



At the end of this article, you will be able to sign in to both your Azure AD and hybrid Azure AD joined Windows 10 devices with your Azure AD account using a FIDO2 security key. This wasn't applicable for me though.This document focuses on enabling FIDO2 security key based passwordless authentication with Windows 10 devices. Google Chrome uses this to manage Fido2 keys from the browser dev tools. Thanks to the comments, I learnt that there is an API for managing Fido2 keys in Windows, but it's available only for Windows 11, starting from version 22H2. I’m not sure how to get around this problem. I've been looking at this github repo which gives a more simplified interface over that same certutil command. I only see them using my non-admin account (from a non-elevated Powershell), but I can’t delete them from that account :).

The problem with this is that the archive that contains the keys is user-specific, so when I use an elevated Powershell, I don’t see the keys for my non-admin account. The only way is apparently running this command from an elevated powershell: certutil -csp NGC -key I’ve been looking for a way to delete them. While working on this project, I generated several FIDO2 keys on Windows Hello in my laptop (OS: Windows 10 Enterprise 22H2) using a non-admin account. I’ve recently been working on a project involving FIDO2.
