Filter Group Claims by DisplayName or SamAccountName #3045
Labels
status:waiting-for-triage
An issue that is yet to be reviewed or assigned
type:feature
New experience request
Is your feature request related to a problem? Please describe the problem.
Overview
Microsoft Azure and Microsoft Entra Admin Portals provide robust capabilities for configuring group filtering in SAML and OIDC claims. Administrators can easily tailor access based on specific group attributes, enhancing security and compliance. However, there is a significant gap in functionality when using Microsoft Graph PowerShell cmdlets.
Current Capabilities in Azure and Entra Portals
The Azure Portal allows administrators to configure group claims with advanced filtering options, as outlined below:
Access Your Application:
Access Your Application
Configure Single Sign-On (SSO):
Add a Group Claim:
Set Filtering Options:
Applying Filters:
sAMAccountName
, select Filter groups.sAMAccountName
.test
.Limitations of Microsoft Graph PowerShell Cmdlets
In stark contrast, the
GroupClaims
parameter of theUpdate-MgApplication
command in Microsoft Graph PowerShell only accepts three basic values: None, SecurityGroup, and All. This limitation prevents administrators from leveraging the advanced filtering capabilities available in the Azure and Entra portals.Describe the solution you'd like.
Proposed Enhancements
To bridge this gap, we propose the following enhancements:
Multi-Condition Filtering:
Custom Attribute Matching:
sAMAccountName
.Advanced Filtering Options:
User Interface Improvements:
Documentation and Support:
Implementation Example:
I would expand
GroupMembershipClaims
parameter schema inUpdate-MgApplication
cmdlet to make it happen:Benefits
Conclusion
By implementing these enhancements, Microsoft can provide a more robust solution for managing SAML and OIDC claims related to group memberships through both Azure/Entra portals and PowerShell cmdlets. This will improve administrative efficiency and strengthen security protocols across applications relying on these identity solutions.
The text was updated successfully, but these errors were encountered: