December 10, 2025 • Mary Marshall
Hybrid Passwordless for Shared Workstations: Beyond TPM Dependencies
Discover how hybrid passwordless authentication secures shared workstations without TPM constraints—and why IAM is the smarter path forward.

The promise of passwordless authentication is compelling: eliminate the weakest link in enterprise security, reduce help desk burden, and deliver frictionless user experiences. But for organizations managing shared workstations—manufacturing floors, hospital nursing stations, retail kiosks, call centers, and government facilities—the standard playbook breaks down fast.
Most passwordless frameworks lean heavily on device-bound credentials anchored to a Trusted Platform Module (TPM) chip. The assumption is simple: one user, one device, one cryptographic key. But shared workstations shatter that assumption entirely. When dozens of employees cycle through the same terminal across shifts, TPM-based passkeys become architecturally incompatible with real-world operations. And yet, these environments carry some of the highest security risk in any enterprise.
So where does that leave security leaders? Stuck choosing between convenience and security—unless they rethink the model entirely.
Why TPM-Centric Passwordless Fails Shared Environments
TPM chips store cryptographic keys tied to a specific device and, in many implementations, to a specific user profile on that device. Technologies like Windows Hello for Business depend on this binding to function. In a shared workstation scenario, this creates immediate friction:
- Multi-user enrollment conflicts: TPM-backed credentials require each user to enroll individually on each physical device. In environments with hundreds of shared terminals, this becomes operationally untenable.
- Session isolation challenges: Shared workstations require rapid user switching, often without full logoff cycles. Device-bound credentials don’t gracefully support this pattern.
- Hardware dependency risk: Not all shared endpoints—particularly legacy terminals in manufacturing or healthcare—even include a TPM 2.0 chip. According to Microsoft’s own deployment guidance, Windows Hello for Business requires TPM 1.2 minimum, with TPM 2.0 strongly recommended. Retrofitting aging hardware is costly and slow.
The result? Many organizations either exclude shared workstations from passwordless initiatives altogether, or they deploy weaker compensating controls that introduce new vulnerabilities—defeating the entire purpose.
The Hybrid Passwordless Model: A More Practical Path
Hybrid passwordless authentication decouples the credential from the device without abandoning strong authentication principles. Instead of relying solely on hardware-bound keys, it layers multiple signals and factors to authenticate users in a way that’s portable, context-aware, and workstation-agnostic.
A well-architected hybrid approach typically combines:
1. Identity-Centric Authentication (Not Device-Centric) Rather than anchoring trust to the workstation’s TPM, the hybrid model anchors trust to the user’s verified identity—delivered through a mobile authenticator, smart card, FIDO2 security key, or biometric enrolled on a personal device. The workstation becomes a dumb terminal in the authentication chain, not the root of trust.
2. Adaptive, Context-Aware Policies AI-driven identity platforms assess real-time risk signals—location, time of access, device health, behavioral patterns—and adjust authentication requirements dynamically. A nurse authenticating from a known hospital floor at the start of their shift presents very different risk than the same credential used from an unfamiliar IP at 3 a.m.
3. Self-Service Credential Management Shared workstation users still need a recovery path. Avatier’s Identity Anywhere Password Management platform provides exactly this—a self-service layer that eliminates help desk dependency while maintaining compliance controls. Users can reset, recover, or re-authenticate through secure, policy-driven workflows that don’t require IT intervention.
4. Centralized Session and Access Governance Every session on a shared workstation must be auditable. Hybrid passwordless implementations need to log who accessed what, when, and for how long—even when TPM device attestation isn’t available. This is where Access Governance capabilities become critical, providing the audit trail and access certification workflows that compliance mandates require.
The Security Stakes Are Higher Than You Think
Shared workstations are disproportionately targeted in enterprise breaches—not because attackers are sophisticated, but because defenses are often weakest there. According to Verizon’s Data Breach Investigations Report, credentials remain the top attack vector in breaches year over year, accounting for over 80% of hacking-related incidents.
In environments where passwords are shared informally among shift workers—a shockingly common practice in manufacturing, healthcare, and hospitality—the attack surface expands dramatically. A single compromised shared credential can provide lateral movement across an entire operational environment.
This is precisely why zero-trust principles matter here. Zero trust doesn’t assume any session is legitimate simply because it originated from an internal workstation. It requires continuous verification, least-privilege access, and real-time session monitoring—capabilities that TPM-only passwordless frameworks can’t deliver on shared hardware.
Why Okta and Microsoft Fall Short in Shared Workstation Scenarios
If you’re evaluating Okta or relying on Microsoft Entra ID for passwordless, it’s worth stress-testing their shared workstation story before committing.
Okta’s Device Trust and FastPass solutions are built around managed, individual devices. Their documentation acknowledges that shared device scenarios require additional configuration complexity and often push organizations toward Okta’s Workforce Identity Cloud add-ons—at significant additional cost. For large frontline workforces, this licensing model doesn’t scale.
Microsoft’s hybrid passwordless story, while improving, remains tightly coupled to Azure AD joined devices and Windows Hello infrastructure. Organizations with heterogeneous environments—Linux terminals, legacy Windows, kiosk-mode devices—find the coverage gaps frustrating. More critically, Microsoft’s shared PC mode explicitly disables Windows Hello, leaving those workstations in a passwordless blind spot.
SailPoint focuses heavily on identity governance and provisioning but lacks native passwordless authentication capabilities, requiring third-party integration to bridge that gap. If you’re a SailPoint customer managing shared endpoint environments, you’re likely still patching together point solutions to cover this use case.
Avatier’s architecture takes a different approach. Built on a containerized, deployment-flexible foundation—including its industry-first Identity-as-a-Container (IDaaC) model—Avatier can deploy authentication and access workflows across cloud, on-premises, and hybrid environments without hardware dependency constraints. That flexibility is exactly what shared workstation scenarios demand.
What a Modern Hybrid Passwordless Deployment Looks Like
For a manufacturing organization with 500 shared terminals across three facilities, a hybrid passwordless deployment might look like this:
- FIDO2 security keys issued per employee (not per device), carried on a lanyard or badge. The key travels with the user, not the workstation.
- Avatier’s self-service password management handles any fallback scenarios, providing browser-based or mobile-based identity verification without requiring help desk escalation.
- Adaptive MFA policies enforce step-up authentication based on the sensitivity of the system being accessed—ERP data requires a higher assurance level than clocking in for a shift.
- Centralized access governance ensures every session is logged, access rights are certified quarterly, and terminated employees are deprovisioned automatically—regardless of which physical workstation they last used.
- AI-driven anomaly detection flags unusual access patterns, such as a user authenticating simultaneously from two different facilities, triggering automated remediation workflows.
This architecture doesn’t require every workstation to have a TPM. It doesn’t require every user to have a corporate-managed personal device. It requires a strong identity platform at the center—one that treats the user’s verified identity as the perimeter.
Compliance Implications You Can’t Ignore
Regulated industries have specific obligations that make shared workstation authentication a compliance matter, not just an IT preference.
- HIPAA requires covered entities to implement technical safeguards ensuring that only authorized users access electronic protected health information (ePHI). Shared passwords on nursing station workstations are a direct HIPAA violation risk.
- NERC CIP mandates strict access controls for operational technology environments in energy—including shared control room terminals.
- NIST SP 800-53 access control requirements (AC-2, AC-3, AC-7) apply directly to shared workstation environments in federal and government contexts.
Avatier’s Governance, Risk, and Compliance solutions map authentication and access controls directly to these frameworks, providing automated evidence collection and audit-ready reporting—so your shared workstation deployment doesn’t become a compliance liability.
The Bottom Line for Security Leaders
Passwordless authentication is the right direction. But treating TPM-bound, device-centric credentials as the only path to passwordless leaves a significant portion of your workforce—and your attack surface—unaddressed.
Hybrid passwordless, built on an AI-driven, identity-centric platform, solves what TPM dependencies can’t. It extends strong authentication to shared workstations, frontline workers, and legacy environments without compromising on security posture or compliance obligations.
For organizations ready to move beyond patchwork solutions and point-product complexity, Avatier’s Identity Anywhere Password Management platform provides the self-service, policy-driven, and AI-enhanced foundation to make hybrid passwordless a reality—across every endpoint, every shift, and every user.
The workstation doesn’t have to be trusted. The identity does.









