[GH-ISSUE #5189] [Feature Request]: Deploy authentication policies with approved AAGUID lists #2491

Open
opened 2026-03-02 13:52:48 +03:00 by kerem · 10 comments
Owner

Originally created by @dszp on GitHub (Jan 12, 2026).
Original GitHub issue: https://github.com/KelvinTegelaar/CIPP/issues/5189

Please confirm:

  • I have searched existing feature requests (open and closed) and found no duplicates.
  • **me or my organization is currently an active sponsor of the product at the $99,- level.

Problem Statement

Microsoft now supports syncable Passkeys (FIDO2) and allows you to create an allowlist of AAGUIDs that define which password managers (or hardware keys) can authenticate, usually to include Microsoft Authenticator. Adding all desired AAGUIDs to the list is time consuming to do manually since there are a large number of AAGUIDs if you want to allow a lot of Yubikey models, for example (since each set of capabilities requires a new AAGUID).

Various resources are available for finding AAGUID definitions from manufacturers and password manager vendors, such as:

And others that are web-searchable. Additionally, being able to choose whether to allow attestation or not (it's required to NOT require attestation to allow syncable passkeys currently) would be useful, in addition to controlling authentication types required or disallowed by policy.

Benefits for MSPs

Being able to deploy a list of AAGUIDs that include Authenticator, Yubikey models, and for example 1Password as a password manager would be a huge benefit to being able to deploy standards quickly, along with defining attestation being required or not, and would help with allowing users using MSP approved/provided/supported password managers to save Passkeys for login and provide more options than just Authenticator for phishing-resistant MFA (just available finally in Nov. 2025 from Microsoft) would be a big win in driving better MFA adoption.

Value or Importance

Syncable passkey support has been desired for a long time and is finally here as of Nov. 2025, but it's important to centrally deploy/manage in order to make it usable, since syncable passkeys are not enabled by default on Microsoft tenants, and properly securing (requiring a known password manager, for example) syncable passkeys is an important but currently complex task that requires reading and following complex documentation and copying/pasting many AAGUIDs per tenant/policy, so it's a valuable add to add central management that exists nowhere else yet that I know of.

PowerShell Commands (Optional)

No response

Originally created by @dszp on GitHub (Jan 12, 2026). Original GitHub issue: https://github.com/KelvinTegelaar/CIPP/issues/5189 ### Please confirm: - [x] **I have searched existing feature requests** (open and closed) and found no duplicates. - [x] **me or my organization is currently an active sponsor of the product at the $99,- level. ### Problem Statement Microsoft now supports syncable Passkeys (FIDO2) and allows you to create an allowlist of AAGUIDs that define which password managers (or hardware keys) can authenticate, usually to include Microsoft Authenticator. Adding all desired AAGUIDs to the list is time consuming to do manually since there are a large number of AAGUIDs if you want to allow a lot of Yubikey models, for example (since each set of capabilities requires a new AAGUID). Various resources are available for finding AAGUID definitions from manufacturers and password manager vendors, such as: - https://github.com/passkeydeveloper/passkey-authenticator-aaguids - https://passkeydeveloper.github.io/passkey-authenticator-aaguids/explorer/ - https://aaguid.nicolasuter.ch/ And others that are web-searchable. Additionally, being able to choose whether to allow attestation or not (it's required to NOT require attestation to allow syncable passkeys currently) would be useful, in addition to controlling authentication types required or disallowed by policy. ### Benefits for MSPs Being able to deploy a list of AAGUIDs that include Authenticator, Yubikey models, and for example 1Password as a password manager would be a huge benefit to being able to deploy standards quickly, along with defining attestation being required or not, and would help with allowing users using MSP approved/provided/supported password managers to save Passkeys for login and provide more options than just Authenticator for phishing-resistant MFA (just available finally in Nov. 2025 from Microsoft) would be a big win in driving better MFA adoption. ### Value or Importance Syncable passkey support has been desired for a long time and is finally here as of Nov. 2025, but it's important to centrally deploy/manage in order to make it usable, since syncable passkeys are not enabled by default on Microsoft tenants, and properly securing (requiring a known password manager, for example) syncable passkeys is an important but currently complex task that requires reading and following complex documentation and copying/pasting many AAGUIDs per tenant/policy, so it's a valuable add to add central management that exists nowhere else yet that I know of. ### PowerShell Commands (Optional) _No response_
Author
Owner

@github-actions[bot] commented on GitHub (Jan 22, 2026):

This issue is stale because it has been open 10 days with no activity. We will close this issue soon. If you want this feature implemented you can contribute it. See: https://docs.cipp.app/dev-documentation/contributing-to-the-code . Please notify the team if you are working on this yourself.

<!-- gh-comment-id:3782127322 --> @github-actions[bot] commented on GitHub (Jan 22, 2026): This issue is stale because it has been open 10 days with no activity. We will close this issue soon. If you want this feature implemented you can contribute it. See: https://docs.cipp.app/dev-documentation/contributing-to-the-code . Please notify the team if you are working on this yourself.
Author
Owner

@TargetCrafter commented on GitHub (Jan 26, 2026):

I would love to see this feature implemented too!

<!-- gh-comment-id:3798272269 --> @TargetCrafter commented on GitHub (Jan 26, 2026): I would love to see this feature implemented too!
Author
Owner

@Nathanymous commented on GitHub (Jan 26, 2026):

This would be awesome and very helpful if implemented!

<!-- gh-comment-id:3798272990 --> @Nathanymous commented on GitHub (Jan 26, 2026): This would be awesome and very helpful if implemented!
Author
Owner

@github-actions[bot] commented on GitHub (Feb 5, 2026):

This issue is stale because it has been open 10 days with no activity. We will close this issue soon. If you want this feature implemented you can contribute it. See: https://docs.cipp.app/dev-documentation/contributing-to-the-code . Please notify the team if you are working on this yourself.

<!-- gh-comment-id:3850707796 --> @github-actions[bot] commented on GitHub (Feb 5, 2026): This issue is stale because it has been open 10 days with no activity. We will close this issue soon. If you want this feature implemented you can contribute it. See: https://docs.cipp.app/dev-documentation/contributing-to-the-code . Please notify the team if you are working on this yourself.
Author
Owner

@swissbuechi commented on GitHub (Feb 5, 2026):

Please also add an option to configure the other options available like Enforce attestation while you're at it.
This needs to be disabled if you want to allow synced Passkeys via Bitwarden etc.

Thank you guys <3

<!-- gh-comment-id:3853971229 --> @swissbuechi commented on GitHub (Feb 5, 2026): Please also add an option to configure the other options available like `Enforce attestation` while you're at it. This needs to be disabled if you want to allow synced Passkeys via Bitwarden etc. Thank you guys <3
Author
Owner

@github-actions[bot] commented on GitHub (Feb 15, 2026):

This issue is stale because it has been open 10 days with no activity. We will close this issue soon. If you want this feature implemented you can contribute it. See: https://docs.cipp.app/dev-documentation/contributing-to-the-code . Please notify the team if you are working on this yourself.

<!-- gh-comment-id:3903047009 --> @github-actions[bot] commented on GitHub (Feb 15, 2026): This issue is stale because it has been open 10 days with no activity. We will close this issue soon. If you want this feature implemented you can contribute it. See: https://docs.cipp.app/dev-documentation/contributing-to-the-code . Please notify the team if you are working on this yourself.
Author
Owner

@swissbuechi commented on GitHub (Feb 15, 2026):

Not stale

<!-- gh-comment-id:3903830418 --> @swissbuechi commented on GitHub (Feb 15, 2026): Not stale
Author
Owner

@KelvinTegelaar commented on GitHub (Feb 15, 2026):

Not stale

Please do not bump feature requests, if it times out, you can resubmit after 30 days.

<!-- gh-comment-id:3904151777 --> @KelvinTegelaar commented on GitHub (Feb 15, 2026): > Not stale Please do not bump feature requests, if it times out, you can resubmit after 30 days.
Author
Owner

@mruiterhype commented on GitHub (Feb 19, 2026):

Would love to see this implemented, especially with Microsoft starting to auto‑enable passkey profiles in March: https://lazyadmin.nl/office-365/auto-enabled-passkey-profiles-in-march-2026/

<!-- gh-comment-id:3926512446 --> @mruiterhype commented on GitHub (Feb 19, 2026): Would love to see this implemented, especially with Microsoft starting to auto‑enable passkey profiles in March: https://lazyadmin.nl/office-365/auto-enabled-passkey-profiles-in-march-2026/
Author
Owner

@github-actions[bot] commented on GitHub (Mar 1, 2026):

This issue is stale because it has been open 10 days with no activity. We will close this issue soon. If you want this feature implemented you can contribute it. See: https://docs.cipp.app/dev-documentation/contributing-to-the-code . Please notify the team if you are working on this yourself.

<!-- gh-comment-id:3978877754 --> @github-actions[bot] commented on GitHub (Mar 1, 2026): This issue is stale because it has been open 10 days with no activity. We will close this issue soon. If you want this feature implemented you can contribute it. See: https://docs.cipp.app/dev-documentation/contributing-to-the-code . Please notify the team if you are working on this yourself.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/CIPP#2491
No description provided.