Edit

Share via


Guidance for using Group Source of Authority (SOA) (Preview)

Managing groups across hybrid environments is essential for organizations that transition from on-premises Active Directory Domain Services (AD DS) to the cloud. Group Source of Authority (SOA) in Microsoft Entra ID enables you to transfer group management from AD DS to the cloud, providing greater flexibility, modern governance, and streamlined administration. This guidance explains how to use Group SOA to manage, provision, restore, and roll back groups in hybrid and cloud environments. It explains best practices to clean up groups, convert group management, and ensure secure, efficient access control as you modernize your identity infrastructure.

AD DS group cleanup

One challenge many organizations face is the proliferation of groups, particularly security groups, in their Active Directory domains. An organization might create security groups that are no longer needed after projects complete. These groups can linger unmaintained in the domain.

There's no way to confirm if a group is needed to access a resource, like an app or a file. So we need another way to identify and clean up groups that are no longer needed. One way is to use a scream test methodology to identify groups that are no longer used. For more information, see How to remove unused groups from Active Directory.

Best practices

Follow these best practices to transition group management from on-premises to Microsoft Entra ID.

Change to Universal group scope before you convert Group SOA

If you plan to provision a converted SOA security group (not mail-enabled) back to AD DS, then you need to change the group scope to Universal before you convert Group SOA. Global and Domain Local group scopes aren't supported for groups provisioned to AD DS. You need to check and update the group scope before you convert Group SOA for security groups that you want to provision back to AD DS.

Transition group management

Microsoft Entra ID Governance supports governance of Microsoft Entra ID security groups and Microsoft 365 groups. While Distribution Lists (DLs) and Mail-Enabled Security Groups (MESGs) can exist in the cloud, they're Exchange concepts and you can't manage them in the Microsoft Entra admin center or with Microsoft Graph APIs.

You should replace DLs and MESGs with Microsoft 365 groups for collaboration and access management scenarios. They offer built-in capabilities for governance, collaboration, and self-service. In most cases, DLs and MESGs need to be recreated as Microsoft 365 groups. However, you can directly upgrade simple, non-nested cloud-managed DLs to Microsoft 365 groups. For more information, see Upgrade Distribution Lists to Microsoft 365 Groups.

Transition self-service group management

Microsoft Entra ID provides self-service group management through My Groups for Microsoft 365 and non-mail-enabled security groups. Microsoft Entra ID Governance enables access management through My Access, where you can manage groups with access packages. Access packages allow users to request access to groups as part of a structured governance framework. However, these solutions don't exactly replicate the self-service group management capabilities in Microsoft Identity Manager due to differences in on-premises and cloud solutions.

To transition self-service group management from on-premises AD DS groups, you can modernize applications and use cloud-based security groups and Microsoft 365 groups. For more information, see Self-service group management guidance for Group Source of Authority (SOA).

Manage on-premises apps tied to Microsoft 365 groups

To manage and govern AD DS-based apps, you can provision Microsoft 365 groups to AD DS with Group Writeback in Microsoft Entra Connect sync. But you can't choose which groups to provision to AD DS.

On-premises changes to cloud-owned security groups are overwritten

If you provision cloud security groups to AD DS, and someone with permissions makes a change directly to the AD DS group, the change is overwritten the next time you provision the cloud group to AD DS (typically upon the next change to the cloud group). A local AD DS change doesn't reflect in Microsoft Entra ID.

How Group Provisioning to AD DS works with nested groups

Let's look at an example where you provision a security group named CloudGroupB to AD DS. It has a parent on-premises AD DS group named OnPremGroupA. You convert SOA for CloudGroupB.

Then you start to manage group memberships in Microsoft Entra ID for the converted CloudGroupB. You provision it as a nested group within the on-premises group OnPremGroupA. If OnPremGroupA remains in-scope for sync, when the AD DS to Microsoft Entra ID sync configuration runs for OnPremGroupA, the membership reference for CloudGroupB doesn't sync. By design, the sync client doesn't recognize the cloud group membership references.

For more information about how group sync works with SOA in similar use cases, see Nested Groups and membership references handling.

How SOA applies to nested groups

SOA applies only to the specified direct individual group object without recursion. If you apply SOA to nested groups within the group, they continue to be managed on-premises. Because this methodology is by design, explicitly apply SOA to each group that you want to convert. If you want to convert nested groups, you might start with the group in the lowest hierarchy, and move up the tree.

Recreate dynamic group configurations from on-premises AD in the cloud

On-premises AD groups are inherently static. Dynamic membership is implemented through external tools such as Microsoft Identity Manager (MIM) or Forefront Identity Manager (FIM). Dynamic membership rules don't transfer automatically when you convert SOA because there's no native AD attribute that marks a group as dynamic. You need to recreate dynamic membership rules in the cloud after migration. For more information about how to set up dynamic membership group, see Create or update a dynamic membership group in Microsoft Entra ID.

Limitation for custom Lightweight Directory Access Protocol (LDAP) connector in Microsoft Entra Connect Sync

Group SOA doesn't support using the custom LDAP connector in Microsoft Entra Connect Sync to sync identities and groups into Microsoft Entra ID. It only supports transfer of SOA of groups that sync from AD to Microsoft Entra ID to be cloud objects. Rollback of SOA operations also only works if the original SOA of the object is AD.

How to manage cloud security groups

Security groups are fundamental for access control, policy management, and other critical functions. In most collaboration scenarios, Microsoft 365 groups are recommended due to their enhanced collaboration features, self-service options, and API capabilities. Distribution groups (DLs) and mail-enabled security groups (MESGs) remain viable options, particularly for Exchange administrators.

When you transition to the cloud, map on-premises groups to modern group types in Microsoft Entra, Exchange Online, and Microsoft 365. The following table provides information about how to map groups and manage them after SOA conversion.

On-premises group type Cloud group type How they're managed after SOA conversion Description
Security group Microsoft Entra security group (not mail-enabled) Microsoft Entra admin center
Microsoft Graph APIs
Vital for access control and translate directly as Microsoft Entra security groups, offering management by Microsoft Graph and various admin centers, including the Microsoft Entra admin center.
Mail-enabled security group (Exchange on-premises) Mail-enabled security group (read-only in Microsoft Entra ID and managed in Exchange) Exchange Online or PowerShell Can migrate directly, or be recreated as security-enabled Microsoft 365 Groups (Create group). If email functionality is no longer needed, they might be recreated as Microsoft Entra security groups. Mail-enabled security groups are only editable by using Exchange or PowerShell. Security groups and Microsoft 365 groups are managed with Microsoft Graph and various admin centers, including the Microsoft Entra admin center.
Distribution List (Exchange on-premises) Distribution List (read-only for Microsoft Entra and managed in Exchange) Exchange Online or via PowerShell Are for email-only communication. They can be migrated as Exchange Online Distribution Lists, and managed by using Exchange Online or Exchange PowerShell. They can then be recreated as Microsoft 365 groups or you can directly upgrade them to Microsoft 365 Groups. They enable shared files, calendars, Teams integration, and self-service management with Outlook, Teams, My Groups, or Microsoft Graph.
N/A (In the past with v1) Microsoft 365 groups (cloud only) Microsoft Entra admin center
Microsoft Graph APIs

Note

Security-enabled Microsoft 365 Groups can be used for both collaboration for apps like Teams, SharePoint, or Outlook, and access control in Microsoft Entra. However, security-enabled Microsoft 365 Groups aren't supported for assigning permissions to Exchange shared mailboxes. For scenarios where you need to secure a shared mailbox, continue to use mail-enabled security groups.