Skip to content
OnMSFT.com
  • Home
  • About
  • Contact
  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Edge
  • Teams
  • Gaming
Menu
  • Home
  • About
  • Contact
  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Edge
  • Teams
  • Gaming
  1. Home
  2. Latest news
  3. Microsoft details how Windows Hello enhances Edge security | On MSFT

Microsoft details how Windows Hello enhances Edge security | On MSFT

Mark Coppock Mark Coppock
April 12, 2016
6 min read

Microsoft details how Windows Hello enhances Edge security

Mark Coppock
8 months ago in Latest news

Microsoft announced at Build 2016 that Windows Hello support will be coming to the company’s Edge browser. Integrating Windows Hello into Edge will bring the convenience and enhanced security of Microsoft’s biometric solution to Web sites, which will make it easier–and thus more likely–to implement robust security. Today, the Microsoft Edge Dev blog provided some additional details on precisely how Windows Hello will be applied in Edge.

Screen Capture showing Windows Hello prompt to log in to a web page

Windows Hello security prompt.

Here’s the impetus behind the integration:

Passwords can be a hassle. Most people don’t create strong passwords or make sure to maintain a different one for every site. People create easy-to-remember passwords and typically use the same passwords across all of their accounts. Surprisingly – and if it’s not surprising to you, you may want to change your password – passwords like “123456” and “password” are very common. Malicious actors can use social engineering, phishing, or key logging techniques to steal passwords from your machine, or they can compromise the server where the passwords are stored. When the same password is used across several sites, compromising one account can expose many others to abuse.

We look forward to a web where the user doesn’t need to remember a password, and the server doesn’t need to store a password in order to authenticate that user. Windows Hello, combined with Web Authentication, enables this vision with biometrics and asymmetric cryptography. In order to authenticate a user, the server sends down a plain text challenge to the browser. Once Microsoft Edge is able to verify the user through Windows Hello, the system will sign the challenge with a private key previously provisioned for this user and send the signature back to the server. If the server can validate the signature using the public key it has for that user and verify the challenge is correct, it can authenticate the user securely.

In other words, by making security more invisible and less intrusive to the user, Microsoft can increase the likelihood of users and Web sites implement robust security measures. No longer will users not to device and manage their own strong passwords–Windows 10, Windows Hello, and Edge will provide a platform to take away that burden entirely.

Some of the methods that will be utilized include the following. Much of this requires the cooperation of a number of organizations and Web developers in general, but it lays a strong foundation. Here’s a summary.

Web Authentication: Passwordless and Two Factor Authentication

We’ve been working at the FIDO Alliance with organizations from across the industry to enable strong credentials and help move the web off of passwords. The main goal of the FIDO Alliance is to standardize these interfaces, so websites can use Windows Hello and other biometric devices across browsers. The FIDO Alliance had recently submitted the FIDO 2.0 proposal to the W3C and the newly formed Web Authentication working group is standardizing these APIs in the W3C Web Authentication specification.

Registering the user

To use Web Auth, you, the identity provider, will first need to create a Web Auth credential for your user using the window.webauthn.makeCredential method.

When you use the makeCredential method, Microsoft Edge will first ask Windows Hello to use face or fingerprint identification to verify that the user is the same user as the one logged into the Windows account. Once this step is completed, Microsoft Passport will generate a public/private key pair and store the private key in the Trusted Platform Module (TPM), the dedicated crypto processor hardware used to store credentials. If the user doesn’t have a TPM enabled device, these keys will be stored in software. These credentials are created per origin, per Windows account, and will not be roamed because they are tied to the device. This means that you’ll need to make sure the user registers to use Windows Hello for every device they use. This makes the credentials even stronger – they can only be used by a particular user on a particular origin on a particular device.

Authenticating the user

Once the credential is created on the client, the next time the user attempts to log into the site, you can offer to sign them in using Windows Hello instead of a password. You will authenticate the user using the window.webauthn.getAssertion call.

The getAssertion call has a number of optional parameters, but the only required parameter is the challenge. This is the challenge that the server will send down to the client. This challenge is a random quantity generated by the server. Since the challenge is not predictable by an attacker, the server can be assured that any assertions it receives were freshly generated in response to this challenge and are not replays of earlier assertions. The allowList parameter also takes an optional list of credential ID information to locate the correct private key. This information is useful if you’re doing two factor auth and you can share the id from the server, where it is stored. In the passwordless case, you don’t want to share the id from the server because the user hasn’t yet authenticated.

Server side authentication

Once you receive the assertion on the server, you will need to validate the signature. The below Node.JS code shows how you would validate the signature to authenticate the user on the server. We also have the same code available in C# and PHP.

Evolving Web Authentication standard and Microsoft Edge implementation

As mentioned above, Microsoft Edge has an early implementation of Web Authentication and there are a number of differences between our implementation and the April 2016 spec.

  • Microsoft Edge APIs are ms- prefixed
  • Microsoft Edge does not yet support external credentials like USB keys or Bluetooth devices. The current
  • API is limited to embedded credentials stored in the TPM.
  • The currently logged in Windows user account must be configured to support at least a PIN, preferably face or fingerprint biometrics. This is to ensure that we can authenticate the access to the TPM.
  • We do not support all of the options in the current Web Auth spec draft, like extensions or timeouts.
  • As mentioned earlier, our implementation requires that the list of acceptable credential IDs be included in every getAssertion call.

If you’re a developer and need to get a head start, then Microsoft has a number of resources available to you:

  • Webauthn.js polyfill. Using this polyfill, you can code to the standard instead of our early implementation. We’ll update this polyfill for every major published version of the specification.
  • Windows Hello in Microsoft Edge test drive sample. This test drive sample shows you the typical client side registration and assertion flow.
  • Server and client side WebAuth This sample code shows the end to end client and server side flow for registration and assertion.
  • C#, PHP, and JS server side sample. These code samples show how could implement your server side logic in a number of language options.
  • Web Authentication MSDN documentation and dev guide.

Windows 10 offers up a number of advancements over previous versions of Windows, and enhanced security is just one of them. We’re looking forward to the day when we can use Windows Hello to authenticate to Web sites and remove one more reason to remember those long and hard-to-recall passwords.

Tweet thisFacebook LikeLinkedinShare on Reddit


Further reading: Developers, Microsoft, Microsoft Edge, Security, web, Web browser, Windows 10, Windows 10 Anniversary Update, Windows Hello

Are you looking forward to using Windows Hello in Edge?

Read these stories next

The final chapter in Batman: The Telltale Series is out right now on Xbox One and Windows 10

Users can now stream HoloLens apps to iOS devices

Reminder: Only 24 hours left to play Mossa and other Xbox Fitness workouts

Microsoft Translator is now the world’s first personal universal translator

Microsoft continues blockchain push with AMIS partnership in Taiwan

Lenovo launches their new Windows 10 2-in1, the Yoga Book, in India

Cortana gets new development tools with Cortana Skills Kit and Cortana Devices SDK

Sign up now for the Calendar.help preview if you want Cortana to schedule your meetings

Share this article:
Tags:
Developers Microsoft Microsoft Edge Security web Web browser Windows 10 Windows 10 Anniversary Update Windows Hello
Previous Article Office 365 helps put the personal in personal stylist | On MSFT Next Article Fallout 4, Forza Motorsport 6 and more games available in this week’s Deals with Gold

Related Articles

Microsoft is no longer manufacturing the Windows RT powered Surface 2

February 23, 2026

Microsoft treats Windows Phone owners with extra 20GB of free SkyDrive storage for one year

February 23, 2026

Bing now comes with Britannica Online answers within search results

February 23, 2026

Leave a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Microsoft is no longer manufacturing the Windows RT powered Surface 2
  • Microsoft treats Windows Phone owners with extra 20GB of free SkyDrive storage for one year
  • Bing now showcases professional and celebrity Klout scores during search results
  • Bing now lets you search and browse for your friends’ Facebook photos
  • Bing now lets you explore free online courses and helps you find books to read

Recent Comments

No comments to show.

Archives

  • February 2026
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • September 2010

Categories

  • Announcements
  • Deals
  • Developer
  • Editorial
  • Feature
  • Feature stories
  • Hero-post
  • Hotdeals
  • How-to
  • Latest news
  • Microsoft / office 365
  • News
  • Office 365
  • Onpodcast
  • Opinion
  • Our featured post
  • Polls
  • Review
  • Reviews
  • Videos
OnMSFT.com

OnMSFT.com covers Microsoft news, reviews, and how-to guides. Formerly known as WinBeta, we have been your source for Microsoft news since 1998.

Categories

  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Gaming
  • Edge
  • Teams

Recent Posts

  • Microsoft is no longer manufacturing the Windows RT powered Surface 2
  • Microsoft treats Windows Phone owners with extra 20GB of free SkyDrive storage for one year
  • Bing now showcases professional and celebrity Klout scores during search results
  • Bing now lets you search and browse for your friends’ Facebook photos
  • Bing now lets you explore free online courses and helps you find books to read

Quick Links

  • About OnMSFT.com
  • Contact OnMSFT
  • Join Our Team
© 2010–2026 OnMSFT.com LLC. All rights reserved.
About OnMSFT.comContact OnMSFT