This article is contributed. See the original author and article here.
The Microsoft Security team is excited to connect with you next week at Authenticate 2024 Conference, taking place October 14 to 16 in Carlsbad, CA! With the rise in identity attacks targeting passwords and MFA credentials, it’s becoming increasingly clear that phishing resistant authentication is critical to counteract these attacks. As the world shifts towards stronger, modern authentication methods, Microsoft is proud to reaffirm our commitment to passwordless authentication and to expanding our support for passkeys across products like Microsoft Entra, Microsoft Windows, and Microsoft consumer accounts (MSA).
To enhance security for both consumers and enterprise customers, we’re excited to showcase some of our latest innovations at this event:
- Expanded passkey support for Microsoft Entra ID
- Passkey support for Microsoft Consumer Accounts (MSA)
- Passkeys on Windows: Authenticate Seamlessly with Passkey Providers
We look forward to demonstrating these new advancements and discussing how to take a comprehensive approach to modern authentication at Authenticate Conference 2024.
Where to find Microsoft Security at Authenticate 2024 Conference
Please stop by our booth to chat with our product team or join us at the following sessions:
Session Title | Session Description | Time |
Passkeys on Windows: Paving the way to a frictionless future! | UX Fundamentals
Discover the future of passkey authentication on Windows. Explore our enhanced UX, powered by Microsoft AI and designed for seamless experiences across platforms. Join us as we pave the way towards a passwordless world.
Speakers: Sushma K. Principal Program Manager, Microsoft Ritesh Kumar Software Engineer, Microsoft | October 14th
12:00 – 12:25 PM |
Passkeys on Windows: New platform features | Technical Fundamentals and Features
This is an exciting year for us as we’re bringing some great passkey features to Windows users. In this session, I’ll discuss our new capabilities for synced passkeys protected by Windows Hello, and I’ll walk through a plugin model for third-party passkey providers to integrate with our Windows experience. Taken together, these features make passkeys more readily available wherever users need them, with the experience, flexibility, and durability that users should expect when using their passkeys on Windows.
Speaker: Bob Gilbert Software Engineering Manager, Microsoft | October 14th
2:30 – 2:55 PM |
We love passkeys – but how can we convince a billion users? | Keynote
It’s clear that passkeys will be core component of a passwordless future. The useability and security advantages are clear. What isn’t as clear is how we actually convince billions of users to step away from a decades-long relationship with passwords and move to something new. Join us as we share insights on how to accelerate adoption when users, platforms, and applications needs are constantly evolving. We will share practical UX patterns and practices, including messaging, security implications, and how going passwordless changes the concept of account recovery.
Speakers: Scott Bingham Principal Product Manager, Microsoft Sangeeta Ranjit Group Product Manager, Microsoft | October 14th
5:05 – 5:25 PM |
Stop by our booth #402 to speak with our product team in person!
Stop counting actors… Start describing authentication events | Vision and Future
We began deploying multifactor authentication because passwords provided insufficient security. More factors equal more security, right? Yes, but we continue to see authentication attacks such as credential stuffing and phishing! The identity industry needs to stop thinking in the quantity of authentication factors and start thinking about the properties of the authentication event. As we transition into the era of passkeys, it’s time to consider how we describe the properties of our authentication event. In this talk, we’ll demonstrate how identity providers and relying parties can communicate a consistent, composable collection of authentication properties. To raise the security bar and provide accountability, these properties must communicate not only about the authentication event, but about the security primitives underlying the event itself. These properties can be used to drive authentication and authorization decisions in standalone and federated environments, enabling clear, consistent application of security controls.
Speakers: Pamela Dingle Director of Identity Standards, Microsoft Dean H. Saxe Principal Engineer, Office of the CTO, Beyond Identity | October 16th
10:00 – 10:25 AM |
Bringing passkeys into your passwordless journey | Passkeys in the Enterprise
Most of our enterprise customers are deploying some form of passwordless credential or planning to in the next few years, however, the industry is all abuzz with excitement about passkeys. What do passkeys mean for your organization’s passwordless journey? Join the Microsoft Entra ID product team as we explore the impact of passkeys on the passwordless ecosystem, share insights from Microsoft’s own passkey implementation and customer experiences.
Speakers: Tim Larson – Senior Product Manager, Identity Network and Access, Security, Microsoft Micheal Epping – Senior Product Manager, Microsoft | October 16th 11:00 – 11:25 AM |
We can’t wait to see you in Carlsbad, CA for Authenticate 2024 Conference
Jarred Boone, Senior Product Marketing Manager, Identity Security
Read more on this topic
- Expanded passkey support for Microsoft Entra ID
- Passkey support for Microsoft Consumer Accounts (MSA)
Learn more about Microsoft Entra
Prevent identity attacks, ensure least privilege access, unify access controls, and improve the experience for users with comprehensive identity and network access solutions across on-premises and clouds.
- Microsoft Entra News and Insights | Microsoft Security Blog
- Microsoft Entra blog | Tech Community
- Microsoft Entra documentation | Microsoft Learn
- Microsoft Entra discussions | Microsoft Community
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
Recent Comments