windows credential providers except Security Keys and Smart Cards.
IMPORTANT CONSIDERATIONS:
- While you can add multiple user accounts to a key, Windows Logon will only recognize the last credential added to the key.
- If you disable all credential providers except Security Keys and Smart Cards, make sure you have a way to re-enable them if you lose your key. My machines are Intune managed so I can push a PowerShell script to re-enable the other providers, but I don't know what you'd do without a MDM if the key was lost.
- If you disable all credential providers except Security Keys and Smart Cards, you cannot use Run As Administrator if you're logged in as a Standard User. I've tried logging in with a StandardKey and then trying to provide admin credentials with an AdminKey, but Windows doesn't recognize that the new key has different credentials. (I have only tried this in Windows 10 Pro - Windows 11 may be able to recognize the new credentials.)