January 06, 2026

Streamlining D365FO Access with Entra ID Security Groups

Hi Friends,

Happy new year!!! Lets continue learning...

In this post, I will share some insight on how Entra security group can used to streamline D365FO access management. 

Managing user access in Dynamics 365 Finance and Operations can be complex—especially in large organizations with frequent onboarding (or offboarding), role changes, and compliance needs. Microsoft Entra ID security groups provide an alternative to traditional role-based access control (RBAC), offering centralized, scalable access management. In this post let’s explore how to set them up, their pros and cons, and best practices for implementation.

Lets see some quick steps to setup Entra security groups, 

  1. Enable the Feature:  In D365FO, navigate to Feature Management and enable Microsoft Entra ID Security Groups.
  2. Create Security Groups in Entra ID: Use the Microsoft Entra admin center to create groups. You can choose:
    • Assigned groups (manual membership)
    • Dynamic groups (rule-based membership based on user attributes)
  3. Assign Roles to Groups in D365FO: Go to System Administration > Security Configuration > Entra ID Security Groups.
    • Import your Entra groups.
    • Assign D365FO roles to each group.
  4. User Provisioning: When a user logs in, D365FO checks their group membership and automatically assigns roles based on the group configuration. This supports just-in-time (JIT) provisioning

Of course there are advantages Over Traditional Role-Based Access, like

  • Centralized Management: Admins can manage access across multiple apps from Entra ID.
  • Dynamic Membership: Automatically assign users to groups based on attributes (e.g., department, location).
  • Bulk Provisioning: Assign roles to many users at once—ideal for onboarding.
  • Lifecycle Automation: Role changes happen automatically when user attributes change.
  • Just In time access
  • Centralized onboarding and offboarding of users 

And yes, there are some limitations Compared to Traditional Role Assignments, like

  • No Role Visibility in User Profile: Roles assigned via groups don’t appear in the user’s security role list in D365FO.
  • Audit Complexity: Harder to trace exact role assignments for individual users. Few out of box report doesn't support these users.
  • Limited Granularity: Cannot assign roles based on task-level needs unless you create many groups.
  • External user in Entra doesn't get access automatically. 
  • Complex workflows may not work as expected. 
Now lets talk about few of best Practices for Using Entra ID Groups in D365FO,

  • Use Dynamic Groups for Automation:  Define rules like user. department -eq "Finance" to auto-assign users to finance roles.
  • Combine with Direct Role Assignments: For exceptions or sensitive roles, assign them directly in D365FO to maintain visibility.
  • Document Group-to-Role Mapping: Maintain a clear mapping of which Entra groups correspond to which D365FO roles.
  • Audit Regularly: Use PowerShell or Graph API to extract group membership and validate access.
  • Avoid Overlapping Assignments: Ensure users don’t get conflicting roles from multiple groups.
My view:

Entra ID security groups simplify access management in D365FO, especially for large-scale or dynamic environments. However, they’re best used in tandem with traditional role assignments to balance automation with control. By following best practices, you can streamline provisioning while maintaining auditability and compliance.

-Harry Follow us on Facebook to keep in rhythm with us. https:fb.com/theaxapta