How do I add custom group attributes in Entra?

Ryan Esch 20 Reputation points
2024-12-19T12:07:30.61+00:00

I have created security groups in Entra, and I want to add attributes to these groups, specifically sAMAccountName because I want to mimic Active Directory. This is a test environment, but production will be connected to AD. The goal is to be able to edit the group claim to return sAMAccountName instead of groupId, but that won't work unless the groups have sAMAccountName.

User's image

User's image

Microsoft Security | Microsoft Entra | Microsoft Entra ID
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Goutam Pratti 6,170 Reputation points Microsoft External Staff Moderator
    2024-12-20T09:40:39.61+00:00

    Hello @Ryan Esch ,

    Thank you for reaching out Microsoft Q&A.

    I Understand you have created security groups in Entra, and you want to add attributes to these groups, specifically sAMAccountName because you want to mimic Active Directory. This is a test environment, but production will be connected to AD. The goal is to be able to edit the group claim to return sAMAccountName instead of groupId, but that won't work unless the groups have sAMAccountName.

    sAMAccountName and on-premises GroupSID attributes are available only on group objects synced from Active Directory. They aren't available on groups created in Microsoft Entra ID or Office 365. Applications configured in Microsoft Entra ID to get synced on-premises group attributes get them for synced groups only.

    The supported formats for group claims are:

    • Microsoft Entra group ObjectId: Available for all groups.
    • sAMAccountName: Available for groups synchronized from Active Directory.
    • NetbiosDomain\sAMAccountName: Available for groups synchronized from Active Directory.
    • DNSDomainName\sAMAccountName: Available for groups synchronized from Active Directory.
    • On-premises group security identifier: Available for groups synchronized from Active Directory.

    User's image

    for additional information: https://learn.microsoft.com/en-us/entra/identity/hybrid/connect/how-to-connect-fed-group-claims#group-claims-for-applications-migrating-from-ad-fs-and-other-identity-providers

    Hope this helps. Do let us know if you any further queries.


    If this answers your query, do click Accept Answer and Yes for was this answer helpful. And, if you have any further query do let us know.

    Regards,
    Goutam Pratti.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.