# Setting Up Passwordless Workstation Login with Entra ID

## Overview

This guide describes how to configure passwordless login to a Windows workstation joined to Entra ID using virtual smart card technology and the Hideez Authenticator mobile app.

## **Use Case:**

* The user scans a QR code on the locked workstation screen via the Hideez Authenticator app.
* They authenticate in the app using biometrics or a PIN.
* The user selects an account and unlocks the PC — without entering a password.
* Thanks to this technology, there's no need to change the domain account password.

## Prerequisites

* Administrator account on Hideez Enterprise Server.
* Entra ID account with permission to add certificates.
* Hideez Enterprise Server is integrated with Entra ID.
* The root certificate from Hideez Enterprise Server is uploaded to Entra ID.
* The user exists with the same email address in both Hideez Enterprise Server and Entra ID.
* Hideez Authenticator mobile app is registered in the user's Hideez Enterprise Server profile.
* Hideez Client is installed on the workstation.
* The workstation is approved on Hideez Enterprise Server.

## Configuration Steps

### **1. Connect Entra ID to Hideez Server and Retrieve the Certificate**

Follow the instructions for integrating Entra ID with the Hideez Enterprise Server.\
After a successful connection, download the certificate to be used in Entra ID.

<figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2F5Htgn27AVld7e26RaIBd%2Fimage.png?alt=media&#x26;token=579285fd-6679-4d78-9630-acaec750c1b5" alt=""><figcaption></figcaption></figure>

### **2. Upload the Root Certificate to Entra ID**

1. Log in to Microsoft Entra Admin Center: [https://entra.microsoft.com](https://entra.microsoft.com/)
2. Type "Security" in the search field.

<figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2F9nB2VWFyZToPptgW8TsM%2Fimage.png?alt=media&#x26;token=434a8626-5360-408f-ab43-c06f119ec521" alt=""><figcaption></figcaption></figure>

3. Create a Public Key Infrastructure:\
   `Security → Public Key Infrastructure → Create PKI`

<figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FwMf1vaxhgx9OVNpFYbds%2Fimage.png?alt=media&#x26;token=16cc35df-99e6-4ccf-a642-e4ff704cfc42" alt="" width="563"><figcaption></figcaption></figure>

<figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2F81RUGmjEkfKF9djPHRqy%2Fimage.png?alt=media&#x26;token=4670ce13-6b1e-4e50-b2ce-e102c9f824cd" alt="" width="563"><figcaption></figcaption></figure>

4. Open the created PKI and add a Certificate Authority (CA):

<figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FhWxmkkXk6ojblb9EJKHT%2Fimage.png?alt=media&#x26;token=f5dd308b-a3ae-419e-9b96-5a8bb907e522" alt=""><figcaption></figcaption></figure>

* Click **Add CA** → **Upload the certificate file from Hideez Enterprise Server.**

<figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2Fuqzm7AiOcxnv75e4vuyG%2Fimage.png?alt=media&#x26;token=3d718110-b8cf-403e-8b30-6fb3d3df29a3" alt=""><figcaption></figcaption></figure>

* **Certificate Revocation List URL** — leave this field empty.

5. Save changes.

{% hint style="info" %}
More details: *How to:*&#x4D;ore details: [How to: Configure Certificate Authorities (Microsoft)](https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-certificate-based-authentication#configure-certificate-authorities-by-using-the-microsoft-entra-admin-center)
{% endhint %}

### **3. Set Up Certificate-Based Authentication (CBA)**

Allow users to sign in without a password using a certificate issued by Hideez Enterprise Server and the Hideez Authenticator app.

1. **Create a User Group**
   * Go to: `Users → Groups`
   * Create a **Security Group** (e.g., "Smartcard logon").
   * Add users who will authenticate via Hideez Authenticator.
2. **Enable Certificate-Based Authentication for the Group**

* Navigate to: `Protection → Authentication Methods → Certificate-Based Authentication`

<figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FF0b4Enq6aVmg1U5STvub%2Fimage.png?alt=media&#x26;token=f8de8cff-da70-4c91-9d27-b9035e4f40da" alt=""><figcaption></figcaption></figure>

* Click **Add Group**

<figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FrGi3bWpbUa02TykXvmQ2%2Fimage.png?alt=media&#x26;token=194498e2-c31d-4ea9-b3cc-204ca338f123" alt=""><figcaption></figcaption></figure>

* Enable the method and add the created group

3. **Configure Authentication Binding**

* Select the group and click **Configure**

<figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FYuArwMFlwkZufRkGCmwM%2Fimage.png?alt=media&#x26;token=2b0b35bd-6b4a-486a-975e-e4edb9e48132" alt=""><figcaption></figcaption></figure>

* Set up **Authentication binding** as follows:

<figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FKaks9oNHPYoa4JQ8w5MP%2Fimage.png?alt=media&#x26;token=1f9803ef-f928-4100-bbe7-c1d2363b0679" alt="" width="563"><figcaption></figcaption></figure>

4. Set up **Username Binding** as follows:

* Click **Add rule** → Certificate field: `PrincipalName`
* Click **Add rule** → Certificate field: `RFC822Name`

<figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FOf5zcU9pyTyqekCQ0fWg%2Fimage.png?alt=media&#x26;token=5ab8c8a1-24dd-4287-bb3d-7e84b34b3e5a" alt=""><figcaption></figcaption></figure>

<figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FbWQHqvmlZg4JkmwHmgJD%2Fimage.png?alt=media&#x26;token=5c306497-f894-45e8-af50-3fd0f618c5f9" alt=""><figcaption></figcaption></figure>

This ensures a proper match between the certificate and the Entra ID account.

5. **Enable Multi-Factor Authentication (Optional)** If your tenant’s security policy requires MFA, make sure it’s enabled for this group.

{% hint style="info" %}
More details: *How to:* [*Configure Certificate Authorities (Microsoft)*](https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-certificate-based-authentication#step-2-enable-cba-on-the-tenant)
{% endhint %}

### 4. Create a Passwordless Login Account

1. Sign in to the Entra ID account on the workstation.
2. Launch **Hideez Client** → Go to: `Mobile → Passwordless Authorization`
3. Scan the QR code with the **Hideez Authenticator** app.
4. The app will create a passwordless login account.

From now on, you can log in without entering a password.

### Additional: Offline Mode

If there is no internet connection, you can unlock the workstation using offline codes. These codes are generated in the Hideez Authenticator app, automatically updated after each successful online login, and stored in the TPM module of your PC.

**How to use an offline code:**

1. On the lock screen, click “Unlock with offline code.”
2. In the Hideez Authenticator app:

   * Select the relevant account under the “Workstations” section.
   * Tap **Show Offline Code**.

   <figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FxMZ5JQ6Zzn9kg2Py6MpK%2Fimage.png?alt=media&#x26;token=638854a2-0671-4e15-9cd7-3d717a25bd29" alt="" width="296"><figcaption></figcaption></figure>
3. Enter the generated code on the PC to authenticate.

<figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FroB2cyHDpKiKeiBQySom%2Fimage.png?alt=media&#x26;token=920d1e4b-0b61-4095-84e7-a17140018bd5" alt="" width="563"><figcaption></figcaption></figure>
