diff --git a/education/windows/federated-sign-in.md b/education/windows/federated-sign-in.md
index 35200347df..36a0de01ff 100644
--- a/education/windows/federated-sign-in.md
+++ b/education/windows/federated-sign-in.md
@@ -1,6 +1,6 @@
---
title: Configure federated sign-in for Windows devices
-description: Learn about federated sign-in in Windows how to configure it.
+description: Learn how federated sign-in in Windows works and how to configure it.
ms.date: 09/11/2023
ms.topic: how-to
appliesto:
diff --git a/windows/security/identity-protection/hello-for-business/passwordless.md b/windows/security/identity-protection/hello-for-business/passwordless.md
index 884f5375bb..550f288698 100644
--- a/windows/security/identity-protection/hello-for-business/passwordless.md
+++ b/windows/security/identity-protection/hello-for-business/passwordless.md
@@ -4,7 +4,7 @@ description: Learn how Windows Hello for Business passwordless enables your orga
ms.collection:
- highpri
- tier1
-ms.date: 09/06/2023
+ms.date: 09/11/2023
ms.topic: how-to
---
@@ -17,15 +17,15 @@ When the policy is enabled, certain Windows authentication scenarios don't offer
With Windows Hello for Business passwordless, users who sign in with Windows Hello or a FIDO2 security key:
-- Don't have the option to use the password credential provider on the Windows lock screen
+- Can't use the password credential provider on the Windows lock screen
- Aren't prompted to use a password during in-session authentications (for example, UAC elevation, password manager in the browser, etc.)
-- Don't have the option to use *Accounts > Change password* in the Settings app
+- Don't have the option *Accounts > Change password* in the Settings app
>[!NOTE]
>Users can reset their password using CTRL+ALT+DEL > **Manage your account**
Windows Hello for Business passwordless doesn't affect the initial sign-in experience and local accounts. It only applies to subsequent sign-ins for Microsoft Entra ID accounts. It also doesn't prevent a user from signing in with a password when using the *Other user* option in the lock screen.\
-The password credential provider is hidden only for the last signed in user who signed in Windows Hello or a FIDO2 security key. Windows Hello for Business passwordless is not about preventing users from using passwords, rather to guide and educate them to not use passwords.
+The password credential provider is hidden only for the last signed in user who signed in Windows Hello or a FIDO2 security key. Windows Hello for Business passwordless isn't about preventing users from using passwords, rather to guide and educate them to not use passwords.
This article explains how to enable Windows Hello for Business passwordless and describes the user experiences.
@@ -37,7 +37,7 @@ This article explains how to enable Windows Hello for Business passwordless and
Windows Hello for Business passwordless has the following requirements:
- Windows 11, version 22H2 with [KB5030310][KB-1] or later
-- Microsoft Entra ID joined
+- Microsoft Entra joined
- Windows Hello for Busines credentials enrolled for the user, or a FIDO2 security key
- MDM-managed: Microsoft Intune or other MDM solution
diff --git a/windows/security/identity-protection/passkey/index.md b/windows/security/identity-protection/passkey/index.md
index 7b69651936..bd68713d92 100644
--- a/windows/security/identity-protection/passkey/index.md
+++ b/windows/security/identity-protection/passkey/index.md
@@ -14,23 +14,23 @@ appliesto:
## Overview
-Passkeys provide a more secure and convenient method of logging into websites and applications that support them, compared to passwords. Unlike passwords, which users must remember and type, passkeys are stored as secrets on a device and can be unlocked using the device's unlock mechanism (such as biometrics or a PIN). Passkeys are designed to be used without the need for additional login challenges, making the authentication process faster and more convenient.
+Passkeys provide a more secure and convenient method of logging into websites and applications that support them, compared to passwords. Unlike passwords, which users must remember and type, passkeys are stored as secrets on a device and can be unlocked using the device's unlock mechanism (such as biometrics or a PIN). Passkeys can be used without the need for other sign in challenges, making the authentication process faster and more convenient.
-Starting in Windows 11, version 22H2 with [KB5030310][KB-1], you can use any apps or websites that supports passkeys to create and sign in using passkeys with the Windows Hello native experience. Once a passkey is created, you can use Windows Hello (biometrics and PIN) or a companion device (phone or tablet) to sign in.
+Starting in Windows 11, version 22H2 with [KB5030310][KB-1], you can use any apps or websites that support passkeys to create and sign in using passkeys with the Windows Hello native experience. Once a passkey is created, you can use Windows Hello (biometrics and PIN) or a companion device (phone or tablet) to sign in.
This article describes how to create and use passkeys on Windows devices.
## How passkeys work
-Passkeys utilize the FIDO industry security standard, which has been adopted by multiple platforms. Leading technology companies like Microsoft are backing passkeys as part of the FIDO Alliance, and numerous websites and apps are integrating support for passkeys.
+Passkeys utilize the FIDO industry security standard, which is adopted by multiple platforms. Leading technology companies like Microsoft are backing passkeys as part of the FIDO Alliance, and numerous websites and apps are integrating support for passkeys.
-The FIDO protocols rely on standard public key cryptography techniques to offer more secure authentication. When a user registers with an online service, their client device generates a new key pair. The private key is stored securely on the device, while the public key is registered with the service. To authenticate, the client device must prove that it possesses the private key by signing a challenge. The private keys can only be used after being unlocked by the user using the Windows Hello unlock factor (biometrics or PIN).
+The FIDO protocols rely on standard public key cryptography techniques to offer more secure authentication. When a user registers with an online service, their client device generates a new key pair. The private key is stored securely on the device, while the public key is registered with the service. To authenticate, the client device must prove that it possesses the private key by signing a challenge. The private keys can only be used after they're unlocked by the user using the Windows Hello unlock factor (biometrics or PIN).
-FIDO protocols prioritize user privacy, as they are designed to prevent online services from sharing information or tracking users across different services. Additionally, any biometric information used in the authentication process remains on the user's device and is not transmitted to the service.
+FIDO protocols prioritize user privacy, as they're designed to prevent online services from sharing information or tracking users across different services. Additionally, any biometric information used in the authentication process remains on the user's device and isn't transmitted to the service.
### Passkeys compared to passwords
-Passkeys have several advantages over passwords, including their ease of use and intuitive nature. Unlike passwords, passkeys do not require a creation process, do not need to be remembered, and do not need to be safeguarded. Additionally, passkeys are unique to each website or application, preventing their reuse. They are also highly secure because they are only stored on the user's devices, with the service only storing public keys. Passkeys are also resistant to phishing attempts, as they are enforced by the browsers or operating systems to only be used for the appropriate service, rather than relying on human verification. Finally, passkeys provide cross-device and cross-platform authentication, meaning that a passkey from one device can be used to sign in on another device.
+Passkeys have several advantages over passwords, including their ease of use and intuitive nature. Unlike passwords, passkeys don't require a creation process, don't need to be remembered, and don't need to be safeguarded. Additionally, passkeys are unique to each website or application, preventing their reuse. They're also highly secure because they're only stored on the user's devices, with the service only storing public keys. Passkeys are resistant to phishing attempts, as they're enforced by the browsers or operating systems to only be used for the appropriate service, rather than relying on human verification. Finally, passkeys provide cross-device and cross-platform authentication, meaning that a passkey from one device can be used to sign in on another device.
## System requirements
@@ -60,7 +60,7 @@ Follow these steps to create a passkey from a Windows device:
:::row-end:::
:::row:::
:::column span="4":::
- 3. Choose where to save the passkey. By default, Windows prompts to save the passkey locally if you're using Windows Hello or Windows Hello for Business. If you select the option **Use another device**, you can choose to save the passkey in one of the following locations:
+ 3. Choose where to save the passkey. By default, Windows offers to save the passkey locally if you're using Windows Hello or Windows Hello for Business. If you select the option **Use another device**, you can choose to save the passkey in one of the following locations:
:::column-end:::
:::row-end:::
:::row:::
@@ -116,7 +116,7 @@ Pick one of the following options to learn how to save a passkey, based on where
:::column-end:::
:::column span="1":::
- :::image type="content" source="images/device-save-qr.png" alt-text="Screenshot showing the qr code asking the user to scan on the device." lightbox="images/device-save-qr.png" border="false":::
+ :::image type="content" source="images/device-save-qr.png" alt-text="Screenshot showing the QR code asking the user to scan on the device." lightbox="images/device-save-qr.png" border="false":::
:::column-end:::
:::row-end:::
:::row:::
@@ -158,7 +158,7 @@ Pick one of the following options to learn how to save a passkey, based on where
:::row:::
:::column span="3":::
- 5. Select **OK** to confirm that you want to setup a security key, and unlock the security key using the key's unlock mechanism
+ 5. Select **OK** to confirm that you want to set up a security key, and unlock the security key using the key's unlock mechanism
:::column-end:::
:::column span="1":::
@@ -199,7 +199,7 @@ Follow these steps to use a passkey:
:::row-end:::
:::row:::
:::column span="3":::
- 3. If a passkey is stored locally and protected by Windows Hello, you'll be prompted to use Windows Hello to sign in. If you select the option **Use another device**, you can choose one of the following options:
+ 3. If a passkey is stored locally and protected by Windows Hello, you're prompted to use Windows Hello to sign in. If you select the option **Use another device**, you can choose one of the following options:
:::column-end:::
:::row-end:::
:::row:::
@@ -253,7 +253,7 @@ Pick one of the following options to learn how to use a passkey, based on where
:::row:::
:::column span="4":::
- 5. You are signed in to the website or app
+ 5. You're signed in to the website or app
:::column-end:::
:::row-end:::
@@ -273,7 +273,7 @@ Pick one of the following options to learn how to use a passkey, based on where
:::row:::
:::column span="3":::
- 5. You are signed in to the website or app
+ 5. You're signed in to the website or app
:::column-end:::
:::column span="1":::
@@ -295,7 +295,7 @@ Pick one of the following options to learn how to use a passkey, based on where
:::row:::
:::column span="3":::
- 5. You are signed in to the website or app
+ 5. You're signed in to the website or app
:::column-end:::
:::column span="1":::
diff --git a/windows/security/identity-protection/toc.yml b/windows/security/identity-protection/toc.yml
index 5d12ea0f74..755b0efd7d 100644
--- a/windows/security/identity-protection/toc.yml
+++ b/windows/security/identity-protection/toc.yml
@@ -15,8 +15,6 @@ items:
href: passkey/index.md
- name: FIDO2 security key 🔗
href: /azure/active-directory/authentication/howto-authentication-passwordless-security-key
- - name: Federated sign-in 🔗
- href: /education/windows/federated-sign-in
- name: Smart Cards
href: smart-cards/toc.yml
- name: Virtual smart cards
@@ -24,6 +22,10 @@ items:
displayName: VSC
- name: Enterprise Certificate Pinning
href: enterprise-certificate-pinning.md
+ - name: Web sign-in
+ href: web-sign-in/index.md
+ - name: Federated sign-in 🔗
+ href: /education/windows/federated-sign-in
- name: Advanced credential protection
items:
- name: Windows LAPS (Local Administrator Password Solution) 🔗
diff --git a/windows/security/identity-protection/web-sign-in/index.md b/windows/security/identity-protection/web-sign-in/index.md
new file mode 100644
index 0000000000..cb2e0e0c92
--- /dev/null
+++ b/windows/security/identity-protection/web-sign-in/index.md
@@ -0,0 +1,106 @@
+---
+title: Configure Web sign-in for Windows devices
+description: Learn how Web sign-in in Windows works and how to configure it.
+ms.date: 09/11/2023
+ms.topic: how-to
+appliesto:
+ - ✅ Windows 11
+ms.collection:
+ - tier1
+---
+
+# Configure Web sign-in for Windows devices
+
+Starting in Windows 11, version 22H2 with [KB5030310][KB-1], you can enable your users to sign-in using a web experience on Microsoft Entra joined devices.
+This feature is called *Web sign-in*.\
+
+Web sign in is a new sign-in experience that allows users to sign in to their Windows devices using a web browser experience, opening new sign in scenarios.
+
+>[!Note:]
+>Web sign-in was initially realeased in windows 10 for TAP-only scenarios. Windows 11 is the first version where Web sign-in capabilities are extended.
+
+## Benefits of web sign-in
+
+## Prerequisites
+
+To use web sign-in, the following prerequisites must be met:
+
+- The devices must have Internet access. This feature doesn't work without it, as the authentication is done over the Internet.
+- The device must be Microsoft Entra joined
+- Windows 11 Pro Edu/Education, version 22H2 with [5030310][KB-1]
+
+
+
+## Configure web sign-in
+
+You can configure federated sign-in for student assigned (1:1) devices or student shared devices:
+
+- When federated sign-in is configured for **student assigned (1:1) devices**, the first user who signs in to the device with a federated identity becomes the *primary user*. The primary user is always displayed in the bottom left corner of the sign-in screen
+- When federated sign-in is configured for **student shared devices**, there's no primary user. The sign-in screen displays, by default, the last user who signed in to the device
+
+To use web sign-in, your devices must be configured with different policies. Review the following instructions to configure your devices using either Microsoft Intune or a provisioning package (PPKG).
+
+#### [:::image type="icon" source="images/icons/intune.svg"::: **Intune**](#tab/intune)
+
+[!INCLUDE [intune-settings-catalog-1](../../../../includes/configure/intune-settings-catalog-1.md)]
+
+| Category | Setting name | Value |
+|--|--|--|
+| Authentication | Enable Web Sign In | Enabled |
+| Authentication | Configure Web Sign In Allowed Urls | This setting is optional, and it contains a semicolon-separated list of domains, for example: `samlidp.clever.com;clever.com;mobile-redirector.clever.com` |
+| Authentication | Configure Webcam Access Domain Names | This setting is optional, and it should be configured if you need to use the webcam during the sign-in process. Specify the list of domains that are allowed to use the webcam during the sign-in process, separated by a semicolon. For example: `clever.com` |
+
+[!INCLUDE [intune-settings-catalog-2](../../../../includes/configure/intune-settings-catalog-2.md)]
+
+Alternatively, you can configure devices using a [custom policy][INT-1] with the following settings:
+
+| Setting |
+|--------|
+| **OMA-URI**: `./Vendor/MSFT/Policy/Config/Authentication/EnableWebSignIn`
**Data type**: Integer
**Value**: `1`|
+| **OMA-URI**: `./Vendor/MSFT/Policy/Config/Authentication/ConfigureWebSignInAllowedUrls`
**Data type**: String
**Value**: Semicolon separated list of domains, for example: `samlidp.clever.com;clever.com;mobile-redirector.clever.com`|
+| **OMA-URI**: `./Vendor/MSFT/Policy/Config/Authentication/ConfigureWebCamAccessDomainNames`
**Data type**: String
**Value**: This setting is optional, and it should be configured if you need to use the webcam during the sign-in process. Specify the list of domains that are allowed to use the webcam during the sign-in process, separated by a semicolon. For example: `clever.com`|
+
+#### [:::image type="icon" source="images/icons/provisioning-package.svg"::: **PPKG**](#tab/ppkg)
+
+To configure web sign-in using a provisioning package, use the following settings:
+
+| Setting |
+|--------|
+|