Home
%3CLINGO-SUB%20id%3D%22lingo-sub-473463%22%20slang%3D%22en-US%22%3EMove%20even%20more%20apps%20to%20Azure%20AD%3A%20Public%20preview%20of%20group%20claims!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-473463%22%20slang%3D%22en-US%22%3E%3CP%3EHowdy%20folks%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%E2%80%99m%20excited%20to%20announce%20the%20public%20preview%20of%20group%20claims%20in%20SAML%20and%20OIDC%2FOAuth%20tokens%20issued%20by%20Azure%20Active%20Directory%20(Azure%20AD).%20This%20feature%20is%20designed%20to%20allow%20you%20to%20move%20applications%20from%20Active%20Directory%20Federation%20Services%20(AD%20FS)%20or%20another%20identity%20provider%20to%20Azure%20AD.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESome%20applications%20expect%20to%20receive%20a%20user%E2%80%99s%20group%20membership%20information%20as%20claims%20in%20the%20token.%20When%20using%20groups%20from%20Windows%20Active%20Directory%20Domain%20Services%2C%20these%20claims%20typically%20use%20the%20group%E2%80%99s%20sAMAccountName%20from%20the%20on-premises%20Active%20Directory%20or%20the%20group%E2%80%99s%20on-premises%20group%20security%20identifier%20(SID).%20These%20attributes%20were%20used%20to%20support%20applications%20and%20clients%20in%20previous%20versions%20of%20Windows%20and%20are%20still%20in%20use%20today.%20By%20configuring%20Azure%20AD%20to%20emit%20the%20same%20group%20details%20in%20claims%20as%20the%20application%20previously%20received%2C%20you%20can%20move%20the%20application%20to%20work%20directly%20with%20Azure%20AD%20and%20take%20advantage%20of%20the%20identity-based%20security%20capabilities%20that%20Azure%20AD%20offers.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20part%20of%20this%20release%2C%20group%20claim%20configuration%20is%20now%20part%20of%20the%20Enterprise%20Applications%20single%20sign-on%20(SSO)%20configuration%20in%20the%20Azure%20portal%20for%20SAML%20applications.%20This%20allows%20you%20to%20easily%20configure%20options%20for%20the%20format%20of%20these%20claims%20and%20to%20customize%20the%20SAML%20attribute%20names%20for%20group%20data.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20configure%20an%20application%20to%20receive%20group%20claims%20from%20on-premises%20groups%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EIf%20you%20want%20to%20use%20on-premises%20group%20names%20or%20SIDs%2C%20be%20sure%20you%20are%20running%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Fhybrid%2Freference-connect-version-history%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Elatest%20version%20of%20AD%20Connect%3C%2FA%3E%20to%20synchronize%20Windows%20Active%20Directory%20with%20Azure%20AD.%20Support%20for%20synchronizing%20the%20on-premises%20group%20attributes%20required%20for%20these%20claims%20was%20added%20in%20version%201.2.70%20(December%202018).%3C%2FLI%3E%0A%3CLI%3EIn%20the%20%3CA%20href%3D%22https%3A%2F%2Fportal.azure.com%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20portal%3C%2FA%3E%2C%20signed%20in%20with%20a%20role%20capable%20of%20managing%20applications%2C%20go%20to%20the%20%3CSTRONG%3EAzure%20Active%20Directory%3C%2FSTRONG%3E%20%26gt%3B%20%3CSTRONG%3EEnterprise%20applications%3C%2FSTRONG%3E%20blade%2C%20and%20then%20select%20the%20application%20that%20you%20wish%20to%20configure%20for%20group%20claims.%3C%2FLI%3E%0A%3CLI%3EClick%20%3CSTRONG%3ESingle%20sign-on%3C%2FSTRONG%3E%20and%20then%20%3CSTRONG%3EUser%20Attributes%20and%20Claims%3CEM%3E.%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3CLI%3ENext%20to%20Groups%20returned%20in%20token%2C%20select%20the%20%3CSTRONG%3EEdit%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F109546iFB611E5E2B93E1AA%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Public%20preview%20of%20group%20claims%201.png%22%20title%3D%22Public%20preview%20of%20group%20claims%201.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F109547iAAC8D31A64A8913E%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Public%20preview%20of%20group%20claims%202.png%22%20title%3D%22Public%20preview%20of%20group%20claims%202.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20can%20specify%20the%20groups%20that%20will%20be%20included%20in%20the%20token%2C%20the%20format%20that%20will%20be%20used%2C%20and%20you%20can%20customize%20the%20SAML%20attribute%20name%20for%20the%20group%20claims.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhile%20OIDC%2FOAuth%20applications%20less%20commonly%20use%20this%20functionality%2C%20it%E2%80%99s%20also%20available%20in%20the%20application%20manifest%20in%20the%20Application%20Registration.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOur%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Factive-directory%2Fhybrid%2Fhow-to-connect-fed-group-claims%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Edocumentation%20for%20integrating%20an%20application%20that%20requires%20group%20claims%3C%2FA%3E%20with%20Azure%20AD%20covers%20both%20SAML%20and%20OIDC%2FOAuth.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELet%20us%20know%20what%20you%20think%20in%20the%20comments%20below.%20We%E2%80%99re%20always%20keen%20to%20hear%20any%20feedback%20or%20suggestions%20you%20have.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBest%20regards%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAlex%20Simons%20(%40Alex_A_Simons%26nbsp%3B)%3C%2FP%3E%0A%3CP%3ECorporate%20VP%20of%20Program%20Management%3C%2FP%3E%0A%3CP%3EMicrosoft%20Identity%20Division%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-473463%22%20slang%3D%22en-US%22%3E%3CP%3EI%E2%80%99m%20excited%20to%20announce%20the%20public%20preview%20of%20group%20claims%20in%20SAML%20%26amp%3B%20OIDC%2FOAuth%20tokens%20issued%20by%20Azure%20Active%20Directory.%26nbsp%3B%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F109545i24FB546B23D8E881%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Public%20preview%20of%20group%20claims%20teaser.png%22%20title%3D%22Public%20preview%20of%20group%20claims%20teaser.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-473463%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Active%20Directory%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIdentity%20and%20Access%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-482103%22%20slang%3D%22en-US%22%3ERe%3A%20Move%20even%20more%20apps%20to%20Azure%20AD%3A%20Public%20preview%20of%20group%20claims!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-482103%22%20slang%3D%22en-US%22%3E%3CP%3EWow%20this%20is%20cool%2C%26nbsp%3B%20is%20there%20a%20way%20to%20do%20something%20like%20the%20following%20with%20azure%20ad.%26nbsp%3B%20So%20groups%20that%20start%20with%20CA_%20are%20passed.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3Ec%3A%5BType%20%3D%3D%20%22%3CA%20href%3D%22http%3A%2F%2Fschemas.xmlsoap.org%2Fclaims%2FGroup%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttp%3A%2F%2Fschemas.xmlsoap.org%2Fclaims%2FGroup%3C%2FA%3E%22%2C%20Value%20%3D~%20%22(%3Fi)CA_%22%5D%3CBR%20%2F%3E%3D%26gt%3B%20issue(claim%20%3D%20c)%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20rp%20was%20too%20lazy%20to%20fix%20their%20code%20in%20this%20case%20so%20we%20had%20to%20do%20this%2C%20this%20is%20holding%20us%20up%20from%20moving%20our%20last%20adfs%20based%20rp.%3C%2FP%3E%3CP%3Ethanks%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-482327%22%20slang%3D%22en-US%22%3ERe%3A%20Move%20even%20more%20apps%20to%20Azure%20AD%3A%20Public%20preview%20of%20group%20claims!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-482327%22%20slang%3D%22en-US%22%3E%3CP%20style%3D%22text-align%3A%20center%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F44446%22%20target%3D%22_blank%22%3E%40Tony%20Roth%3C%2FA%3E%20We're%20working%20on%20further%20enhancements%20to%20this%2C%20and%20in%20particular%20the%20ability%20to%20scope%20the%20set%20of%20groups%20included%20in%20the%20token%20to%20those%20the%20app%20is%20interested%20in.%26nbsp%3B%20We'll%20likely%20use%20direct%20assignment%20rather%20than%20string%20matching.%26nbsp%3B%20No%20ETA%20yet%2C%20but%20watch%20this%20space%20!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-482329%22%20slang%3D%22en-US%22%3ERe%3A%20Move%20even%20more%20apps%20to%20Azure%20AD%3A%20Public%20preview%20of%20group%20claims!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-482329%22%20slang%3D%22en-US%22%3E%3CP%3ESounds%20good%20thanks%20for%20the%20response.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-482451%22%20slang%3D%22en-US%22%3ERe%3A%20Move%20even%20more%20apps%20to%20Azure%20AD%3A%20Public%20preview%20of%20group%20claims!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-482451%22%20slang%3D%22en-US%22%3E%3CP%3EI%20had%20the%20problem%20with%20the%20maximum%20group%20limit%20emitted%20in%20the%20token%20(150%20groups%20i%20believe)%2C%20and%20then%20the%20token%20consists%20of%20a%20link%20pointing%20to%20MS%20Graph.%3C%2FP%3E%3CP%3EThe%20remote%20SP%20can't%20resolve%20this%20link%20and%20then%20the%20claim%20fails%20to%20work.%3C%2FP%3E%3CP%3EHow%20can%20i%20mittigate%20this%3F%3CBR%20%2F%3EHow%20can%20i%20emit%20more%20groups%20in%20the%20token%3F%3CBR%20%2F%3E%3CBR%20%2F%3EMy%20workarround%20to%20this%20problem%20was%20by%20creating%20custom%20ApplicationRoles%20inside%20my%20custom%20Enterprise%20Application%2C%20and%20assigning%20them%20to%20my%20sync'ed%20AD%20groups.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-482492%22%20slang%3D%22en-US%22%3ERe%3A%20Move%20even%20more%20apps%20to%20Azure%20AD%3A%20Public%20preview%20of%20group%20claims!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-482492%22%20slang%3D%22en-US%22%3E%3CP%3EGreat%20to%20see%20the%20SAML%2FOAuth%2FOIDC%20features%20of%20Azure%20AD%20evolving!%20Good%20job!%3C%2FP%3E%3CP%3EI%20appreciate%20that%20it%20is%20easy%20to%20configure%20-%20which%20is%20important%20for%2099%25%20of%20admins.%20Nevertheless%20hope%20to%20see%20more%20sophisticated%20claim%20configuration%20capabilites%20using%20script%2Fconfig%20like%20we%20have%20in%20ADFS.%3C%2FP%3E%3CP%3EBTW%3A%20Is%20there%20a%20uservoice%20for%20similar%20feature%20requests%20(e.g.%20custom%20issuer%20ID%2C%20...)%3F%20Can%20you%20please%20point%20me%20towards.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-482525%22%20slang%3D%22en-US%22%3ERe%3A%20Move%20even%20more%20apps%20to%20Azure%20AD%3A%20Public%20preview%20of%20group%20claims!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-482525%22%20slang%3D%22en-US%22%3E%3CP%3EMicki%3A%20In%20that%20scenario%20you%20need%20to%20make%20additional%20query%20to%20get%20the%20groups%20via%20MS%20Graph%20as%20described%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FAzure-Active-Directory-Identity%2FAzure-Active-Directory-now-with-Group-Claims-and-Application%2Fba-p%2F243862%22%20target%3D%22_self%22%3Ehere%3C%2FA%3E.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-482731%22%20slang%3D%22en-US%22%3ERe%3A%20Move%20even%20more%20apps%20to%20Azure%20AD%3A%20Public%20preview%20of%20group%20claims!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-482731%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F259977%22%20target%3D%22_blank%22%3E%40jussipalo%3C%2FA%3E%26nbsp%3B%20I%20have%20the%20same%20question%20Micki%20has%2C%20doesn't%20the%20rp%20have%20to%20support%20this%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-984994%22%20slang%3D%22en-US%22%3ERe%3A%20Move%20even%20more%20apps%20to%20Azure%20AD%3A%20Public%20preview%20of%20group%20claims!%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-984994%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F280137%22%20target%3D%22_blank%22%3E%40paulgarn%3C%2FA%3E%26amp%3B%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F259977%22%20target%3D%22_blank%22%3E%40jussipalo%3C%2FA%3E%20Any%20updates%20on%20when%20the%20ability%20to%20select%20specific%20groups%20to%20provide%20to%20the%20application%20will%20be%20available%3F%20Like%20other%20commenters%2C%20we're%20having%20issues%20with%20customers%20who%20have%20a%20ton%20of%20groups%20assigned%20to%20individual%20users%20and%20it%20is%20exceeding%20the%20150%2F200%20group%20limits.%3C%2FP%3E%3C%2FLINGO-BODY%3E

Howdy folks,

 

I’m excited to announce the public preview of group claims in SAML and OIDC/OAuth tokens issued by Azure Active Directory (Azure AD). This feature is designed to allow you to move applications from Active Directory Federation Services (AD FS) or another identity provider to Azure AD.

 

Some applications expect to receive a user’s group membership information as claims in the token. When using groups from Windows Active Directory Domain Services, these claims typically use the group’s sAMAccountName from the on-premises Active Directory or the group’s on-premises group security identifier (SID). These attributes were used to support applications and clients in previous versions of Windows and are still in use today. By configuring Azure AD to emit the same group details in claims as the application previously received, you can move the application to work directly with Azure AD and take advantage of the identity-based security capabilities that Azure AD offers.

 

As part of this release, group claim configuration is now part of the Enterprise Applications single sign-on (SSO) configuration in the Azure portal for SAML applications. This allows you to easily configure options for the format of these claims and to customize the SAML attribute names for group data.

 

To configure an application to receive group claims from on-premises groups:

 

  1. If you want to use on-premises group names or SIDs, be sure you are running the latest version of AD Connect to synchronize Windows Active Directory with Azure AD. Support for synchronizing the on-premises group attributes required for these claims was added in version 1.2.70 (December 2018).
  2. In the Azure portal, signed in with a role capable of managing applications, go to the Azure Active Directory > Enterprise applications blade, and then select the application that you wish to configure for group claims.
  3. Click Single sign-on and then User Attributes and Claims.
  4. Next to Groups returned in token, select the Edit

Public preview of group claims 1.png

 

Public preview of group claims 2.png

 

You can specify the groups that will be included in the token, the format that will be used, and you can customize the SAML attribute name for the group claims.

 

While OIDC/OAuth applications less commonly use this functionality, it’s also available in the application manifest in the Application Registration.

 

Our documentation for integrating an application that requires group claims with Azure AD covers both SAML and OIDC/OAuth.

 

Let us know what you think in the comments below. We’re always keen to hear any feedback or suggestions you have.

 

Best regards,

 

Alex Simons (@Alex_A_Simons )

Corporate VP of Program Management

Microsoft Identity Division

8 Comments
Occasional Contributor

Wow this is cool,  is there a way to do something like the following with azure ad.  So groups that start with CA_ are passed.

 

c:[Type == "http://schemas.xmlsoap.org/claims/Group", Value =~ "(?i)CA_"]
=> issue(claim = c);

 

The rp was too lazy to fix their code in this case so we had to do this, this is holding us up from moving our last adfs based rp.

thanks

 

 

 

Microsoft

@Tony Roth We're working on further enhancements to this, and in particular the ability to scope the set of groups included in the token to those the app is interested in.  We'll likely use direct assignment rather than string matching.  No ETA yet, but watch this space !

Occasional Contributor

Sounds good thanks for the response.

New Contributor

I had the problem with the maximum group limit emitted in the token (150 groups i believe), and then the token consists of a link pointing to MS Graph.

The remote SP can't resolve this link and then the claim fails to work.

How can i mittigate this?
How can i emit more groups in the token?

My workarround to this problem was by creating custom ApplicationRoles inside my custom Enterprise Application, and assigning them to my sync'ed AD groups.

 

 

Regular Visitor

Great to see the SAML/OAuth/OIDC features of Azure AD evolving! Good job!

I appreciate that it is easy to configure - which is important for 99% of admins. Nevertheless hope to see more sophisticated claim configuration capabilites using script/config like we have in ADFS.

BTW: Is there a uservoice for similar feature requests (e.g. custom issuer ID, ...)? Can you please point me towards.

 

Occasional Contributor

Micki: In that scenario you need to make additional query to get the groups via MS Graph as described here.

Occasional Contributor

@jussipalo  I have the same question Micki has, doesn't the rp have to support this?

Occasional Visitor

@paulgarn& @jussipalo Any updates on when the ability to select specific groups to provide to the application will be available? Like other commenters, we're having issues with customers who have a ton of groups assigned to individual users and it is exceeding the 150/200 group limits.