
Configure OneDrive Auto Sign-in Using Intune: Complete Enterprise Guide
Deploy OneDrive silent account configuration via Intune to automatically sign users into the sync app using Windows credentials. Covers MFA considerations and troubleshooting
Overview
This tutorial walks IT administrators through deploying the SilentAccountConfig policy via Intune) Settings Catalog. Upon completion, users signed into Microsoft Entra ID-joined or Hybrid Entra ID-joined devices will have OneDrive automatically configured without manual credential entry. The guide also addresses the critical MFA limitation and provides workarounds for enterprise environments requiring multi-factor authentication.
Prerequisites
Before proceeding, ensure the following requirements are met:
| Requirement | Details |
|---|---|
| Intune License | Microsoft Intune Plan 1 or Microsoft 365 E3/E5 or Microsoft 365 Business Premium |
| Device Enrollment | Windows devices enrolled in Intune MDM) |
| Operating System | Windows 10 1709+ or Windows 11 |
| Device Join State | Microsoft Entra ID joined or Hybrid Entra ID joined |
| OneDrive Version | Sync client build 18.111.0603.0004 or later |
| User License | Microsoft 365 license including OneDrive for Business |
| MFA Status | Silent config does NOT work with MFA enabled |
Verify Device Join Status
Run this command on target devices to confirm Entra ID join status:
powershell
dsregcmd /status
Look for these values:
AzureAdJoined : YESAzureAdPrt : YES(Primary Refresh Token required for SSO)
Understanding Silent Account Configuration
The SilentAccountConfig policy enables OneDrive to automatically authenticate users using their Windows Primary Account credentials. When enabled:
- OneDrive detects the signed-in Windows account (must be Entra ID-based)
- Uses the Primary Refresh Token (PRT) to silently authenticate
- Configures the sync client without user interaction
- Users still see the OneDrive Setup wizard to select folders and location
Registry Keys Created
When deployed via Intune, the following registry entries are created:
[HKLM\SOFTWARE\Policies\Microsoft\OneDrive]
"SilentAccountConfig"=dword:00000001
[HKLM\SOFTWARE\Microsoft\PolicyManager\current\device\OneDriveNGSCv2~Policy~OneDriveNGSC]
"SilentAccountConfig_Container"=dword:00000001
MFA Considerations
⚠️ Critical Limitation: Silent account configuration will NOT work for users who require multi-factor authentication at sign-in.
Workarounds for MFA environments:
- Conditional Access Exclusion: Create a CA policy that excludes compliant, Entra ID-joined devices from MFA requirements for OneDrive
- Trusted Location: Exempt corporate network locations from MFA for the OneDrive application
- Primary Refresh Token: Ensure devices have a valid PRT which satisfies MFA claims on compliant devices
- Prompt Policy Fallback: Enable "Prompt users to move Windows known folders to OneDrive" as a backup for silent failures
Step-by-Step Tutorial
Access Intune Admin Center
Navigate to the policy creation interface.
- Open your browser and go to https://intune.microsoft.com
- Sign in with an account that has Intune Administrator or Global Administrator rights
- Navigate to Devices → Windows → Configuration
- Click Create → New Policy

Configure Profile Basics
Define the profile type and metadata.
- Select the following options:
- Platform: Windows 10 and later
- Profile type: Settings catalog
- Click Create
- On the Basics tab, enter:
- Name:
OneDrive - Silent Account Configuration - Description: `Automatically signs users into OneDrive sync app using Windows credentials. Deployed via Settings Catalog.
- Name:
- Click Next

Add Silent Sign-in Setting
Configure the SilentAccountConfig policy.
- Click + Add settings
- In the Settings picker, search for:
Silently sign in users to the OneDrive - Expand the OneDrive category
- Select: Silently sign in users to the OneDrive sync app with their Windows credentials
- Close the settings picker- Set the toggle to Enabled
- Click Next
Configure Scope Tags (Optional)
Apply administrative scope if required.
- Select appropriate scope tags for your organization
- If not using scope tags, leave as Default
- Click Next

Assign the Policy
Target the policy to appropriate groups.
- Click + Add groups
- Select a Microsoft Entra security group containing:
- Pilot group first: Start with 50-100 test users
- Production rollout: Expand to larger groups after validation
- Optionally add exclusion groups
- Click Next

Review and Create
Validate and deploy the policy.
- Review all configuration settings
- Verify assignments are correct
- Click Create
Recommendation & Troubleshooting
For complete OneDrive automation, combine Silent Account Config with Known Folder Move (KFM).
Recommended Additional Settings
Create a second Settings Catalog policy or add these to the existing profile:
| Setting | Value | Purpose |
|---|---|---|
| Silently move Windows known folders to OneDrive | Enabled + Tenant ID | Auto-redirects Desktop, Documents, Pictures |
| Prompt users to move Windows known folders to OneDrive | Enabled + Tenant ID | Fallback if silent fails |
| Prevent users from redirecting their Windows known folders to their PC | Enabled | Blocks user opt-out |
| Use OneDrive Files On-Demand | Enabled | Saves local disk space |
| Allow syncing OneDrive accounts for only specific organizations | Enabled + Tenant ID | Security: blocks personal accounts |
Find Your Tenant ID
# Via Microsoft Graph PowerShell
Connect-MgGraph -Scopes "Organization.Read.All"
Get-MgOrganization | Select-Object Id, DisplayName
Or navigate to: Microsoft Entra admin center → Overview → Tenant ID
KFM Registry Verification
After deployment, verify these keys exist:
[HKLM\SOFTWARE\Policies\Microsoft\OneDrive]
"KFMSilentOptIn"="<Your-Tenant-ID>"
"KFMSilentOptInWithNotification"=dword:00000001
Deploy and Synchronize
Force Policy Sync
To expedite deployment during testing:
Method 1: Company Portal
- Open Company Portal app
- Go to Settings
- Click Sync
Method 2: PowerShell
## Trigger Intune sync
$EnrollmentID = Get-ScheduledTask | Where-Object {$_.TaskPath -like "*Microsoft*Windows*EnterpriseMgmt*"} | Select-Object -ExpandProperty TaskPath -First 1
$EnrollmentID = $EnrollmentID.Split('\')[5]
Get-ScheduledTask | Where-Object {$_.TaskPath -eq "\Microsoft\Windows\EnterpriseMgmt\$EnrollmentID\"} | Start-ScheduledTask
Method 3: Settings App
- Open Settings → Accounts → Access work or school
- Select your organization connection
- Click Info → Sync
Monitor Deployment Status
Intune Admin Center
- Navigate to Devices → Windows → Configuration
- Select OneDrive - Silent Account Configuration
- Review the overview dashboard:
- Succeeded: Policy applied successfully
- Pending: Awaiting device check-in
- Failed: Requires investigation
- Click View report for detailed device-level status
Per-Device Report
For failed deployments, check:
- Click on the device name
- Review the Settings status section
- Note any error codes for troubleshooting
Verify on Endpoint
Visual Verification
- Log into the Windows device with a targeted user account
- Look for the OneDrive cloud icon in the system tray
- Blue icon: Signed in and syncing
- Gray icon: Not signed in (policy may have failed)
- Click the icon to verify the correct account is connected
Registry Verification
## Check policy deployment
Get-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\OneDrive" -Name SilentAccountConfig -ErrorAction SilentlyContinue
## Check silent config completion flag
Get-ItemProperty -Path "HKCU:\Software\Microsoft\OneDrive" -Name SilentBusinessConfigCompleted -ErrorAction SilentlyContinue
Expected values:
SilentAccountConfig = 1SilentBusinessConfigCompleted = 1
Event Log Verification
## Query Intune diagnostic events
Get-WinEvent -LogName "Microsoft-Windows-DeviceManagement-Enterprise-Diagnostics-Provider/Admin" |
Where-Object {$_.Id -eq 814 -and $_.Message -like "*SilentAccountConfig*"} |
Select-Object TimeCreated, Message -First 5
Troubleshooting
Common Issues and Solutions
Issue 1: OneDrive Shows "Set up OneDrive" Instead of Auto Sign-in
Possible Causes:
- MFA is required for the user
- Device is not properly Entra ID joined
- Primary Refresh Token is missing or expired
Resolution:
# Verify PRT status
dsregcmd /status | Select-String -Pattern "AzureAdPrt"
# If AzureAdPrt : NO, try:
# 1. Lock and unlock the workstation
# 2. Sign out and sign back in
# 3. Run: dsregcmd /refreshprt
Issue 2: Policy Shows as Applied but OneDrive Not Configured
Resolution:
- Clear previous silent config attempts:
# Run as the affected user
Remove-ItemProperty -Path "HKCU:\Software\Microsoft\OneDrive" -Name "SilentBusinessConfigCompleted" -ErrorAction SilentlyContinue
Remove-ItemProperty -Path "HKCU:\Software\Microsoft\OneDrive" -Name "ClientEverSignedIn" -ErrorAction SilentlyContinue
Remove-ItemProperty -Path "HKCU:\Software\Microsoft\OneDrive" -Name "PersonalUnlinkedTimeStamp" -ErrorAction SilentlyContinue
- Reset OneDrive:
& "$env:LOCALAPPDATA\Microsoft\OneDrive\OneDrive.exe" /reset
Start-Sleep -Seconds 10
& "$env:LOCALAPPDATA\Microsoft\OneDrive\OneDrive.exe"
Issue 3: Event ID 814 Shows Policy Error
Check the diagnostic log:
Get-WinEvent -LogName "Microsoft-Windows-DeviceManagement-Enterprise-Diagnostics-Provider/Admin" -MaxEvents 50 |
Where-Object {$_.Message -like "*OneDrive*"} |
Format-List TimeCreated, Id, Message
Look for:
- Event ID 813: Policy processing started
- Event ID 814: Policy applied successfully
- Event ID 404: Policy application failed
Issue 4: Generate MDM Diagnostic Report
For escalation to Microsoft Support:
- Go to Settings → Accounts → Access work or school
- Select your organization
- Click Info → Create report
- Share the generated report with support
Rollback Procedure
To remove the policy configuration:
# Remove machine-level policy keys
Remove-Item -Path "HKLM:\SOFTWARE\Policies\Microsoft\OneDrive" -Recurse -Force -ErrorAction SilentlyContinue
# Remove user-level completion flags
Remove-ItemProperty -Path "HKCU:\Software\Microsoft\OneDrive" -Name "SilentBusinessConfigCompleted" -Force -ErrorAction SilentlyContinue
# Restart OneDrive
Stop-Process -Name "OneDrive" -Force -ErrorAction SilentlyContinue
Start-Process "$env:LOCALAPPDATA\Microsoft\OneDrive\OneDrive.exe"
Conclusion
Deploying OneDrive silent account configuration via Intune significantly improves user experience and ensures consistent data protection across your organization. By combining this with Known Folder Move policies, you create a seamless onboarding experience where users' critical files are automatically backed up to the cloud from day one.
Key takeaways:
- Silent configuration requires Entra ID-joined or Hybrid Entra ID-joined devices with valid PRT
- MFA must be excluded or satisfied via device compliance for silent sign-in to work
- Always pilot to a small group before organization-wide deployment
- Combine with KFM policies for complete OneDrive automation
- Monitor deployment via Intune reports and Event ID 814 on endpoints
For organizations with strict MFA requirements, consider implementing device-based Conditional Access policies that satisfy MFA claims for compliant, managed devices - this allows silent sign-in while maintaining security posture.
Frequently Asked Questions
No. Silent account configuration explicitly does not support multi-factor authentication. The feature relies on Single Sign-On (SSO) via the Windows Primary Refresh Token (PRT). If your Conditional Access policies require MFA for all cloud apps, you must either exclude OneDrive from MFA requirements on compliant devices or accept that users will need to manually sign in.
OneDrive will sign in using the Windows Primary Account - the account used to sign into Windows. If users have additional accounts, they can add them manually after the initial silent configuration completes.
Yes. For Active Directory-joined devices not managed by Intune, use the OneDrive Group Policy ADMX templates. The policy is located at: Computer Configuration → Administrative Templates → OneDrive → Silently sign in users to the OneDrive sync app with their Windows credentials.
Typically 15-60 minutes after device check-in. You can force a sync from the Company Portal or Settings app to expedite. The policy requires OneDrive to restart to take effect.
Yes. Windows 365 Cloud PCs that are Entra ID-joined will receive and process the policy. Ensure the Cloud PC has a valid PRT by verifying with dsregcmd /status.
Silent Sign-in (SilentAccountConfig): Automatically authenticates the user to OneDrive without credential prompts. Known Folder Move (KFM): Redirects Desktop, Documents, and Pictures folders to OneDrive for automatic backup. These are separate but complementary features. Microsoft recommends enabling both for optimal user experience.



Comments
Want to join the discussion?
Create an account to unlock exclusive member content, save your favorite articles, and join our community of IT professionals.
New here? Create a free account to get started.