I think it’s actually a Microsoft passkey that provided a way to use passwords with fingerprint technology on the other machine, instead of typing it in the browser. This might well be a PIN ( 4 or 6 digits used on the other machine to unlock or verify it is you)
If that other machine is still available, then disable it:
It’s messy.
To use this, you must have a PIN-enabled login, as passkeys are tied to the device they’re created on—so you’ll need to create a new one for each machine.
Unfortunately, TrimbleID has a flaw in how it handles passkeys: it allows users to create and use Windows-based passkeys as a form of multi-factor authentication. However, Windows doesn’t support validating these passkeys on other devices.
For example, if you create a passkey on a Windows machine and later try to sign in on an iPhone, you’re presented with two options:
1. Scan a QR code with another iPhone (which is unhelpful if you’re already using the only iPhone you have).
2. Use a USB key (which isn’t always practical or supported on mobile).
Here’s where the issue lies: iOS assumes your passkey exists on another Apple device, and offers to authenticate via a FIDO QR code. But the URL that QR code points to (fido://) isn’t supported on Windows, and Windows has no method to validate it. So, in practice, you’re stuck—because the passkey created on Windows can’t be used to sign in on iOS, and TrimbleID doesn’t account for that.