How can we improve Azure Active Directory?

Get user membership groups in the claims with AD B2C

As it's possible in the standard AD by changing the API application manifest option "groupMembershipClaims" to "SecurityGroup", is it possible to return user membership group in the claims with AD B2C?

Now, we can have only the default and custom attributes by adding a signin policy, but it's impossible to get user membership groups.

1,023 votes
Sign in
Sign in with: Microsoft
Signed in as (Sign out)

We’ll send you updates on this idea

Alexandre Blecich shared this idea  ·   ·  Flag idea as inappropriate…  ·  Admin →

We definitely recognize the popularity of this feature, and we discuss it constantly during the planning phases. However there are certain technical limitations in the system that add a large amount of development cost. Because of the cost and the fact that there is a workaround available, other features get prioritized over this one.

That being said, please keep voting for it. The popularity of the feature does help bring it up and makes us reconsider every time.

Apologies for the delay.


Old message:
We’re doing some research both on the specifics of this ask as well as what it would take to support this.
Is the ask here to do the same thing that regular Azure AD does (see: or is are there different requirements around this for Azure AD B2C?


Sign in
Sign in with: Microsoft
Signed in as (Sign out)
  • Kyle Pope commented  ·   ·  Flag as inappropriate

    Thanks Lucas Vogel and ricky zou for the example solutions. While I like both solutions, I think the ideal solution is something like ricky's since it returns the groups as part of the token and doesn't put the responsibility to go look them up in each app that uses B2C. That said, it has increased complexity since you'll need to (1) use a custom policy and (2) manage/configure the extra Azure function that must be deployed... I still think it would be a big win if Microsoft would provide an officially documented workaround that does this and makes it easy for people to implement this feature on their own...

  • ricky zou commented  ·   ·  Flag as inappropriate

    A MS consultant provided link to this workaround ( , and it's UGLY! B2C for us provides abstraction layer for handling other Idps in order to reduce complexity, this limitation and the complexity in the workaround is making me rethink if B2C is even a good fit for us. not only is the workaround difficult to setup and maintain, it requires an additional AZ Function service.

  • Hemant commented  ·   ·  Flag as inappropriate

    Can you guys please suggest work around?
    One workaround that I can think of is, include an extension attribute and assign group name to this attribute, which can be further included in claim.

    Any better solution?

  • Jan commented  ·   ·  Flag as inappropriate

    If this is not going to get implemented at least document this and publish the workaround for this. This is a basic requirement and aad b2c is a paid service.

  • Nick Lennox commented  ·   ·  Flag as inappropriate

    Just to keep the pressure on, I am now on the third customer site where this feature would have been very valuable. Please implement the ability to configure B2C to add group id’s as claims in the B2C JWT.

  • Anonymous commented  ·   ·  Flag as inappropriate

    What is this "workaround" that you refer to? This seems like such basic "minimum viable product" functionality... you must really have a mess of legacy code on your hands here. I'll continue to use AWS Cognito, Okta, Auth0 and other more mature solutions, and recommend that my customers and colleagues do the same... Microsoft probably doesn't really care that we use other solutions anyway, as is evident from the age and popularity of this request.

  • Don Airey commented  ·   ·  Flag as inappropriate

    Microsoft: Because of the cost and the fact that there is a workaround available, other features get prioritized over this one.

    Translation: Please evaluate Okta as we currently are not employing anyone competent enough to build this feature into our product.

  • Adam Tibi commented  ·   ·  Flag as inappropriate

    This is so important that I am having to abandon using AD B2C if this is not implemented and the workarounds seem like hacks rather than a proper solution.
    This has been under review for long time, is there an estimate of when this would be done (or not)?

  • Kyle Pope commented  ·   ·  Flag as inappropriate

    It really is a shame that this isn't supported.

    Since it's unlikely to be implemented, it might be really useful and much less effort to embrace this limitation and provide an official Microsoft solution that is external to changing the B2C product. I'm thinking something similar to the Git repo Marcel Juhnke provided in a previous comment but more refined, including:
    * Implementation of user group retrieval as an Azure function with proper error handling and necessary authentication implemented.
    * Detailed documentation on the Microsoft B2C documentation portal about how to configure/install and integrate a custom policy with it.

    If this solution existed and it was relatively easy to implement it might go a long way to address this issue.

  • Jerry Dixon commented  ·   ·  Flag as inappropriate

    Three years and still no answer? Should I drop this and evaluate competitors? This is a basic requirement and my management team was shocked that it is not available.

  • Marcel Juhnke commented  ·   ·  Flag as inappropriate

    While this is still not available natively, you can get around this with a custom policy and using RESTful API integration. You will need a service that is called by the User Journey which in turn queries the actual Azure AD behind the B2C tenant for the user's group memberships.

    If anyone is interested, we have written a small service to do exactly that as we faced the same issue:

← Previous 1 3 4

Feedback and Knowledge Base