Deploying Okta Verify + FastPass on Windows Without Blocking on Windows Hello for Business
Multi-Factor Authentication
Okta Identity Engine
Overview

Many organizations try to launch three technologies at once—Okta Verify, FastPass, and Windows Hello for Business (WHfB). Because WHfB adoption lags behind biometric solutions on macOS and mobile, tying the projects together often slows everything down.

Passwordless authentication on Windows requires WHfB. Decoupling its rollout from Okta Verify + FastPass reduces support issues by avoiding the simultaneous setup of two interdependent systems.

Applies To
  • Okta Identity Engine
  • Multi-Factor Authentication
  • Windows 10/11
  • Okta Verify 9.x+
Solution

Key concepts

ComponentRole in authenticationCommon admin misconception
Okta VerifyDevice-bound authenticator installed on WindowsRequires WHfB at enrollment (it does not)
FastPassOkta’s phishing-resistant, device-based login flowNeeds WHfB biometrics on day 1 (it does not)
Windows Hello for BusinessProvides the OS-native user-verification (UV) used by FastPass on WindowsMust be rolled out at the same time as Okta Verify (it should not)

NOTE: WHfB always stores a PIN key—even if biometrics is enabled. Okta cannot distinguish whether the user unlocked WHfB with their face/fingerprint or PIN.

 

Recommended rollout sequence

PhaseGoalAdmin actionsReferences
1. Rollout WHfBGet WHfB provisioned on corporate devices.
  • Push an Intune or other MDM configuration profile that forces WHfB setup.
Microsoft docs → Configure WHfB using Intune
2. Deploy Okta Verify and FastPass

Let users enroll in Okta Verify and FastPass today, even if WHfB is not ready.

Allow users to authenticate with a certificate-based check.

  • From the Okta Admin Console, go to SecurityAuthenticatorsOkta Verify, then select edit.
  • Set Device passcode or biometric user verification to Preferred.
  • Configure your Okta application sign-on policy rules for Windows such that user verification is not required. Deselect the Require user interaction checkbox for FastPass to serve as a silent factor, or select Any user interaction

Okta docs → Configure Okta Verify options


Biometric user verification in authentication policies

3. Inform & nudge usersRemind laggards to finish setting up WHfB.
  • Create an Okta Device Assurance policy that checks whether Windows Hello is enrolled.
  • Set a Grace period (e.g., 30 days) so users see a notification of the requirement but aren’t blocked.
Okta docs → Add Device Assurance policies
4. Track WHfB adoptionEnsure the MDM policy is taking effect.
  • Use Intune/Omnissa reports to monitor WHfB status.
  • Follow up with out-of-compliance users.
Microsoft docs → Intune device configuration assignment status
5. Enforce UV in OktaEnforce passwordless, phishing-resistant sign-in.
  • Remove the grace period for any Device Assurance policies enforcing Windows Hello.
  • In sign-on policies, set Require user interaction
  •  to Require device passcode or biometric user verification.
Okta docs → Biometric user verification in authentication policies

 

End-user experience timeline

  1. Day 0: User installs Okta Verify and enrolls FastPass. They may optionally skip enabling Windows Hello since it is not required

  2. During grace period: User sees a recurring message in the Okta sign-in widget informing them to finish setting up Windows Hello. They will see this message for any sign-in if Okta Verify does not detect that Windows Hello is set up.
    Widget  

  3. After deadline: If WHfB is not configured, sign-in is denied. The user will see a message indicating that access was denied because Windows Hello setup has not been completed.
    Error  

 

Tips & Summary

  1. Push WHfB silently with MDM.

  2. Launch Okta Verify + FastPass immediately with UV set to Preferred.

  3. Use Device Assurance to set a deadline and communicate expectations.

  4. Monitor adoption in MDM dashboards.

  5. Enforce user verification once coverage is high.

Following this phased approach lets a workforce enjoy passwordless, phishing-resistant logins right away—without waiting for every Windows user to finish Windows Hello enrollment.

 

Recommended content

No recommended content found...