Merge pull request #8922 from MicrosoftDocs/main

Publish main to live, 10:30AM PDT, 9/27
This commit is contained in:
Stacyrch140 2023-09-27 14:02:03 -04:00 committed by GitHub
commit 4662fa7e58
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 10 additions and 5 deletions

View File

@ -27,3 +27,5 @@ This policy setting allows you to turn off Copilot in Windows. If you enable thi
## Related articles ## Related articles
- [Welcome to Copilot in Windows](https://support.microsoft.com/windows/welcome-to-copilot-in-windows-675708af-8c16-4675-afeb-85a5a476ccb0) - [Welcome to Copilot in Windows](https://support.microsoft.com/windows/welcome-to-copilot-in-windows-675708af-8c16-4675-afeb-85a5a476ccb0)
- [Copilot in Windows: Your data and privacy](https://support.microsoft.com/windows/copilot-in-windows-your-data-and-privacy-3e265e82-fc76-4d0a-afc0-4a0de528b73a)

View File

@ -5,7 +5,7 @@ ms.collection:
- highpri - highpri
- tier1 - tier1
ms.topic: article ms.topic: article
ms.date: 09/06/2023 ms.date: 09/27/2023
appliesto: appliesto:
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
@ -26,7 +26,7 @@ This article describes how to create and use passkeys on Windows devices.
Microsoft has long been a founding member of the FIDO Alliance and has helped to define and use passkeys natively within a platform authenticator like Windows Hello. Passkeys utilize the FIDO industry security standard, which is adopted by all major platforms. Leading technology companies like Microsoft are backing passkeys as part of the FIDO Alliance, and numerous websites and apps are integrating support for passkeys. Microsoft has long been a founding member of the FIDO Alliance and has helped to define and use passkeys natively within a platform authenticator like Windows Hello. Passkeys utilize the FIDO industry security standard, which is adopted by all major platforms. Leading technology companies like Microsoft are backing passkeys as part of the FIDO Alliance, and numerous websites and apps are integrating support for passkeys.
The FIDO protocols rely on standard public/private key cryptography techniques to offer more secure authentication. When a user registers with an online service, their client device generates a new key pair. The private key is stored securely on the users device, while the public key is registered with the service. To authenticate, the client device must prove that it possesses the private key by signing a challenge. The private keys can only be used after they're unlocked by the user using the Windows Hello unlock factor (biometrics or PIN). The FIDO protocols rely on standard public/private key cryptography techniques to offer more secure authentication. When a user registers with an online service, their client device generates a new key pair. The private key is stored securely on the user's device, while the public key is registered with the service. To authenticate, the client device must prove that it possesses the private key by signing a challenge. The private keys can only be used after they're unlocked by the user using the Windows Hello unlock factor (biometrics or PIN).
FIDO protocols prioritize user privacy, as they're designed to prevent online services from sharing information or tracking users across different services. Additionally, any biometric information used in the authentication process remains on the user's device and isn't transmitted across the network or to the service. FIDO protocols prioritize user privacy, as they're designed to prevent online services from sharing information or tracking users across different services. Additionally, any biometric information used in the authentication process remains on the user's device and isn't transmitted across the network or to the service.

View File

@ -4,8 +4,10 @@ description: Learn how Windows passwordless experience enables your organization
ms.collection: ms.collection:
- highpri - highpri
- tier1 - tier1
ms.date: 09/11/2023 ms.date: 09/27/2023
ms.topic: how-to ms.topic: how-to
appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
--- ---
# Windows passwordless experience # Windows passwordless experience
@ -36,7 +38,7 @@ Windows passwordless experience has the following requirements:
- Windows 11, version 22H2 with [KB5030310][KB-1] or later - Windows 11, version 22H2 with [KB5030310][KB-1] or later
- Microsoft Entra joined - Microsoft Entra joined
- Windows Hello for Busines credentials enrolled for the user, or a FIDO2 security key - Windows Hello for Business credentials enrolled for the user, or a FIDO2 security key
- MDM-managed: Microsoft Intune or other MDM solution - MDM-managed: Microsoft Intune or other MDM solution
>[!NOTE] >[!NOTE]

View File

@ -1,11 +1,12 @@
--- ---
title: Web sign-in for Windows title: Web sign-in for Windows
description: Learn how Web sign-in in Windows works, key scenarios, and how to configure it. description: Learn how Web sign-in in Windows works, key scenarios, and how to configure it.
ms.date: 09/13/2023 ms.date: 09/27/2023
ms.topic: how-to ms.topic: how-to
appliesto: appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a> - ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
ms.collection: ms.collection:
- highpri
- tier1 - tier1
--- ---