Question on group claim for SSO into AWS

GJoe 21 Reputation points
2020-09-27T00:29:10.97+00:00

Hi Forum, I have an Enterprise application for SSO into AWS. For the app integration, I need name of the groups that the user is member of. For that I created a "Group Claim" by following https://learn.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-fed-group-claims However the SAML response I receive is containing the Group ID instead of group name. For example I get "a26049e6-448d-43ea-b3e5-b59c242e07d6" in saml response instead of group name "dbrw". Can you please give me some idea on how can I achieve that. Thanks.

Microsoft Entra ID
Microsoft Entra ID
A Microsoft Entra identity service that provides identity management and access control capabilities. Replaces Azure Active Directory.
19,567 questions
0 comments No comments
{count} votes

Accepted answer
  1. AmanpreetSingh-MSFT 56,311 Reputation points
    2020-09-29T05:13:35.587+00:00

    Hello @GJoe · As of now, we just support onPremisesSamAccountName attribute to pass group name in the groups claim. Since we don't have sAmAccountName attribute for Azure AD (Cloud only) group, only object ID can be passed for those groups in the token. This is mentioned in the first 2 bullet points and the note under this section of the document you referred to. You may post an idea regarding this feature at our Feedback Portal, which is monitored by the product team. Kindly share the link to your feedback in this thread as well.

    -----------------------------------------------------------------------------------------------------------

    Please "Accept the answer" if the information helped you. This will help us and others in the community as well.


1 additional answer

Sort by: Most helpful
  1. AmanpreetSingh-MSFT 56,311 Reputation points
    2020-09-28T07:45:37.533+00:00

    Hi @GJoe Could you please confirm if the samAccountName attribute of the group is synced to Azure AD as onPremisesSamAccountName by using Graph Explorer with below GET call:
    https://graph.microsoft.com/beta/groups/Object_ID_of_Group

    Also make sure the group claims condition is satisfied. E.g. if you have set "groupMembershipClaims": "SecurityGroup", make sure the group type is SecurityGroup. If you want to pass groups other than security groups in the token, make sure you select "All".

    1 person found this answer helpful.