How to Configure Custom Fine-Grained Permissions for Entra ID Group Management
Overview
This article explains how to configure custom, fine-grained permissions for group and distribution list management in Entra ID (formerly Azure AD) when integrating with Netwrix Directory Manager. By creating custom RBAC roles and assigning only the necessary permissions, you can minimize security exposure and avoid granting broad administrative rights.
Instructions
-
Identify Required Permissions
- For basic group and distribution list management, the following Microsoft Graph and Exchange Online permissions are required:
- Directory.Read.All: Allows reading users, groups, and directory information.
- Group.ReadWrite.All: Allows creating, modifying, and managing groups and group memberships.
- Exchange.ManageAsApp: Enables secure app-only access to Exchange Online for managing distribution lists and mail settings.
-
NOTE: The Exchange Administrator role is not required for basic group management and can be replaced with custom RBAC roles for more granular control.
- For basic group and distribution list management, the following Microsoft Graph and Exchange Online permissions are required:
-
Create Custom Exchange Online RBAC Roles
- Use Exchange Online PowerShell to create custom roles with only the required cmdlets for your use case.
- Example: Custom Role for Distribution Group Management (NDM_DL_Role)
- Base role: Distribution Groups
- Recommended cmdlets to include:
Get-GroupAdd-DistributionGroupMemberGet-DistributionGroupMemberNew-DistributionGroupRemove-DistributionGroupRemove-DistributionGroupMemberUpdate-DistributionGroupMemberSet-DistributionGroupGet-DistributionGroup
- Example: Custom Read-Only Role (NDM_Read_Role)
- Base role: Mail Recipients
- Recommended cmdlets to include:
Get-MailboxGet-UserGet-Recipient
-
Assign Custom Roles to the Application Service Principal
- Assign the custom RBAC roles directly to your Netwrix Directory Manager application service principal in Exchange Online.
- Scope each role to specific groups as needed to further restrict access.
-
Review and Adjust as Needed
- If your use cases expand (e.g., Teams channel management, mailbox permission changes), update the custom roles to include additional cmdlets as required.
NOTE: Exchange.ManageAsApp is required for app-only authentication to Exchange Online, but does not grant any rights until a role is attached. The actual permissions are determined by the RBAC roles you assign.
IMPORTANT: Always review the permissions included in each custom role to ensure you are granting only what is necessary for your operational needs.