Azure AD entitlements - Uses GUID instead of name

Hello,

I posted this question in the SailPoint community forum, but not sure if I should post it here instead (please let me know if this is not the right place). I have noticed that when searching for entitlements within the IdentityNow portal, which is pulling from Azure AD, the name of the entitlement is the Azure object ID rather than the name of the actual Azure group. If I want to create a role and add someone to an Azure AD group, I have to search it by the object ID rather than the name.

I know that within Azure, you can have dozens of groups with the same name, and Azure doesn’t care since it only cares about the object ID being unique. But is this behavior “normal”? As far as I can tell, all the API permissions were set correctly based on this document: https://documentation.sailpoint.com/connectors/microsoft/azure_ad/help/integrating_azure_active_dire…

I came across this community post: https://developer.sailpoint.com/discuss/t/azure-entitlement-group-is-showing-as-a-guid-rather-than-a….

One user recommends setting the displayName attribute to be the entitlementID, which worked for them. But I am not sure if this is the right thing to do and if it could cause issues when having multiple Azure groups with the same name.

I am also seeing the same behavior for Office 365 licenses. Instead of displaying the name of the license, it is displaying the license GUID.

Thank you,

Ricardo T


Hey @rt111 ! Nice to talk to you here :yum:

Have you run an entitlement aggregation? If not give that a try.

1 Like

Hi Ricardo,

We also faced a similar issue and as @vkashat mentioned, running the entitlement aggregation resolved this. Please make sure that you select the specific entitlement type while doing the Entitlement aggregation. If you select All, it will pull all entitlement types and will have a huge impact on your aggregation time.

please check the entitlement schema and since this is ootb connector you can raise a support ticket to check if its supported

@vkashat’ s suggestion was the the fix! Thank you everyone for your help!

1 Like

This topic was automatically closed 60 days after the last reply. New replies are no longer allowed.