Lets see some quick steps to setup Entra security groups,
- Enable the Feature: In D365FO, navigate to Feature Management and enable Microsoft Entra ID Security Groups.
- Create
Security Groups in Entra ID: Use the Microsoft Entra admin center to create groups. You can choose:
- Assigned
groups (manual membership)
- Dynamic
groups (rule-based membership based on user attributes)
- Assign Roles to Groups in D365FO: Go to System Administration > Security Configuration > Entra ID Security Groups.
- Import
your Entra groups.
- Assign
D365FO roles to each group.
- User
Provisioning: When a user logs in, D365FO checks their group membership and
automatically assigns roles based on the group configuration. This
supports just-in-time (JIT) provisioning
Of course there are advantages Over Traditional Role-Based Access, like
- Centralized
Management: Admins can manage access across multiple apps from Entra
ID.
- Dynamic
Membership: Automatically assign users to groups based on attributes
(e.g., department, location).
- Bulk
Provisioning: Assign roles to many users at once—ideal for onboarding.
- Lifecycle
Automation: Role changes happen automatically when user attributes
change.
- Just In time access
- Centralized onboarding and offboarding of users
And yes, there are some limitations Compared to Traditional Role Assignments, like
- No
Role Visibility in User Profile: Roles assigned via groups don’t
appear in the user’s security role list in D365FO.
- Audit
Complexity: Harder to trace exact role assignments for individual
users. Few out of box report doesn't support these users.
- Limited
Granularity: Cannot assign roles based on task-level needs unless you
create many groups.
- External user in Entra doesn't get access automatically.
- Complex workflows may not work as expected.
- Use
Dynamic Groups for Automation: Define rules like user. department
-eq "Finance" to auto-assign users to finance roles.
- Combine
with Direct Role Assignments: For exceptions or sensitive roles, assign them directly in D365FO to
maintain visibility.
- Document
Group-to-Role Mapping: Maintain a clear mapping of which Entra groups correspond to which D365FO
roles.
- Audit
Regularly: Use PowerShell or Graph API to extract group membership and validate
access.
- Avoid
Overlapping Assignments: Ensure users don’t get conflicting roles from multiple groups.
Entra ID security groups simplify access management in
D365FO, especially for large-scale or dynamic environments. However, they’re
best used in tandem with traditional role assignments to balance automation
with control. By following best practices, you can streamline provisioning
while maintaining auditability and compliance.