Submit a ticket My Tickets
Welcome
Login  Sign up

SCIM Domain Group Mapping – Azure Entra ID

PowerDMARC now supports domain group assignment through SCIM, allowing you to control which domain groups a user belongs to directly from your identity provider. This guide walks you through how to configure domain group mapping in Azure Entra ID so that group assignments are automatically synced to PowerDMARC during user provisioning and updates.

Step 1: Add the Custom Domain Groups Attribute

  • In the Azure portal, go to Home > Enterprise applications and open your PowerDMARC application.
  • Click Provisioning in the left pane, then click Attribute mapping.


  • Click the Provision Microsoft Entra ID Users link.


  • At the bottom of the page, check the Show advanced options checkbox, then click the Edit attribute list for customappsso link.


  • Scroll to the end of the attribute list, enter the following value in the first empty column, and click Save:
urn:ietf:params:scim:schemas:extension:custom:2.0:User:domainGroups


Step 2: Map the Attribute to a Source Field

  • After saving, you will be returned to the Attribute mapping page. Click the Add New Mapping link.
  • In the Edit Attribute form, configure the mapping as follows:
    • Target Attribute: urn:ietf:params:scim:schemas:extension:custom:2.0:User:domainGroups
    • Source Attribute: Select any string-type field where you plan to enter domain group values — for example, department.


⚠️ Note: If standard profile fields like department are already in use or have length limitations, you can use one of the extensionAttribute1–15 fields instead and update it via the Azure Graph API.

Assigning Domain Groups to a User

Depending on which source attribute you chose, there are two ways to assign domain groups:

Via a Standard User Attribute (e.g., department)

  • In the Azure portal, navigate to Home > Users and click the user you want to update.
  • Click the Edit properties button.


  • Find the field you selected as the Source Attribute and enter the domain groups in a comma-delimited format — for example: Group1,Group2.


⚠️ Note: Do not include spaces between domain group names and commas. For example, use Group1,Group2 not Group1, Group2.

Via an Extension Attribute (extensionAttribute1–15)

If you selected one of the extensionAttribute1–15 fields as your source attribute, update it using the Azure Graph API. The required permission is User.ReadWrite.All.

In this example, extensionAttribute1 is used as the source attribute:

PATCH https://graph.microsoft.com/v1.0/users/{user-id} 
{  "onPremisesExtensionAttributes": {    "extensionAttribute1": "Group1,Group2"  } }

⚠️ Note: Do not include spaces between domain group names and commas when using the Graph API request body.

Removing All Domain Groups from a User

PowerDMARC will not take any action if the domain groups value is empty. If you want to remove all domain groups assigned to a user, set the value to -1 instead of leaving it blank. This applies to both the standard user attribute field and the Azure Graph API request body.


 Good to know: Setting the value to -1 is the correct way to fully unassign all domain groups from a user. An empty field will be ignored by PowerDMARC.
P
PowerDMARC is the author of this solution article.

Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.