| Purpose | - Passwordless, phishing-resistant user sign-in.
- Strong cryptographic validation without passwords.
| - Certificate-based authentication using smartcard credentials.
- Common fit for PKI / smartcard environments.
|
| Technology | - FIDO2 / WebAuthn + CTAP.
- Public/private key pairs protected by device security (e.g., TPM).
| - X.509 certificates (PKI).
- Keys/certs stored on smartcard/virtual smartcard (TPM-backed).
|
| Standards | - Open FIDO Alliance standard.
- Broad OS and browser support.
| - PKI-based authentication model.
|
| Authentication | - User validates via TruU FIDO2 Authenticator using biometrics or PIN.
- FIDO2 assertion is used for sign-in where configured.
| - User authenticates with a smartcard certificate.
- Fits Windows smartcard logon / certificate flows.
|
| Device join type | - Supported: Microsoft Entra hybrid joined and Microsoft Entra joined devices.
- Not intended: Active Directory joined only (AD-only) devices.
| - Recommended: Active Directory joined (AD-only) devices for smartcard/CBA logon needs.
- Supported (with prerequisites): Microsoft Entra hybrid joined (see prerequisites/notes).
|
| On-premises resource access | - Hybrid joined: Access via AD trust/Kerberos as normal.
- Entra joined: on-prem access requires Kerberos key trust to obtain Kerberos tickets for AD resources.
| - AD joined: native access to on-prem resources.
- Hybrid joined: can access on-prem resources.
|
| Revocation | - No certificate revocation (CRL/OCSP) lifecycle.
- Remove/disable the registered authenticator to block usage.
| - Certificate revocation via CRLs/OCSP per PKI policy.
|
| Deployment / operations | - Typically, simpler at scale.
- Managed through endpoint and identity policy (e.g., Intune + Entra policies).
| - Requires PKI: certificate issuance, renewal, and lifecycle management.
|
| rerequisites / notes | - Enable TruU FIDO2 Keys in Entra ID.
- Hybrid Entra Joined: Configuring Cloud Kerberos Trust with Microsoft Entra ID is required to user TruU FIDO2 authenticator with Hybrid Entra Joined devices.
- Entra joined: Optional - To access on-prem resources, you need Cloud Kerberos Trust (plus network path such as VPN/proxy as applicable).
| - AD joined: smartcard/CBA is the recommended option when certificate-based logon is required.
- Hybrid joined: to use CBA and still get a PRT for seamless SSO to Microsoft 365/Office apps, enable Microsoft Entra ID CBA (per Entra policy) for Entra ID apps apps can obtain PRT-based SSO.
|