Authentication
Hardware Key Authentication Architecture with YubiKey and Azure AD
2023-04-10
Problem
Passwords remain the weakest component of most authentication systems.
They fail in familiar ways:
- credential reuse
- phishing attacks
- password database breaches
Hardware security keys replace shared secrets with device-bound cryptography.
Architecture
Centralize authentication in the identity provider.
User
↓
Hardware Security Key
↓
Azure AD (Identity Provider)
↓
OIDC / SAML Token
↓
Application
Applications trust identity tokens instead of handling authentication themselves.
YubiKey Authentication Modes
YubiKey supports several models.
| Method | Model | Properties |
|---|---|---|
| OTP | shared secret | widely supported but phishing-susceptible |
| FIDO U2F | public key challenge | phishing resistant |
| FIDO2 | passwordless authentication | strong security and usability |
| PIV | smartcard certificate | PKI-based authentication |
The choice matters because each method carries a different trust model.
FIDO Authentication Flow
FIDO uses public-key cryptography.
Application
↓
Authentication challenge
↓
YubiKey signs challenge
↓
Signature verified
The private key never leaves the hardware device.
Authentication is bound to the requesting origin, which limits phishing.
Azure AD Integration
Azure AD remains the authentication authority.
User
↓
Azure AD login
↓
Hardware key verification
↓
Identity token issued
↓
Application access
Applications consume Azure AD tokens.
Authentication Options
OTP (MFA)
User
↓
Password
↓
OTP generated by YubiKey
↓
Azure AD verifies code
Compatible, but weaker against phishing.
FIDO2 Passwordless
User
↓
Azure AD login
↓
Enter device PIN
↓
Touch YubiKey
↓
Authentication success
No password is required.
Phishing resistance is stronger because the private key is scoped to the relying party.
Key Properties
Device-bound authentication
Private keys stay inside the hardware key.
Phishing resistance
FIDO binds authentication to the requesting origin.
Centralized identity
Azure AD enforces the policy boundary.
Conclusion
Hardware security keys move authentication away from shared secrets.
With Azure AD, the pattern is simple: the key proves possession, Azure AD issues identity, and applications consume the result.