Microsoft Entra ID (formerly Azure AD) - Assign Group to Users
  • 30 Dec 2024
  • 3 Minutes to read
  • Dark
    Light
  • PDF

Microsoft Entra ID (formerly Azure AD) - Assign Group to Users

  • Dark
    Light
  • PDF

Article summary

Microsoft Entra ID (formerly Azure AD) - Assign Group to Users adds or removes an Entra ID group to or from the users returned by the selected query or assets selected on the relevant asset page.

See Creating Enforcement Sets to learn more about adding Enforcement Actions to Enforcement Sets.

Note:

Required Fields

These fields must be configured to run the Enforcement Set.

  • Action name - The name of this Enforcement Action. The system sets a default name. You can change the name.
  • Configure Dynamic Values - Toggle on to enter a Dynamic Value statement. See Creating Enforcement Action Dynamic Value Statements to learn more about Dynamic Value statement syntax.

  • Use stored credentials from the Microsoft Entra ID (Azure AD) and Microsoft Intune adapter - Select this option to use credentials from the adapter connection. By default, the first connection is selected.

    • When you select this option, the Select Adapter Connection drop-down becomes available. Select the adapter connection to use for this Enforcement Action.
    Note:

    To use this option, you must successfully configure an Microsoft Entra ID (Azure AD) and Microsoft Intune adapter connection.

  • Group DNs - Select the groups to assign from the list or enter a group DN as a semicolon (;) separated list of group distinguished names. Note that commas (,) are allowed within distinguished names. For example:
    CN=Group One,OU=Groups,DC=example,DC=com;CN=Group Two,OU=Groups,DC=example,DC=com

  • Add/Remove assignment - Select the action to perform: Add or Remove.

  • Compute Node - The Axonius node to use when connecting to the specified host. For more details, see Connecting Additional Axonius Nodes.

Additional Fields

These fields are optional.

Connection and Credentials

When Use stored credentials from the adapter is toggled off, some of the connection fields below are required to create the connection, while other fields are optional.

  • Azure Client ID - The Application ID of the Axonius application.
  • Azure Client Secret - Specify a non-expired key generated from the new client secret.
  • Azure Tenant ID - The ID for Microsoft Entra ID.
  • Verify SSL - Select whether to verify the SSL certificate of the server against the CA database inside of Axonius. For more details, see SSL Trust & CA Settings.
  • Account Sub Domain - The Microsoft account's sub domain (<sub_domain>.onmicrosoft.com).
  • Username and Password - The credentials for a user account that has the permissions needed to perform this action.
  • 2FA Secret Key - The secret generated in Microsoft Entra ID for setting up 2-factor authentication for the Microsoft user.
  • SSO Provider - If your organization uses Microsoft Entra ID for SSO, you can select this check box.
  • Cloud Environment - Select your Microsoft Azure or Microsoft Entra ID cloud environment type.
  • Azure OAuth - Authorization Code - The authorization code to connect to Microsoft Intune. This is a legacy option to allow OAuth delegated authentication.
  • Azure OAuth - Redirect URI/Reply URL - The location where the authorization server sends the user once the Azure has been successfully authorized and granted an authorization code or an access token. For more information, see Redirect URI (reply URL) restrictions and limitations.
  • Is Azure AD B2C - Select this option to cause Axonius to consider that this Microsoft Entra ID adapter connection is configured as B2C.
  • Account Tag - Specify a tag for Axonius to tag all devices fetched from this adapter for the Azure Cloud instance ("nickname").
  • Device groups blocklist - Enter a group or groups whose devices will be ignored and not fetched. If you want to enter more than one group, separate with commas.
  • HTTPS Proxy - A proxy to use when connecting to the selected Microsoft Azure/Entra ID cloud environment.
  • HTTPS Proxy User Name and Password - The user name and password to use when connecting to the selected Microsoft Azure / Azure AD cloud environment via the value supplied in HTTPS Proxy.
  • Gateway Name - Select the Gateway for this action. for more information, see Adding a New Adapter Connection.
    For more information, see Connecting your SSO Solution Provider Adapter.
  • Justification reason - Enter reason for adding or removing the listed groups to/from the users.
  • Gateway Name - Select the Gateway through which to connect to perform the action.

Required Permissions

The associated application must be granted LicenseAssignment.ReadWrite.All Application permission and must be assigned the Privileged Role Administrator or Global Administrator role.

For full and up-to-date information about permissions required for working with Microsoft Entra ID refer to permissions in Microsoft Graph API Documentation.


For more details about other Enforcement Actions available, see Action Library.


Was this article helpful?