Role-assignable groups in Entra ID (P1 or P2 licensing required) are objects with subtle, but important difference, distinguishing them from other ordinary groups. Namely, during their creation, the isRoleAssignable
attribute is set to True
.
It is an immutable attribute, available only during the group creation.
Groups created as role-assignable stay as role-assignable for their entire lifecycle. With such attribute populated, these groups become eligible for direct assignments to Entra ID directory roles and more.
Primary use case
Think about the scenario where instead of having to assign each user individually to an Entra ID administrative directory role (e.g. ‘Security Administrator’ and lots of others), you designate a role-assignable group and carefully manage membership of that group.
The resultant effect is the same, user gets the directory role, however, role-assignable groups have some additional security assurances applied by default.
%%{
init: {
'theme': 'base',
'themeVariables': {
'primaryColor': '#BB2528',
'primaryTextColor': '#fff',
'primaryBorderColor': '#7C0000',
'lineColor': '#F8B229',
'secondaryColor': '#006100',
'tertiaryColor': '#fff'
}
}
}%%
flowchart LR
id1[**Before role-assignable groups. Each identity had to be assigned to a role individually. Not scalable!**]
Identity1["User identity1"]
Identity2["User identity2"]
Identity3["User identity3"]
EntraIDRoles["EntraIDRole"]
Identity1 --Directory role assignment-->EntraIDRoles
Identity2 --Directory role assignment-->EntraIDRoles
Identity3 --Directory role assignment-->EntraIDRoles
%%{
init: {
'theme': 'base',
'themeVariables': {
'primaryColor': '#BB2528',
'primaryTextColor': '#fff',
'primaryBorderColor': '#7C0000',
'lineColor': '#F8B229',
'secondaryColor': '#006100',
'tertiaryColor': '#fff'
}
}
}%%
flowchart LR
id1[**With role-assignable groups. One assignment per group! Better scalability!**]
Group1["Security or M365 role-assignable group"]
EntraIDRoles["EntraIDRole"]
Group1 --Directory role assignment-->EntraIDRoles
Security benefits
What are the security assurances when directory roles are managed with role-assignable groups?
- Role-assignable groups can’t be managed by directory roles that can modify “ordinary” groups, i.e.
Groups Administrator
,User Administrator
,Directory Writers
,Identity Governance Administrator
,Partner Tier1 Support
,Partner Tier2 Support
,Exchange Administrator
(only M365 groups),Intune Administrator
(only security groups) and any custom roles withmicrosoft.directory/groups/members/update
permission. - Only
Global Administrators
orPrivileged Role Administrator
roles can manage membership and ownership of role-assignable groups. This automatically makes such groups manageable only to most critical directory roles (i.e. Tier 0 control plane admins), limits scope of administrative authority over them and reduces the risk of intentional or inadvertent unauthorized group membership modifications (which usually lead to elevation of privilege attacks). - Similarly, only service principals with
RoleManagement.ReadWrite.Directory
Graph API permission will be able to manage role-assignable groups. Service principals withGroup.ReadWrite.All
,GroupMember.ReadWrite.All
orDirectory.ReadWrite.All
permission won’t have management capabilities. - Role-assignable groups can’t be dynamic. By blocking this capability, unintended updates of group membership based on dynamic membership rules, with security dependencies on source object attributes, are out of the picture!
- Permanent (not eligible, if you use Entra ID PIM and PIM for Groups!) members of role-assignable groups become protected too! Scope of administrative authority over these accounts becomes smaller. For example, password and MFA resets can be performed by
Privileged Authentication Administrator
andGlobal Administrator
roles only. In normal group setup, several more roles have access to perform these actions.
Alternative use case(s)
What if you create a group with isRoleAssignable
attribute enabled and decide to not assign them to any Entra ID directory role?
Are these groups usable elsewhere? Yes!
Let’s assume you have set of critical, baseline conditional access policies (e.g. require multi-factor authentication with specific strength for all users) in which you have to make some exclusions.
How do you usually do it?
You probably create ordinary (not role-assignable) security group and add some members. It is a common approach, with some residual risks stemming from the use of “standard” security or M365 group.
Residual risk in this context is indirect delegation of control over these critical conditional access policy exclusions. Such indirect control is given to all Entra ID directory roles that are allowed to modify groups’ membership.
To be more precise, ‘tier 1 - management plane’ roles have control over identity configuration elements that shall be exclusively reserved to ‘tier 0 - control plane’ ones.
Put it differently, you implicitly delegate scope of application of your critical conditional access policies!
Using role-assignable group to control the CA policy exclusions would be more optimal, risk-wise. With such configuration, only two aforementioned critical directory roles (Global Administrators
, Privileged Role Administrator
) would be in direct control of group membership and exclusion scope of your critical CA policies.
Role-assignable groups can be used every time you worry about management scope of group membership or ownership, and you want to tighten it down.
Scenarios like Microsoft Defender XDR unified RBAC role assignments, third party line of business application roles and many others.
Things to watch out for
There is tenant-wide limit of 500 role-assignable groups. Keep that in mind and use them only if you really require additional assurances related to management of group membership/ownership.
Another option
If you require even more granular control over group membership and ownership management, consider using role-assignable groups together with resticted administrative units, check out the following cool guide by Jan Bakker - Prevent Conditional Access bypass with Restricted Management Administrative Units in Entra ID.
All work is licensed under a Creative Commons Attribution 4.0 International License.