Windows 11 Adds System Level Passkey Providers with 1Password and Bitwarden

  • Thread Author
Windows 11 has taken a major step toward a true passwordless desktop by letting third‑party password managers act as system‑level passkey providers — starting with 1Password and Bitwarden — so you can create, store, sync, and use FIDO/WebAuthn passkeys through the vault you already trust while Windows Hello (PIN/face/fingerprint) continues to protect the private key operations locally. This capability arrived as part of the November 2025 cumulative/security update (the release that includes KB5068861) and exposes an “Advanced options” area under Settings > Accounts > Passkeys that lets you register and enable packaged credential manager apps as OS passkey providers.

Windows 11 Settings screen focused on Accounts and Passkeys with glowing neon security icons.Background / overview​

Passkeys are the modern, FIDO‑based replacement for passwords: asymmetric credential pairs where the private key stays on a device (or inside a vault) and the relying party stores only the public key. That model removes the single biggest attack surface for credential theft and phishing because there’s no shared secret to steal or to trick a user into reusing.
Until now, desktop passkey workflows were mostly browser‑centric or stove‑piped to platform vendors: browsers or mobile ecosystems held and synced passkeys, or users relied on cross‑device pairing flows to bring mobile passkeys to a desktop. Microsoft’s OS‑level plugin API changes that by adding a system passkey provider model in Windows 11, enabling packaged credential managers to register with the OS and participate directly in WebAuthn create/get flows. In practical terms, when an app or website asks for a passkey, Windows can forward that request to the registered manager (for example, 1Password) and then gate the private‑key operation with Windows Hello.
  • The OS provides the passkey plumbing and UI flow.
  • Windows Hello remains the local authenticator that verifies the user and authorizes cryptographic operations.
  • The third‑party provider handles discovery, storage, and optional cloud sync of passkeys.
This decouples storage and sync choices from the browser and puts them in the hands of the user or the organization — which is a meaningful usability and security win.

What changed in practical terms​

Native, system‑level passkey providers​

Windows 11 now supports a plugin model so packaged apps (MSIX) can register as passkey providers. Once a provider is registered and enabled under Settings > Accounts > Passkeys > Advanced options, any app or browser on the system that invokes a WebAuthn operation can surface that provider as an option for saving or using a passkey.

Partners and first adopters​

The initial launch is rolling out with support from major password managers. 1Password shipped a Windows client that registers as a system provider (MSIX packaging is required for reliable registration), and Bitwarden has desktop integration available in preview/beta channels. Microsoft also made its own synced passkey provider part of the system (so Microsoft Password Manager in Edge participates as a native provider).

The update that enables it​

This capability was included in Microsoft’s November 2025 cumulative/security release (the patching rollout that contains KB5068861). Devices that install the update and reboot should see the redesigned Passkeys page in Settings with the Advanced options toggle to enable third‑party providers.

How the architecture works — technical breakdown​

Role separation (why it matters)​

The design deliberately separates responsibilities between platform verification and credential management:
  • Windows Hello (and the platform TPM when available) handles local user verification — biometrics or PIN — and performs the cryptographic gating that ensures the user is present and authenticated.
  • The passkey provider (third‑party manager or Microsoft’s provider) stores the credential metadata and private key material (or the encrypted form used for sync) and responds to WebAuthn create/assert operations forwarded by Windows.
This arrangement keeps biometric data and Windows Hello authentication confined to the device (it’s not passed to third parties), while allowing vaults to manage where and how passkeys are stored and synchronized.

WebAuthn routing and plugin API​

When an application calls WebAuthn APIs, Windows can present the Passkeys UI and route the request to whichever registered provider the user chooses. The provider then:
  • Unlocks its vault (in which the passkey private key is stored or wrapped).
  • Performs the requested operation (create a credential or sign an assertion).
  • Returns the response to Windows so the client completes the flow.
MSIX packaging is the registration channel Windows expects for vendor clients; unpackaged EXE installers may not register as a system provider without additional steps.

What you need to use this today​

Before you try, verify these prerequisites are in place:
  • Windows 11 device updated to the November 2025 cumulative/security rollup (the release that contains KB5068861). Install all updates, reboot, and check Settings > Accounts > Passkeys > Advanced options.
  • Windows Hello configured (PIN, fingerprint, or facial recognition) and TPM/Secure Boot enabled where possible for the best system protections.
  • The passkey‑capable version of your password manager:
  • 1Password: install the MSIX packaged Windows build (the MSIX package is required for system registration).
  • Bitwarden: use the desktop beta/preview build that includes system provider support while stable builds roll out.
  • In the password manager, enable any passkey or autofill options required by the vendor (e.g., a “Show passkey suggestions” toggle in 1Password) to trigger onboarding into Windows Settings.
  • Open Settings > Accounts > Passkeys > Advanced options, authenticate with Windows Hello, and enable the provider toggle for your chosen manager.
If the toggle is missing, common causes are not being on the correct Windows update, using an installer that doesn’t register with the OS (EXE vs MSIX), or a short propagation delay — a reboot and allowing 24–48 hours can resolve some rollout‑timing issues.

Step‑by‑step: register 1Password (example)​

  • Update Windows 11 and reboot so Passkeys > Advanced options appears.
  • Install the MSIX build of 1Password on the PC.
  • Open 1Password and enable passkey suggestions (Settings > Autofill > Show passkey suggestions).
  • Windows should redirect you to Settings > Accounts > Passkeys > Advanced options, where you authenticate with Windows Hello and toggle 1Password as a system provider.
  • Visit a site that supports passkeys, choose to register a passkey, and pick 1Password as the save destination; authorize with Windows Hello to complete creation.

Security: the immediate gains​

  • Phishing resistance: Passkeys cannot be phished the way passwords can because challenges are cryptographically tied to the original relying party and there’s no reusable secret to harvest.
  • No server‑side secret: Even if a service leaks its credential database, attackers get public keys only — useless for impersonation.
  • Local biometric gate: Windows Hello verifies the user locally before allowing a passkey operation; biometrics never leave the device.
  • Hardware protections: On capable devices, the private key operations are tied to TPM or platform authenticators, increasing attack cost for adversaries.
Microsoft’s own cloud‑sync path for its Password Manager includes hardware‑backed protections and confidential compute constructs for sensitive operations; third‑party vendors typically bring their existing vault encryption, sync, and recovery models. That means organizations and users gain stronger authentication while retaining different vendor choices for backup and device portability.

Risks, limitations, and what to watch​

The system‑level passkey model is strong overall, but it changes the threat landscape and operational checklist in ways admins and users must understand.

1) MSIX packaging and deployment friction​

The requirement for MSIX packaging (or an equivalent registration surface) means that enterprises with locked‑down deployment models that block MSIX/Store installs may need to adjust policies or work with vendors for enterprise installers. This is a practical, operational risk that can delay adoption.

2) Early availability differences across vendors​

Initial support varies by vendor. 1Password shipped an MSIX build to register as a system provider; Bitwarden’s desktop integration initially appeared in preview/beta channels. That staggered rollout can create UX inconsistencies: some users will see the provider option while others on the same network won’t, depending on Windows build and vendor release channel.

3) Recovery and account regain paths​

Passkeys assume the user has a recoverable device or a provider‑backed recovery mechanism. How passkeys are recovered depends on the vault or sync model:
  • Microsoft’s sync uses account unlock PIN plus Azure protections and recovery primitives.
  • Third‑party managers use their own vault recovery flows — often involving account credentials, recovery codes, or trusted device links.
If a third‑party vault is compromised or inaccessible, recovery paths must be tested and documented. Enterprises should incorporate passkey recovery into identity‑resilience planning.

4) Vendor compromise and supply‑chain risk​

Moving passkeys into third‑party vaults centralizes valuable credentials. A compromise of a password manager vendor or a break in their sync encryption/keys could have significant consequences. Organizations should evaluate vendor security practices, zero‑knowledge architectures, key management, and incident response capability before migrating mission‑critical credentials.

5) UX fragmentation across browsers and apps​

Some legacy apps or non‑standard WebAuthn flows may still require browser extensions or fall back to mobile cross‑device pairing, causing friction. These edge cases will smooth out over time but can trip up early adopters.

6) Compliance and policy complications​

Enterprises often have compliance rules requiring specific data residency, auditing, or logging. Integrating third‑party passkey providers at OS level may require new policy controls, MDM settings, or group policy definitions to ensure allowed providers comply with corporate rules.

Enterprise perspective: why IT teams should care​

For organizations, the implications are significant:
  • Choice and user choice enforcement: IT can permit vetted third‑party providers for employees while maintaining centralized control through Windows Hello and MDM policies.
  • Passwordless rollout at scale: System providers reduce reliance on browser features and make passkeys usable in native apps and old browser engines, easing migration from legacy SSO methods.
  • Deployment planning required: Admins must account for MSIX packaging, enterprise deployment channels, and vendor‑specific installation guidance. Where MSIX is blocked, there may be technical workarounds or vendor enterprise installers to coordinate.
  • Audit and recovery: Passkey creation and use will need to be logged and integrated into identity governance and incident response playbooks, including testing of vault recovery workflows.
Enterprises should pilot with a small group, test provider registration, confirm MDM/AD settings, and document recovery procedures before broad rollouts.

Practical advice for users and admins​

  • Confirm Windows update status: if Settings > Accounts > Passkeys > Advanced options is missing, check Windows Update and install the November 2025 cumulative/security update (the release that includes KB5068861), then reboot.
  • Use Windows Hello and keep a PIN configured as a backup local authenticator. Ensure TPM and Secure Boot are enabled where possible.
  • Prefer vendor guidance: install the vendor build recommended for system provider registration (1Password’s MSIX package, Bitwarden’s preview where applicable). Avoid installing random third‑party packages that claim integration.
  • Maintain at least one alternative recovery method for important services during migration (for example, a security key or documented recovery codes).
  • Test passkey creation and signin flows on non‑critical accounts first, and confirm sync and cross‑device behavior.
  • For administrators: review AppLocker, Intune and group policy settings that might block MSIX packages or packaged app registration, and update deployment plans accordingly.

UX: what users will actually experience​

  • When creating a passkey on a site or app, Windows will show a choice: save to your Microsoft synced passkey store or use a registered third‑party provider.
  • Selecting the third‑party provider will prompt a local Windows Hello verification. After confirmation, the manager saves and/or syncs the passkey.
  • Later sign‑ins show the passkey provider as an autofill option; selecting it again triggers Windows Hello and the passkey assertion completes the login.
  • Native apps, not just browsers, can now use passkeys through the same system flow — a notable user experience improvement.
Expect small inconsistencies during the early rollout: different browsers and apps may surface provider selection slightly differently while vendors refine their desktop onboarding flows.

What’s missing or still evolving​

  • Wider vendor coverage: Microsoft indicated that more password managers will be supported over time; watch for additional vendors to ship MSIX (or registration) updates.
  • Mobile interoperability: while mobile passkey support is mature across vendors, cross‑platform sync and seamless device linking between Windows and mobile providers will continue to improve.
  • Enterprise admin controls: more granular MDM/GPO controls to restrict or allow specific providers are likely to appear as organizations request tighter governance.
  • Documentation maturity: vendor and Microsoft docs are available now, but enterprise playbooks and runbooks will mature as more customers adopt the model.
Where claims about specific build numbers, staged rollout windows, or vendor timelines exist, treat early reports as operational guidance rather than immutable requirements; vendor channels and patch timelines can vary by region and device.

Final analysis — strengths and caveats​

This change is an important milestone for desktop passwordless adoption. By enabling third‑party passkey managers to register at the OS level, Windows 11:
  • Puts real choice back in the hands of users and IT.
  • Improves the usability of passkeys across native apps and browsers.
  • Preserves Windows Hello’s local verification model while allowing vaults to manage sync and recovery.
  • Aligns Windows with modern FIDO/WebAuthn architectures and the broader industry move away from passwords.
However, the rollout isn’t purely technical — it’s operational. Organizations must account for MSIX packaging constraints, vendor rollout gaps, recovery models, and governance requirements. Security gains are real, but they shift some of the trust and risk into vault providers and their sync/recovery designs. Good vendor due diligence, robust recovery planning, and phased deployment will make the difference between a smooth passwordless migration and an operational headache.

What to do next (concise checklist)​

  • Update Windows 11 to the November 11, 2025 cumulative/security release and reboot.
  • Configure Windows Hello and ensure TPM/Secure Boot are enabled where possible.
  • Install the vendor client that supports system passkey registration (MSIX for 1Password; Bitwarden preview where applicable).
  • Enable passkey suggestions in your password manager and register the provider under Settings > Accounts > Passkeys > Advanced options.
  • Test passkey creation and sign‑in for a few non‑critical sites, verify sync across devices, and confirm recovery methods work.
  • For admins: pilot with a small user group, verify deployment policies (Intune/AppLocker), and document recovery and incident response steps.

Windows 11’s move to accept system‑level passkey providers finally lets users keep their chosen vault at the center of passwordless life on a PC. It closes the gap between modern authentication standards and everyday user workflows — while demanding careful rollout planning, vendor scrutiny, and updated governance to realize the full security and usability benefits.

Source: Digital Trends Windows 11 finally lets you use Passkeys through your own password manager
 

Back
Top