I have a requirement to add users to an Azure Active Directory group with certain privileges.
For example, specific user added to adgroup1 gets edit access on application specific data, while the same user could be part of adgroup2 with read only access for different set of application data.
What would be the best practice to implement this? Appreciate the feedback.
I am afraid this could not be implemented, in Azure AD, a normal user (i.e.
User typeismember) has the default permissions to view all the AD Apps in the tenant, source here.This could not be restricted, default permissions for member users can be restricted list here, even if you set
Restrict access to Azure AD administration portal, the user can also get the information from other clients e.g. powershell.For the edit permission, the user needs to be added as an
Ownerto the AD App, but theAAD groupis not supported to be added as anOwnerto the AD App.