active-directoryazure-active-directoryactive-directory-groupadgroup

Azure Active Directory Group - controlling user access


I have a requirement to add users to an Azure Active Directory group with certain privileges.

For example, specific user added to adgroup1 gets edit access on application specific data, while the same user could be part of adgroup2 with read only access for different set of application data.

What would be the best practice to implement this? Appreciate the feedback.


Solution

  • I am afraid this could not be implemented, in Azure AD, a normal user (i.e. User type is member) has the default permissions to view all the AD Apps in the tenant, source here.

    enter image description here

    This could not be restricted, default permissions for member users can be restricted list here, even if you set Restrict access to Azure AD administration portal, the user can also get the information from other clients e.g. powershell.

    For the edit permission, the user needs to be added as an Owner to the AD App, but the AAD group is not supported to be added as an Owner to the AD App.