Passwordless MFA to Entra ID Joined Devices with Secret Double Octopus

Intro: The Problem with Passwords and Federated Entra ID

In today’s hybrid enterprise environments, especially those using Entra ID (Azure AD) with federation via WS‑FED or ADFS, passwords continue to be a significant vulnerability. Cloud-only accounts introduce even more friction, particularly during Windows Autopilot enrollments, where users are still required to enter passwords, even though IT aims to eliminate them entirely.

Microsoft doesn’t natively support full passwordless authentication for cloud-only accounts in federated domains. Windows Hello for Business (WHfB) functions well for pure cloud domains, but once federation is introduced, users are forced back to passwords. To make matters worse, WHfB on Windows devices is only single-factor when using a PIN or camera, not true MFA to the desktop. Since WHfB PINs don’t roam between devices, users on shared or public devices (like bank branches) must enroll the PIN on each machine separately, and eventually remember their password when it needs changing. Microsoft is actively moving toward broader passkey support in the Authenticator app and FIDO2 security keys, but these features are still rolling out and come with configuration complexity.


🧭 Why Federate Entra ID Domains Even in a Cloud-Only Environment

At first glance, it may seem unnecessary to federate your Entra ID domain when all users and devices are cloud-native. Microsoft’s native identity solutions work well in this setup—but they aren’t always enough.

There are several real-world reasons why federation remains critical, even in cloud-first environments:

🏢 Mergers & Acquisitions (M&A)

If your organization acquires a business that uses on-prem Active Directory, or another identity provider (IdP), federation offers a way to centralize authentication without a complete directory migration. SDO enables secure, passwordless access to Microsoft 365 and Entra ID while still allowing the acquired entity to use its existing credentials and devices.

🔐 Investment in a Third-Party IdP or Authenticator

Many organizations have invested heavily in platforms like Okta or Ping Identity. These tools may serve other applications across the enterprise but lack seamless passwordless support for Microsoft endpoints. With SDO as the federated identity provider for Entra ID, you can bridge this gap—preserving your existing IdP for broader SSO while enabling passwordless login for Microsoft environments.

Note: While it’s possible to integrate SDO alongside other IdPs, Microsoft 365 must be federated directly to SDO for passwordless login to function at the Windows level. This hybrid approach can still be effective when managed carefully.

🌐 Multi-Tenant and Multi-Business Unit Environments

Large organizations often operate with multiple business units, each using different identity architectures. Federation via SDO provides a consistent and centralized passwordless strategy—regardless of whether the underlying directory is Entra ID–only, hybrid, or fully on-premises. This reduces helpdesk overhead, improves security, and streamlines compliance.


Federation + Passwordless: How SDO Extends Entra ID

Federated Entra ID domains introduce an unavoidable constraint, Microsoft delegates the sign-in process to the external identity provider, but does not provide a native passwordless path when doing so. This means that once a domain is federated via WS-FED or ADFS, all authentications must be handled by the third-party identity provider. Microsoft’s own passwordless options, such as FIDO2 or Authenticator app-based sign-in, are no longer available at the Windows login screen for users in federated domains.

This gap has traditionally left organizations with two unappealing options: maintain passwords and federation with limited user experience, or abandon federation entirely to adopt cloud-native passwordless solutions, often at the cost of backend directory control or compliance complexity.

Secret Double Octopus changes that equation. By acting as the WS-FED identity provider, SDO takes over the authentication process during Windows login, browser-based sign-in, and Autopilot provisioning. Users in federated domains can now access their Entra ID–joined devices without ever entering a password using mobile push notifications, biometric approvals, or FIDO2 keys instead.


Capability Highlights with Real-World Value

Passwordless authentication is no longer just a buzzword, it’s a critical component of modern identity security. But achieving true passwordless authentication that works across all scenarios, device states, and directory architectures is something only a few platforms can deliver. Secret Double Octopus stands out by providing full support for cloud-only users in federated domains, offering online and offline authentication methods, and resolving major onboarding and usability gaps that are left unsolved by Microsoft’s native tooling. Below are real-world examples of how this platform solves key problems for IT teams and end users alike.

📦 Autopilot & First Login via WS-FED

If you prefer to see a video of this in action rather than reading, please click HERE to jump to the video. Otherwise, please click SHOW MORE below to expand the blog text to continue reading.

🌐 Desktop Authentication via Push & FIDO2

If you prefer to see a video of this in action rather than reading, please click HERE to jump to the video. Otherwise, please click SHOW MORE below to expand the blog text to continue reading.

🛑 Desktop Offline Authentication with Full MFA

Please click SHOW MORE below to expand the blog text to continue reading about this topic.

👤 Creating Users in a Federated Entra ID Environment

If you prefer to see a video of this in action rather than reading, please click HERE to jump to the video. Otherwise, please click SHOW MORE below to expand the blog text to continue reading.

See it in Action: Real-World Passwordless Workflows with Secret Double Octopus

To truly appreciate how Secret Double Octopus enhances authentication in Entra ID environments, watch the video below. This video shows a brand-new machine being joined to Entra ID, Autopilot deploying out the Octopus Desk credential provider and the end user never having to enter in a password. All authentications are secure and biometric based.

▶ Cloud-Only Account Creation with a Federated Domain