Skip to main content
Instead of assigning capabilities to individual users and applications, you use groups in CDF to define what capabilities members (users or applications) have to work with different CDF resources. You can manage CDF group membership from your identity provider - Microsoft Entra ID.

Step 1: Create a group in Microsoft Entra ID

1

Sign in to the Azure portal

Sign it to your Azure portal > Search for and select Microsoft Entra ID.
2

Navigate to New group

Under Manage, select Groups > New group.
3

Create a group

In the New Group window, select Security as the Group type, enter a Group name, and then select Create.
Create group
4

Add members

Select the group to open it, add members - users or service accounts, to the group (service accounts are called applications).
5

Copy the Object Id

Copy and make a note of the Object Id.
Copy Object Id
1

Sign in to Cognite Data Fusion

Sign in to Cognite Data Fusion as an admin.
2

Create a group

Select the Admin workspace, and then Access management > Groups > Create group.
3

Configure the group

Enter a Unique name for the group and Add capabilities.
4

Link the group

In Members select Externally managed, and in the Source ID field, enter the Object Id for the Microsoft Entra ID (ME_ID) group exactly as it exists in ME-ID. It will link the CDF group to an Azure AD group.
Create new group with link to AAD group object ID
5

Link the group to an application

In the Application (Client) ID dropdown, select the existing or create a new Application (Client) ID to link groups to specific applications to improve query efficiency. Application (Client) ID is a unique public identifier for an application registered with an authorization server. You can set more than one Application (Client) ID for a group.When users make a query to CDF, their Effective Access (EA) is determined by the union of all capabilities and scopes from the groups they’re members of. When users make a query from an application, only the groups linked to that application are considered for EA.
This feature is currently supported only for CDF organizations configured with Microsoft Entra ID as their identity provider (IdP).
If a group isn’t linked to any application and the user is a member of that group, the group is considered for all queries, regardless of the application used.If a service account is a member of a group, and the group is linked to an Application (Client) ID different from the service account’s client ID, the group is ignored.
6

Select Create

The members of the Microsoft Entra ID group automatically become members of the linked CDF group with the associated capabilities.