Anavem
Languagefr
How to Control Sign-in Input Methods on Windows Login Screen Using Intune

How to Control Sign-in Input Methods on Windows Login Screen Using Intune

Configure Microsoft Intune policies to standardize keyboard layouts and input methods on Windows sign-in screens, improving enterprise security and reducing user confusion through Settings Catalog profiles.

April 25, 2026 18 min
hardintune 9 steps 18 min

Why Control Sign-in Input Methods in Enterprise Environments?

Managing sign-in input methods on Windows devices has become increasingly critical for enterprise security and user experience standardization. When users can freely switch between different keyboard layouts, input method editors (IMEs), or authentication methods during sign-in, it creates potential security vulnerabilities and support challenges.

Traditional approaches using Group Policy are being phased out in favor of cloud-based management through Microsoft Intune. However, controlling input methods specifically at the Windows sign-in screen presents unique challenges since Microsoft doesn't provide direct policy controls for this functionality.

What Authentication Methods Can Intune Control at Sign-in?

While direct input method control isn't available, Intune offers several related capabilities that achieve similar security goals. You can restrict which users can sign in locally, implement Windows Hello for Business to reduce keyboard dependency, enable Web Sign-in for browser-based authentication, and use custom OMA-URI settings to target specific registry keys related to input methods.

This tutorial demonstrates a comprehensive approach using Microsoft Intune's Settings Catalog to create policies that standardize the sign-in experience while maintaining security. You'll learn to combine user rights assignment, custom registry settings, and modern authentication methods to achieve effective input method control.

Implementation Guide

Full Procedure

01

Access Microsoft Intune Admin Center and Create Configuration Profile

Start by logging into the Microsoft Intune admin center to create a new configuration profile. This will be the foundation for controlling sign-in input methods.

https://endpoint.microsoft.com

Sign in with your Global Administrator or Intune Service Administrator credentials. Navigate to Devices > Configuration profiles > Create profile. Select Platform: Windows 10 and later and Profile type: Settings catalog, then click Create.

Name your profile something descriptive like "Windows Sign-in Input Method Control" and add a description explaining its purpose for your organization.

Pro tip: Use a consistent naming convention for all your Intune profiles to make management easier. Include the date or version number in the description.

Verification: You should see the profile creation wizard with the Settings catalog option selected.

02

Configure User Rights Assignment for Sign-in Control

Since direct input method control isn't available in Intune, we'll use user rights assignment as a proxy to control who can sign in, which indirectly affects input method usage.

In the Settings catalog configuration, click Add settings and search for "User Rights". Select Allow local logon from the results. This setting controls which users or groups can sign in locally to the device.

Setting: User Rights Assignment > Allow local logon
Configuration: Specify allowed users/groups
Example entries:
- Administrators
- Domain Users
- user1@yourdomain.com

Configure the setting to include only the users or groups that should have access to the sign-in screen. You can add multiple entries by clicking the plus icon.

Warning: Be careful not to lock yourself out. Always include the Administrators group or your specific admin account in the allowed users list.

Verification: The setting should show your configured users/groups in the allowed list.

03

Add Custom OMA-URI Settings for Keyboard Layout Control

To control keyboard layouts and input methods more directly, we'll add custom OMA-URI settings that target specific registry keys related to input methods.

In your Settings catalog profile, click Add settings again and search for "Custom". Select Custom OMA-URI from the results.

OMA-URI: ./Device/Vendor/MSFT/Policy/Config/TextInput/AllowKeyboardTextSuggestions
Data type: Integer
Value: 0

OMA-URI: ./Device/Vendor/MSFT/Policy/Config/TextInput/AllowInputMethodSwitching
Data type: Integer
Value: 0

Add these OMA-URI settings to restrict text suggestions and input method switching. The first setting disables keyboard text suggestions, while the second prevents users from switching between different input methods during sign-in.

For additional control over keyboard layouts, add this OMA-URI:

OMA-URI: ./Device/Vendor/MSFT/Policy/Config/ControlPolicyConflict/MDMWinsOverGP
Data type: Integer
Value: 1

This ensures that Intune policies take precedence over any conflicting Group Policy settings.

Verification: You should see all three custom OMA-URI settings listed in your profile configuration.

04

Configure Windows Hello for Business Integration

Implement Windows Hello for Business to standardize authentication methods and reduce reliance on traditional keyboard input during sign-in.

Navigate to Devices > Windows > Windows enrollment > Windows Hello for Business. This is a tenant-wide policy that you'll configure once for your entire organization.

Windows Hello for Business Configuration:
{
  "UseHelloForBusiness": "Enabled",
  "RequireSecurityDevice": "TPM 2.0",
  "MinimumPINLength": 6,
  "MaximumPINLength": 127,
  "AllowBiometrics": "Enabled",
  "UseCertificateForOnPremAuth": "Enabled"
}

Alternatively, you can configure this through a Settings catalog profile by searching for "Windows Hello for Business" and enabling the following settings:

  • Use Windows Hello for Business: Enabled
  • Minimum PIN length: 6
  • Use biometrics: Enabled
  • Require security device: TPM 2.0
Pro tip: Windows Hello for Business significantly reduces the need for keyboard input during sign-in, making input method control less critical while improving security.

Verification: Check that Windows Hello for Business shows as "Configured" in the tenant settings.

05

Enable Web Sign-in for Passwordless Authentication

Configure Web Sign-in to provide an alternative authentication method that bypasses traditional keyboard input methods entirely.

In your Settings catalog profile, add another setting by searching for "Web Sign In". Select Enable Web Sign In and set it to Enabled.

Setting: Authentication > Enable Web Sign In
Value: Enabled

Additional Web Sign-in Settings:
- Allow Web Sign In for secondary authentication: Enabled
- Web Sign In allowed URLs: https://login.microsoftonline.com/*

This enables users to click a "Sign-in options" link on the login screen and authenticate through a web browser, which provides better control over the authentication experience.

You can also add URL restrictions to ensure users only authenticate through approved Microsoft endpoints:

OMA-URI: ./Device/Vendor/MSFT/Policy/Config/Authentication/AllowWebSignIn
Data type: Integer
Value: 1
Warning: Web Sign-in may conflict with existing Group Policy settings. Ensure you have the MDMWinsOverGP setting configured from the previous step.

Verification: Users should see a "Sign-in options" link on the Windows login screen after policy deployment.

06

Set Scope Tags and Assign the Profile to Target Groups

Configure scope tags and assign your profile to specific device or user groups to control the deployment scope.

Click Next to proceed to the Scope tags section. If you use scope tags in your organization, add the appropriate tags. For most organizations, you can leave this section empty and click Next.

In the Assignments section, configure your target groups:

Assignment Options:
1. Include groups: Select specific Azure AD groups
2. Exclude groups: Exclude pilot or test groups
3. Filter: Use device filters if needed

Example Assignment:
Include: "Corporate Devices - Windows"
Exclude: "IT Admin Devices"
Filter: (device.deviceOwnership -eq "Corporate")

Select Add groups and choose the Azure AD groups containing the devices where you want to enforce input method control. Consider starting with a pilot group before rolling out organization-wide.

Pro tip: Create a dedicated Azure AD group for devices that need strict input method control, such as shared kiosks or public-facing terminals.

Verification: Confirm your target groups appear in the "Included groups" section with the correct member count.

07

Review Configuration and Deploy the Profile

Review all your configuration settings before deploying the profile to ensure everything is configured correctly.

Click Next to reach the Review + create section. Verify all your settings:

Profile Review Checklist:
✓ Profile name and description are clear
✓ User Rights Assignment configured correctly
✓ Custom OMA-URI settings added
✓ Windows Hello for Business enabled
✓ Web Sign-in configured
✓ Target groups assigned
✓ Scope tags applied (if used)

Click Create to deploy the profile. The profile will begin deploying to assigned devices immediately.

Monitor the deployment status by navigating to Devices > Configuration profiles and selecting your newly created profile. Click on Device status to see deployment progress.

Warning: Policy deployment can take up to 8 hours to fully apply to all devices. Don't panic if you don't see immediate results.

Verification: The profile should show "Succeeded" status for target devices within 24 hours of deployment.

08

Test Input Method Restrictions on Target Devices

Verify that your input method controls are working correctly by testing on target devices.

On a target device, sign out and return to the Windows login screen. Test the following scenarios:

# Check applied policies on the device
Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\PolicyManager\current\device\TextInput" -Name "AllowInputMethodSwitching"

# Verify Windows Hello for Business enrollment
certlm.msc
# Navigate to Personal > Certificates and look for Windows Hello for Business certificates

# Check Web Sign-in availability
# Look for "Sign-in options" link on login screen

Test these specific scenarios:

  • Attempt to switch keyboard layouts using Alt+Shift
  • Try accessing input method settings during sign-in
  • Verify that only authorized users can sign in locally
  • Test Windows Hello for Business authentication
  • Confirm Web Sign-in functionality

Users who are not in the allowed groups should see the message: "The sign-in method you are trying to use is not allowed."

Verification: Input method switching should be restricted, and only configured authentication methods should be available.

09

Monitor Compliance and Troubleshoot Issues

Set up monitoring and troubleshooting procedures to ensure ongoing compliance with your input method policies.

Navigate to Devices > Compliance to monitor overall device compliance. For specific profile monitoring, go to Devices > Configuration profiles and select your input method control profile.

# PowerShell commands for troubleshooting on client devices

# Check Intune policy sync status
Get-ScheduledTask | Where-Object {$_.TaskName -like "*Intune*"}

# Force policy sync
Start-ScheduledTask -TaskName "Microsoft\Windows\EnterpriseMgmt\[GUID]\Schedule created by enrollment client"

# Check event logs for policy application
Get-WinEvent -LogName "Microsoft-Windows-DeviceManagement-Enterprise-Diagnostics-Provider/Admin" | Where-Object {$_.TimeCreated -gt (Get-Date).AddHours(-24)}

Common troubleshooting steps:

  • Policy conflicts: Check for conflicting Group Policy settings using gpresult /h report.html
  • Enrollment issues: Verify device enrollment status in Intune admin center
  • Authentication problems: Ensure TPM 2.0 is enabled for Windows Hello for Business
  • Web Sign-in failures: Check network connectivity and firewall rules for Microsoft authentication endpoints
Pro tip: Create a PowerShell script to automate compliance checking across your device fleet. Run it weekly to catch any devices that have fallen out of compliance.

Verification: All target devices should show "Compliant" status with successful policy application within 48 hours of deployment.

Frequently Asked Questions

Can Microsoft Intune directly control keyboard layouts on Windows login screens?+
No, Microsoft Intune doesn't provide direct policy controls for keyboard layouts or input methods specifically on the Windows sign-in screen. However, you can achieve similar results using Settings Catalog profiles with custom OMA-URI settings, user rights assignment, and modern authentication methods like Windows Hello for Business and Web Sign-in to standardize the sign-in experience.
What's the difference between Settings Catalog and Device Restrictions in Intune for sign-in control?+
Settings Catalog provides more granular control and access to newer Windows policies compared to the older Device Restrictions templates. For sign-in input method control, Settings Catalog allows you to configure custom OMA-URI settings, user rights assignments, and modern authentication policies that aren't available in the basic Device Restrictions profiles.
How long does it take for Intune input method policies to apply to Windows devices?+
Intune policies typically apply within 8 hours of deployment, but can take up to 24-48 hours for full compliance across all target devices. The actual timing depends on device check-in schedules, network connectivity, and whether devices are online when policies are deployed. You can force immediate policy sync using PowerShell commands or the Company Portal app.
Will Windows Hello for Business eliminate the need for keyboard input method control?+
Windows Hello for Business significantly reduces keyboard dependency during sign-in by enabling biometric authentication (fingerprint, face recognition) and PIN-based authentication. While it doesn't completely eliminate keyboard input scenarios, it provides a more secure and standardized authentication experience that reduces the security risks associated with multiple input methods.
Can Intune input method policies conflict with existing Group Policy settings?+
Yes, conflicts can occur between Intune policies and Group Policy settings, especially in hybrid environments. To resolve this, configure the MDMWinsOverGP OMA-URI setting in your Intune profile to ensure Intune policies take precedence. You should also audit existing Group Policy settings using gpresult commands and gradually migrate policies from Group Policy to Intune for consistency.

Discussion

Share your thoughts and insights

Sign in to join the discussion