The author needed to create a Power Automate flow to create Microsoft Entra ID security groups and assign members to them. However, the standard Microsoft Entra ID connector required too many permissions and didn't offer the ability to use Service Principal credentials. So, the author created a custom connector using the Microsoft Azure Active Directory Connector on GitHub and the Microsoft Graph API. The custom connector has limited operations and strictly necessary permissions, and allows service principal credentials authentication. The author provides instructions on how to register an application in Azure Entra ID and install the secure Microsoft Entra ID connector. The connector can be used in Power Automate flows to create and manage security groups. The author also provides helpful links for further documentation and resources.
Login now to access my digest by 365.Training