You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe the problem.
Overview
Microsoft Azure and Microsoft Entra Admin Portals provide robust capabilities for configuring group filtering in SAML and OIDC claims. Administrators can easily tailor access based on specific group attributes, enhancing security and compliance. However, there is a significant gap in functionality when using Microsoft Graph PowerShell cmdlets.
Current Capabilities in Azure and Entra Portals
The Azure Portal allows administrators to configure group claims with advanced filtering options, as outlined below:
Access Your Application:
Navigate to the Azure Portal and go to Enterprise Applications.
Select the application for which you want to configure group claims.
Access Your Application
Configure Single Sign-On (SSO):
Under the selected application, go to Single sign-on.
Click on User Attributes & Claims.
Add a Group Claim:
Click on Add a group claim.
In the configuration options, you will have several choices for how to include groups in the SAML token.
Set Filtering Options:
In the advanced options, you can specify how you want to filter groups:
Choose Only groups assigned to the application if you want to limit claims to specific groups.
For custom filtering, select Customize the name of the group claim and enter the claim type you wish to use.
Applying Filters:
To filter groups based on sAMAccountName, select Filter groups.
You can specify conditions such as:
Attribute to Match: Set this to sAMAccountName.
Match With: Choose options like "contains" or "starts with".
String: Enter the criteria for filtering. For example, if you want groups that contain "test", simply enter test.
Limitations of Microsoft Graph PowerShell Cmdlets
In stark contrast, the GroupClaims parameter of the Update-MgApplication command in Microsoft Graph PowerShell only accepts three basic values: None, SecurityGroup, and All. This limitation prevents administrators from leveraging the advanced filtering capabilities available in the Azure and Entra portals.
Describe the solution you'd like.
Proposed Enhancements
To bridge this gap, we propose the following enhancements:
Multi-Condition Filtering:
Enable logical operators (AND, OR) for filtering conditions to allow more complex configurations.
Custom Attribute Matching:
Allow filtering based on custom attributes beyond just sAMAccountName.
Advanced Filtering Options:
Implement features such as regular expression matching, range queries, and wildcard support.
User Interface Improvements:
Enhance the user interface in PowerShell to make it more intuitive for setting up group claims and filters.
Documentation and Support:
Provide comprehensive documentation with examples and establish a dedicated support channel for group claim configurations.
Implementation Example:
I would expand GroupMembershipClaims parameter schema in Update-MgApplication cmdlet to make it happen:
Increased Flexibility: Tailor group claims effectively to meet specific security and compliance requirements.
Enhanced Security: Manage access to sensitive applications with more granular control over included groups.
Improved User Experience: A more intuitive interface and better documentation will empower administrators to configure settings confidently.
Conclusion
By implementing these enhancements, Microsoft can provide a more robust solution for managing SAML and OIDC claims related to group memberships through both Azure/Entra portals and PowerShell cmdlets. This will improve administrative efficiency and strengthen security protocols across applications relying on these identity solutions.
The text was updated successfully, but these errors were encountered:
@YuriySamorodov thanks a lot for identifying and proposing a solution to this issue. Microsoft Graph PowerShell cmdlets are generated based on open Api paths provided by the service owner. The current path associated with the said cmdlet, has those limitations which unfortunately got shipped to all SDKs/tools that reference it. If you look at the Api documentation here, it only contains the three basic values for the groupMembershipClaims property. Since I don't have visibility when it comes to service issues, I can only advice that you log an issue here https://developer.microsoft.com/en-us/graph/support so that the API owner can respond to it.
Is your feature request related to a problem? Please describe the problem.
Overview
Microsoft Azure and Microsoft Entra Admin Portals provide robust capabilities for configuring group filtering in SAML and OIDC claims. Administrators can easily tailor access based on specific group attributes, enhancing security and compliance. However, there is a significant gap in functionality when using Microsoft Graph PowerShell cmdlets.
Current Capabilities in Azure and Entra Portals
The Azure Portal allows administrators to configure group claims with advanced filtering options, as outlined below:
Access Your Application:
Access Your Application
Configure Single Sign-On (SSO):
Add a Group Claim:
Set Filtering Options:
Applying Filters:
sAMAccountName
, select Filter groups.sAMAccountName
.test
.Limitations of Microsoft Graph PowerShell Cmdlets
In stark contrast, the
GroupClaims
parameter of theUpdate-MgApplication
command in Microsoft Graph PowerShell only accepts three basic values: None, SecurityGroup, and All. This limitation prevents administrators from leveraging the advanced filtering capabilities available in the Azure and Entra portals.Describe the solution you'd like.
Proposed Enhancements
To bridge this gap, we propose the following enhancements:
Multi-Condition Filtering:
Custom Attribute Matching:
sAMAccountName
.Advanced Filtering Options:
User Interface Improvements:
Documentation and Support:
Implementation Example:
I would expand
GroupMembershipClaims
parameter schema inUpdate-MgApplication
cmdlet to make it happen:Benefits
Conclusion
By implementing these enhancements, Microsoft can provide a more robust solution for managing SAML and OIDC claims related to group memberships through both Azure/Entra portals and PowerShell cmdlets. This will improve administrative efficiency and strengthen security protocols across applications relying on these identity solutions.
The text was updated successfully, but these errors were encountered: