Enable Microsoft Edge Linked Account Feature via Intune Policy
Enable the Linked Account Feature in Microsoft Edge with Intune
Linking a personal Microsoft Account (MSA) to an Azure AD identity can streamline sign-in and improve user experience in Microsoft Edge. With Intune’s Settings Catalog, you can roll out this Linked Account policy across your Windows devices in just a few steps. Here’s how to set it up and verify it.
Why Enable Linked Accounts in Edge?
When users link their MSA to your organization’s Azure AD account, they benefit from:
-
Single sign-in across personal and work profiles
-
Seamless access to favorites, passwords, and settings
-
Clear separation of work and personal data in the browser
By enforcing this policy, you ensure everyone gets the same streamlined experience without manual configuration.
Step 1: Create a New Configuration Profile
-
Sign in to the Microsoft Intune admin center.
-
Go to Devices → Configuration profiles.
-
Click + Create profile.
-
Select Platform: Windows 10 and later.
-
Select Profile type: Settings catalog.
-
Click Create.
Step 2: Name and Describe Your Policy
On the Basics tab:
-
Name your policy (e.g., “Enable Edge Linked Account”).
-
Add an optional Description to explain its purpose.
-
Click Next.
Step 3: Configure the Linked Account Setting
-
On the Configuration settings tab, click + Add settings.
-
In the picker, expand Identity and Sign-in under Microsoft Edge.
-
Find Linked Account and set it to Enabled.
-
Click Next.
Step 4: Assign the Policy to Your Devices
-
(Optional) Add Scope tags to filter which admins can see this policy.
-
Under Assignments, click + Add groups.
-
Choose the Azure AD group (for example, “All Corporate PCs”) that should receive the policy.
-
Click Next.
Step 5: Review and Create
-
On the Review + create tab, verify all settings.
-
Click Create.
-
You’ll see a confirmation when the policy is successfully created.
Step 6: Verify Deployment
-
It may take up to eight hours for devices to check in.
-
In Intune, navigate to Devices → Configuration profiles and confirm the policy shows Succeeded.
-
On a client PC, open Event Viewer and go to Applications and Services Logs → Microsoft → Windows → DeviceManagement-Enterprise-Diagnostics-Provider → Admin.
-
Look for Event ID 814, which confirms the policy applied.
By following these steps, you’ll ensure the Linked Account feature in Edge is enabled everywhere in your organization. This gives users a smoother sign-in flow and consistent browser setup—without any manual work on their part.
