
Enrich authorization with Microsoft Entra ID data
Automatically pull user profiles, security groups, directory roles, and organizational data from Microsoft Entra ID into your Cerbos policy evaluations.
Microsoft Entra ID context
Automatically enrich authorization requests with user profiles and group memberships from Microsoft Entra ID
Cached responses
Configurable TTLs cache enrichment results to balance data freshness against evaluation latency
Zero application code
Identity enrichment happens at the policy layer, your application code stays clean
How Cerbos works with Microsoft Entra ID
Authorization decisions are only as good as the data behind them. Microsoft Entra ID provides real-time context (user profiles, group memberships, or external attributes) that makes Cerbos policies richer and more accurate.
Cerbos lets you write fine-grained, context-aware authorization policies in human-readable YAML. With Microsoft Entra ID as a context source, those policies can evaluate attributes beyond what's in the initial request.
Because enrichment happens at the policy layer, your application code stays clean, no custom plumbing to fetch and merge identity data before making authorization calls.
Authorization powered by your Microsoft Entra ID directory
Enterprise organizations running Microsoft Entra ID (formerly Azure AD) maintain rich user profiles, security groups, directory roles, department hierarchies, and custom extension attributes. Cerbos identity enrichment makes all of this data available in your authorization policies, closing the gap between identity management and access control.
How it works
- Your application sends an authorization request with the user's Entra ID object identifier or UPN.
- Cerbos Synapse queries Microsoft Graph for the user's profile, security groups, directory roles, and organizational data via a proxy extension.
- Enriched data is available in your policies, write rules based on security groups, directory roles, department, manager chain, job title, or custom extension attributes.
- Cached with configurable TTLs for low-latency decisions with fresh data.
Transitive group resolution
Entra ID security groups can be nested. Cerbos resolves transitive memberships so your policies don't need to account for group hierarchy depth, a user who is a member of group A, which is nested inside group B, satisfies policies requiring membership in group B.
Get started
Entra ID identity enrichment is available as part of Cerbos Synapse. Talk to us to learn more about enriching your authorization decisions with Microsoft Entra ID data.
FAQ
How does Entra ID enrichment work?
Cerbos queries Microsoft Graph API to fetch user profiles, security group memberships, directory roles, and organizational data at evaluation time. This enriched context is available as principal attributes in your policies.
Can I use Entra ID security groups and directory roles in policies?
Yes. Cerbos resolves both direct and transitive group memberships, directory roles, and administrative unit assignments. You can write policies based on any combination of these, for example, requiring both a specific security group and a directory role for sensitive operations.
Does this work with hybrid Active Directory environments?
Yes. If your on-premises Active Directory is synced to Entra ID, the synced attributes, groups, and organizational units are available through the enrichment pipeline. Cerbos operates on whatever data is present in the Entra ID directory.
Learn more about Cerbos
Related integrations
View all integrations →
Cerbos + Microsoft Entra ID
- Authorization decisions enriched with real-time Microsoft Entra ID data
- Context enrichment configured at the policy layer, not in application code
- Identity attributes and business context combined in policies
- Centrally managed authorization logic across the stack