Most orgs still treat on-prem AD groups as sacred, syncing them to Entra ID and calling it “hybrid.” In reality, those objects are zombies: visible in Entra but ruled by on-prem, which blocks modern governance (dynamic membership, access reviews, APIs) and slows HR-driven provisioning. The fix is recognizing Source of Authority (SoA) per object. Groups that matter to cloud workloads should be cloud-managed (isCloudManaged=true), with Group Writeback used only where legacy systems still need on-prem visibility. Entra brings dynamic rules, self-service, access reviews, and unified audit; AD brings inertia and gray, read-only fields. The path forward: inventory and purge “zombie” groups, classify what stays, finish Exchange migrations, convert eligible security groups to Entra authority, and enable writeback via Cloud Sync for any remaining on-prem dependencies. This isn’t rebellion; it’s alignment—put governance where work happens. Let AD retire into archival role; let Entra run identity like it’s this decade.

Apple Podcasts podcast player iconSpotify podcast player iconYoutube Music podcast player iconSpreaker podcast player iconPodchaser podcast player iconAmazon Music podcast player icon

You might believe your AD groups control access and permissions perfectly. However, the truth is different. Many IT teams discover that AD groups are not as reliable as they seem. In fact, AD groups are a lie when it comes to reflecting actual control. This misconception creates risks in security and compliance. You must address the source of authority quickly to avoid confusion and potential breaches. Understanding this problem starts your journey toward better identity governance.

Key Takeaways

  • AD groups often misrepresent actual permissions, leading to confusion and security risks.
  • Regularly audit and purge unused or 'zombie' groups to improve security and compliance.
  • Establish clear ownership and governance for AD groups to prevent overprovisioning and access creep.
  • Enable dynamic membership to automate group management and reduce manual errors.
  • Transitioning to Microsoft Entra ID enhances security and streamlines identity management processes.
  • Implement role-based access control (RBAC) to align with zero-trust security principles.
  • Plan a phased rollout for migration to minimize disruption and ensure a smooth transition.
  • Utilize automation tools to manage user identities and permissions efficiently.

Why AD Groups Are a Lie

The Reality of AD Group Control

Many organizations mistakenly believe that their AD groups effectively manage access and permissions. However, this belief often leads to confusion and security risks. Active Directory, developed in the late 1990s, is widely recognized but frequently misunderstood. As you transition to a hybrid cloud model, you may find that the functionality of AD groups does not align with your expectations.

AD groups do not always control permissions as you think. For instance, permissions for Teams groups may not match what you see in associated SharePoint sites. This inconsistency can confuse users regarding their access rights. The default site group members remain hidden, showing only the group name in site permissions. Such discrepancies highlight the limitations of relying solely on traditional AD groups for effective governance.

Common Misconceptions About Membership

You might think that membership in an Active Directory group guarantees proper access control. Unfortunately, this is not the case. Many IT admins have questions about how AD functions and its relevance today. Misconfigurations often arise from flawed guidance, leading to security vulnerabilities. For example, the AdminSDHolder has been documented incorrectly for decades, creating gaps in most AD DS environments.

Here are some common misconceptions about AD groups:

  • Many believe that all members of an AD group automatically inherit permissions.
  • Some think that once a group is created, it remains relevant indefinitely.
  • Others assume that all groups are actively managed and monitored.

These misconceptions can lead to outdated permissions and increased security risks.

The Problem of "Zombie" Groups

One significant issue with AD groups is the prevalence of "zombie" groups. Large organizations often have thousands of groups, with the average company having around 7,740 groups. This excessive volume complicates identity and access management. Tracking and reviewing group memberships becomes challenging over time.

Unused or orphaned AD groups accumulate, leading to poor hygiene in group management. Permissions granted through these groups can become outdated or unnecessary, increasing your organization's attack surface. Regular audits and automated tools are essential to detect and disable these orphaned accounts and groups. By addressing the problem of zombie groups, you can enhance your security posture and streamline group management.

Understanding the Source of Authority

What Is Source of Authority?

The source of authority in identity management refers to a trusted repository for identity data. This repository plays a crucial role in ensuring that user information remains accurate, timely, and consistent across various systems. When you manage identities, you need a reliable source that governs who has access to what. Without a clear source of authority, your organization risks confusion and security vulnerabilities.

Why Change Is Complex

Transitioning from on-prem Active Directory (AD) to Entra ID is not a straightforward process. It requires meticulous planning and validation of application dependencies. You must ensure that users do not rely on on-prem applications that require password-based or federated authentication. This reliance complicates the transition. Additionally, the shift involves a controlled lifecycle process to maintain the integrity of identity data during the move to Microsoft Entra ID.

Impact on Security and Compliance

The source of authority significantly impacts your organization's security and compliance posture. When you use outdated on-prem AD systems, you expose yourself to risks. These systems often lack the advanced features necessary for modern governance, such as dynamic membership and automated access reviews. By transitioning to Entra ID, you enhance your security framework. You gain access to cloud-native features that streamline compliance efforts and improve overall identity management.

Fixing Your AD Group Issues

Audit and Purge Unused Groups

To enhance your Active Directory group management, start by auditing and purging unused groups. Follow these steps to ensure effective cleanup:

StepDescription
1Validate group existence by requiring group owners to attest to the need for a group's existence.
2Conduct group attestation periodically to verify attributes, membership, and permissions.
3Ensure accuracy by syncing AD user accounts with trusted sources like HR systems.
4Automate group management processes to reduce human error and management overhead.
5Delete unnecessary groups by requiring group owners to review and report on their groups.
6Set expiration dates for groups to manage their lifecycle effectively.

Regular audits help you maintain a clean and efficient group structure. By removing outdated groups, you reduce security risks and improve compliance.

Define Ownership and Governance

Defining ownership and governance in your AD group management is crucial. Clear ownership mitigates overprovisioning, a significant security risk. When you tailor access to specific needs rather than broad roles, you adhere to the principle of least privilege. This approach reduces the attack surface for insider threats and compromised accounts.

Compliance is another critical concern. With 70% of organizations facing multiple data regulations, implementing clear ownership helps manage user permissions effectively. This prevents 'access creep,' which can jeopardize compliance efforts. Establishing governance policies ensures that your organization maintains control over who has access to what, enhancing overall security.

Enable Dynamic Membership

Enabling dynamic membership in your AD groups can significantly streamline management. Here are some benefits of this approach:

  • Membership is determined by specified rules, reducing manual management.
  • Automatic updates to group membership based on user attributes decrease the risk of errors associated with manual group management.
  • Dynamic membership allows for automatic addition and removal of users based on defined conditions, enhancing efficiency in managing user access.

By automating group membership based on user or device attributes, you reduce administrative overhead and minimize errors. This supports role-based access control and conditional access policies, improving auditability and governance.

Transitioning to Entra ID

Benefits of Entra ID

Transitioning to Microsoft Entra ID offers numerous advantages for group management. Here are some key benefits:

BenefitDescription
Identity Lifecycle ManagementAutomates the creation, updating, and deletion of user identities and permissions.
Dynamic GroupsSupports cloud-centric environments and integrates with on-premises AD groups for access provisioning.
Access ReviewsPeriodically verifies user access to maintain compliance and improve security.
Entitlement ManagementManages user permissions and access rights effectively.
External IdentitiesAllows integration of users from various identity providers for seamless access.

By leveraging these features, you can enhance your organization's security and streamline identity management processes.

Migration Strategies

Migrating from on-prem Active Directory to Microsoft Entra ID requires careful planning. Here are effective strategies to ensure a smooth transition:

  1. Discover and scope applications: Identify all on-premises AD FS relying party applications. Assess their compatibility for migration to Microsoft Entra ID using tools like the AD FS to Microsoft Entra App Migration Tool.

  2. Classify applications and plan pilot migration: Categorize apps based on complexity and criticality. Plan phased migration and pilot testing to validate the process.

  3. Prepare validation environment: Set up test instances of applications in Microsoft Entra ID. Clone AD FS configurations and validate claims and identifiers to ensure a smooth transition.

  4. Migrate applications in phases: Begin with pilot apps, run migration tests, fix issues, and then scale migration to additional apps and users. Manage authentication through Microsoft Entra ID.

  5. Manage and monitor post-migration: Use Microsoft Entra admin center tools and reporting APIs to audit app usage, permissions, and sign-in activities. This ensures secure access and operational health.

  6. Remove federation: After successful migration and validation, decommission the AD FS infrastructure to complete the transition.

Overcoming Legacy Dependencies

Legacy dependencies can complicate your migration to Microsoft Entra ID. Here are common challenges and ways to overcome them:

  • Migration often requires coexistence between on-premises and cloud identity providers, complicating security and management.
  • Rewriting legacy application code to support Entra ID can be time-consuming and divert developer resources from other priorities.
  • Maintaining consistent access policies across multiple identity systems can lead to fragmentation and increased security risks.
  • Running multiple identity systems may cause inconsistent identity data and over-provisioning, weakening your security posture.

To address these challenges, consider adopting a hybrid model. Maintain Active Directory Domain Services (AD DS) for legacy dependencies while using Microsoft Entra ID as the primary system for cloud access. Utilizing Identity Orchestration can also streamline the migration process without the need to rewrite legacy applications. Integrating legacy systems through API gateways and zero-trust access controls allows for centralized monitoring while maintaining security.

The Benefits of Fixing the Source of Authority

The Benefits of Fixing the Source of Authority

Enhanced Security and Compliance

Fixing the source of authority significantly boosts your organization's security and compliance. When you transition to a modern identity management system, you can expect measurable improvements. For instance, organizations often learn from past incidents and adapt their security measures accordingly. This proactive approach leads to a continuous evolution of tools and controls that respond to changing risks.

You can also establish a feedback loop that makes compliance a dynamic process. This means you will have evidence of trends, execution, and changes over time. Here are some key improvements you might notice:

Improvement TypeDescription
Learning from incidentsOrganizations adapt their security measures based on past experiences.
Evolving toolchainTools and controls continuously evolve to address new risks.
Feedback loopCompliance becomes a dynamic process with evidence of trends and changes.

Improved Group Management

Improved group management leads to enhanced operational efficiency. When you fix the source of authority, you streamline how groups are managed. This change fosters better collaboration among teams. Timely information sharing reduces bottlenecks and delays. Aligning team priorities minimizes frustration and friction, which enhances overall productivity.

Additionally, eliminating isolated projects prevents duplication and inconsistencies. A unified data system fosters cross-functional insights, aiding in better decision-making. Here are some benefits of improved group management:

Automating Lifecycle Management

Automating lifecycle management is another significant benefit of fixing the source of authority. You can leverage tools like Microsoft Entra ID and Power Automate to streamline this process. These tools allow for automatic provisioning to on-premises apps and other directories. User provisioning can create, update, and remove accounts in various applications seamlessly.

Here are some key features of automation tools:

  • Automatic provisioning to on-premises apps and other directories.
  • User provisioning can create, update, and remove accounts in various applications.
  • Connectors available for hundreds of cloud and on-premises applications.

By automating these processes, you reduce manual onboarding time and eliminate access inconsistencies. This improvement enhances compliance visibility and strengthens your security posture.

Common Challenges in Transition

Resistance Within IT Teams

Transitioning to Entra ID often meets resistance from IT teams. This resistance stems from various social dynamics and emotional responses. For instance, team members may feel threatened by changes that could impact their job security. They might associate efficiency improvements with potential layoffs, leading to defensive behaviors. Additionally, informal social structures within teams can create a collective resistance to change.

You may notice some common reactions during this transition:

  • Denial and Anger: Team members may express frustration through complaints or passive-aggressive behaviors.
  • Concerns About Downtime: Application owners often worry about potential downtime and how it might affect user experience during migration.
  • Fear of the Unknown: Uncertainty about new systems can lead to reluctance in adopting changes.

To address these issues, you should develop a detailed communication plan. This plan should outline the changes and their impacts, helping to alleviate fears and clarify expectations.

Technical Hurdles

Technical challenges frequently arise during the transition from AD to Entra ID. These hurdles can complicate the migration process and lead to prolonged downtime. Here are some common technical issues you might encounter:

Technical HurdlesDescription
User Objects Not Existing CorrectlyIssues arise when user identities are not properly synchronized in Entra ID.
Inaccurate Group MembershipsProblems occur when group memberships do not reflect the correct structure.
Inconsistent Attribute FlowsAttribute synchronization issues lead to unpredictable behavior in applications.

You must conduct extensive testing to ensure all features and integrations function correctly before full migration. This proactive approach helps mitigate security risks that arise from weak authentication practices and insufficient monitoring in a hybrid AD environment.

Ensuring Consistency

Maintaining consistency in group management post-transition is crucial for effective governance. You can implement several strategies to achieve this:

  • Define Clear Policies: Establish standardized procedures for recruitment, onboarding, and retention.
  • Partner with Reliable Staffing Providers: Select partners known for consistent results.
  • Invest in Workforce Technology: Utilize tools like applicant tracking systems (ATS) for uniform hiring workflows.
  • Train Hiring Managers: Ensure all involved in recruitment adhere to established processes.
  • Monitor and Adjust: Regularly review staffing metrics to identify improvement areas and align with business goals.

Additionally, you should engage stakeholders early in the planning process. This involvement fosters a sense of ownership and encourages buy-in for the changes. Aligning leadership to reinforce new behaviors will also help model the desired changes throughout the organization.

By addressing resistance, overcoming technical hurdles, and ensuring consistency, you can navigate the transition to Entra ID more effectively.


Addressing misleading AD groups is crucial for your organization's security and compliance. Transitioning to Entra ID unlocks modern features that enhance group management and streamline identity governance.

Here are key takeaways to consider:

Key TakeawayDescription
Thorough AssessmentConduct a detailed inventory of existing AD dependencies before transitioning.
Clean Up ADPrepare and clean up on-premises AD to ensure a smooth transition.
Synchronization MethodsChoose between Entra Connect Sync and Cloud Sync based on your environment's complexity.
Role-Based Access ControlImplement RBAC to align with zero-trust principles.
Phased RolloutPlan a controlled rollout with pilot programs to minimize disruption.

Take action now to enhance your identity management and secure your organization’s future.

FAQ

What are AD groups?

AD groups are collections of user accounts in Active Directory. They simplify permission management by allowing you to assign access rights to multiple users at once.

Why are AD groups misleading?

AD groups can misrepresent actual permissions. Misconfigurations and outdated memberships often lead to confusion about who has access to what resources.

What are "zombie" groups?

"Zombie" groups are inactive or unused AD groups that linger in your directory. They can clutter your environment and pose security risks if not managed properly.

How can I audit my AD groups?

You can audit AD groups by validating their existence, reviewing memberships, and checking permissions. Regular audits help identify and remove unnecessary groups.

What is Entra ID?

Entra ID is Microsoft's cloud-based identity management solution. It offers advanced features like dynamic membership and automated access reviews, enhancing security and compliance.

How do I transition to Entra ID?

Transitioning to Entra ID involves planning, auditing existing groups, and migrating applications. You should also ensure that users are prepared for the changes.

What are the benefits of dynamic membership?

Dynamic membership automatically updates group memberships based on user attributes. This reduces manual management and minimizes errors, improving overall efficiency.

How can I ensure compliance during the transition?

To ensure compliance, establish clear governance policies, conduct regular audits, and maintain accurate records of user access and permissions throughout the transition.

🚀 Want to be part of m365.fm?

Then stop just listening… and start showing up.

👉 Connect with me on LinkedIn and let’s make something happen:

  • 🎙️ Be a podcast guest and share your story
  • 🎧 Host your own episode (yes, seriously)
  • 💡 Pitch topics the community actually wants to hear
  • 🌍 Build your personal brand in the Microsoft 365 space

This isn’t just a podcast — it’s a platform for people who take action.

🔥 Most people wait. The best ones don’t.

👉 Connect with me on LinkedIn and send me a message:
"I want in"

Let’s build something awesome 👊

Opening: AD Groups Are a Comfortable Lie

Most admins believe their Active Directory groups are sacred, perfectly representing some universal truth about who belongs where. They’re not. They’re fossils—meticulously conserved, synchronized into Entra, and paraded around as if they still rule the kingdom. Meanwhile, the cloud laughs quietly in OAuth. These on‑prem lords cling to their domain controllers like medieval nobles refusing to abdicate even as the world runs on APIs and access reviews.

Here’s the uncomfortable fact: “Source of Authority,” or SOA, doesn’t mean “where a group happened to be born.” It means who actually governs its existence right now—Active Directory or Entra ID. The difference controls everything from whether you can edit a membership list to whether HR provisioning can actually complete without manual interventions that should’ve died with Windows Server 2008 R2.

Modern identity isn’t about replication; it’s about responsiveness. Yet, most organizations still treat Active Directory as scripture. Every group synchronized northward becomes a zombie—visible in Entra but lifeless, grayed out, obeying distant LDAP priests.

And that rigidity costs you. Workflow automation breaks, access governance stalls, and any illusion of agility collapses the second a property field says “read‑only because controlled by on‑premises.”

By the end of this episode, you’ll know when to flip that Source‑of‑Authority switch and how to do it without setting your hybrid environment on fire. Let’s expose the lie and start liberating your groups from their aging monarch.

Section 1: How We Got Here—The Myth of Active Directory Sovereignty

Once upon a time, there was no argument: Active Directory was the sovereign ruler of identity. Users, computers, and groups existed only inside its limestone towers—domain controllers humming with authority. It was the single source of truth for everything that mattered, and for years, that simplicity felt divine.

Then came the cloud, and Microsoft was polite enough to invite AD’s relics to visit. The result was synchronization—objects mirrored upward into Azure Active Directory, now known as Entra ID. But while Entra displayed those objects, it never owned them. Think of it as a constitutional monarchy where the royal decrees still came from on‑prem, and Entra merely broadcast them. The result? A system where the local crown keeps issuing laws, but the new parliament can’t amend them.

You could see the hierarchy right in the interface. Cloud consoles filled with gray fields—unchangeable memberships, locked roles, and governance tools refusing to launch because the Source of Authority said “Active Directory.” To alter anything meaningful, you descended back into the dark ages of MMC snap‑ins and PowerShell sessions pointed at domain controllers. All because AD refused to relinquish its scepter.

Here’s the key correction most admins miss: Source of Authority isn’t a global toggle; it’s per object. Each group, each user, carries its own little flag defining who commands it. Create something on‑prem, and AD claims dominion. Create it in Entra, and the cloud presides. For decades, that boundary was impermeable—the tributaries all flowed north; no river ever returned. Cloud admins could observe but never decree.

When hybrid was new, that made sense. The kingdom’s economy still depended on local servers, Exchange clusters, and policies that only AD understood. But as workloads migrated, the crown’s laws grew obsolete, and the parliament in Entra gained better governance, automation, and intelligence. Microsoft didn’t abolish the monarchy; it built a representative government beside it. OAuth and OpenID became the new diplomatic language, while AD kept mumbling about Kerberos tickets and function levels.

The tragedy is inertia. Many organizations still behave as if AD’s judgment is absolute, even while their infrastructure lives in the cloud. They tolerate gray menus and blocked automation scripts instead of acknowledging that control has moved. It’s not rebellion to flip the Source of Authority—it’s formal recognition of the reality that your users already live in Entra.

So picture it like this: AD sits on an aging throne of LDAP attributes, insisting it still commands the empire. Entra, the modern parliament, drafts new laws that actually affect how people work—dynamic memberships, self‑service, automated access reviews. The difference is legitimacy versus function. One clings to titles; the other governs the real world.

And that’s where we are now: caught between loyalty to tradition and the efficiency of democracy. Most of your groups are still listed as AD‑managed, not because it’s right, but because no one’s dared challenge the throne. The next step is understanding that the revolution already succeeded—the crown just hasn’t read its own decommission notice yet.

Section 2: Enter Entra ID—When the Cloud Grew a Spine

Enter Entra ID—the moment Microsoft’s cloud finally developed a backbone. This isn’t Azure AD in a new outfit; this is identity grown up. It speaks fluent OAuth, OIDC, and SAML—languages of global citizenship, not provincial LDAP dialects. Where AD still thinks inside the walls of a domain, Entra assumes borderless connectivity. The internet is its forest; the directory is a species, not a fortress.

You can feel the cultural shift the second you touch Entra’s tooling. Dynamic group membership replaces manual drudgery. Instead of some admin babysitting security groups, you write a rule: “Department equals Finance,” and voilà—membership adjusts automatically. It’s identity Darwinism: evolve or disappear. Then there’s self-service group creation—delegated autonomy without chaos. Users can form working circles for projects, Power BI access, or internal collaboration, and governance keeps it clean.

And governance is where Entra flexes hardest. Access reviews, entitlement management, privileges that expire on schedule rather than haunting the domain forever. All of it managed under unified policy intelligence that AD could never dream of. AD was a filing cabinet; Entra is a living workflow engine connected to your HR system, Teams, and Defender policies.

Compare that to Active Directory’s ritualized administrivia. Group creation by ticket. Membership change by prayer. No dynamic logic, no audit trails worth mentioning, and compliance auditors forced to decipher exports like archeologists brushing dust off CSVs. AD is rooted in a world where automation meant batch scripts and documentation lived in someone’s My Documents folder.

The identity-locality mismatch is now absurd. Eighty percent of your workloads float in the cloud—Exchange Online, SharePoint, Power BI, Dynamics 365—yet every policy decision still orbits a rack-mounted controller in a basement. That’s like trying to manage your global logistics empire through a notepad left on your childhood desk.

Entra doesn’t just host identities; it contextualizes them. You can assign conditional access, integrate with Power Automate, or feed Microsoft Sentinel—all in real time. This isn’t replication; it’s orchestration.

But, of course, the modern world still needs to talk to the ancestral one. Enter Group Writeback—the diplomatic solution that keeps peace with legacy systems. When configured through Entra Cloud Sync, cloud-authored groups can materialize on-prem, ensuring your aging file servers and applications can still validate access without rewriting history.

This bridge does come with fine print. You need a P1 license, Cloud Sync rather than the legacy Connect engine, and the groups must be universal, non-mail-enabled, and security-only. Distribution lists and mail-enabled security groups stay governed by Exchange because messaging still plays by its own rules. In other words, Entra can resend emissaries to AD, but only if those emissaries aren’t carrying mail.

And yet, even with those constraints, Group Writeback is monumental. It’s the first treaty between the old monarchy and the new parliament—a controlled backchannel for coexistence. It ensures you can operate in dual worlds without splitting your identity map. And once that treaty is signed, there’s no excuse for continuing to let AD write every law. The bridge exists; it’s time to move the population north.

That’s where Source of Authority conversion enters. With group writeback providing the safety net, the next step is evacuation—declaring Entra as the governing body for groups that actually matter in the modern ecosystem. Because authority shouldn’t live where workloads no longer do.

Section 3: Why Source of Authority Matters—And Why Yours Is Wrong

The Source of Authority bit—isCloudManaged=True—is not just an attribute. It’s a liberation memo. Flip it, and you’re effectively telling Active Directory, “You’ve served your purpose; stand down.” It’s the emancipation proclamation for your groups.

So what happens when you don’t flip it? Symptoms appear everywhere. Gray fields that refuse editing. Self-service options eternally disabled. HR provisioning pipelines stalled because changes have to trickle through an obsolete synchronization chain. Every time a user moves departments or a job title changes, you end up hand-patching membership instead of letting logic do the work.

The ripple effects spread. Exchange mail-enabled objects remain trapped in their legacy’s gravitational well, dependent on outdated APIs. Security groups, meanwhile, become automation dead zones—blocked from Graph API triggers or adaptive policy assignments. It’s death by governance backlog.

The compliance problem is even uglier. Fragmented attribute ownership means no one can prove who changed what and where. Half your identity data is born in Entra, but AD still files the birth certificates, and you can’t submit those to auditors because they’ve been replicated three times along the way. It’s like trying to balance your books when each department keeps its own secret ledger.

Treating AD as your ongoing truth source is institutional laziness. It’s like insisting on faxing signed documents in a world running Teams, Power Automate, and eSign. Sure, it still “works,” but it’s embarrassing.

Microsoft understands this inertia, which is why their official guidance now reads like a therapy program. The five-phase transformation model goes from “cloud-curious” through “cloud-first,” “cloud-dominant,” and finally “AD-minimized.” You can almost hear Satya whispering: “let it go.” The idea is to acknowledge that sovereignty should follow functionality.

At stage one, you merely dabble—Exchange Online here, SharePoint Online there—but you still worship your local controllers. At stage two, you begin syncing and start trusting Entra enough to create a few cloud-native objects. Stage three through five mark the psychological shift: AD becomes an archival service for whatever’s left behind, not a governing authority. It’s like phasing out monarchy by quietly moving Parliament to the capital and leaving the king alone in the countryside.

Why does Source of Authority define maturity? Because governance scales only when it’s unified. The moment Entra owns the group, every automation, API, and access-review engine in the Microsoft ecosystem suddenly obeys a single set of modern rules. Lifecycle policies can trigger deletions; privilege identity management can time-limit roles; HR provisioning can write directly without waiting for Connect syncs. That’s operational harmony—AD simply cannot conduct that orchestra anymore.

Most organizations, though, stop halfway. They admire Entra’s capabilities but still let AD be the landlord. It’s the equivalent of moving your family into a new smart home while still mailing rent checks to the abandoned one. All your energy goes into maintaining a lease on irrelevance.

Change the Source of Authority, and you change your operational physics. Suddenly governance works top-down. The audit logs live where your users authenticate. The compliance dashboards finally show reality rather than echoes. The cloud stops being a mirror and becomes the master record.

Before you rush off to patch attributes, though, there’s one ceremonial step left—cleansing the directory. Because flipping SOA on dirty data is like crowning a new ruler in a plague pit. You first purge the zombies, classify the survivors, and then migrate. Think of it as a coronation preceded by an elaborate cleansing ritual.

So yes, your Source of Authority is probably wrong. Not morally, but mechanically. You’re enforcing the sovereignty of an empire that no longer funds itself, while the republic next door is already running your economy. The sooner you flip that isCloudManaged bit, the sooner your identity governance starts acting like it’s from this decade. And once you’ve cleaned the data, you can perform that migration without chaos—and without begging the old king for permission.

Section 4: Prep Work—Cleansing, Categorizing, and Converting

Before you can proclaim Entra the rightful sovereign, you have to clean the kingdom. Because if you simply flip Source of Authority without cleansing your groups, you’ll inherit not a functional republic, but a digital landfill—half-dead ACLs from 2008, groups with no purpose, memberships drawn from long-retired executives, and GUID ghosts still haunting SharePoint permissions.

The first step is inventory. Not the “we think we have about 10,000 groups” kind of inventory—an actual interrogation. Ask each object: Do you still serve a purpose? Which application references you? When was the last time your membership changed? If the answer involves “nobody remembers,” congratulations: that’s a zombie. Delete it with prejudice. Microsoft even formalized this with what they call the “scream test.” You disable it and wait for someone to yell. Silence means clean deletion.

Once your graveyard is cleared, classification begins. Every surviving group fits one of three archetypes: cloud-focused, dual-use, or obsolete-but-still-mysteriously-referenced. Cloud-focused objects live entirely in the Entra ecosystem—Teams permissions, Power Platform roles, SharePoint Online accesses. Dual-use groups are transitional, still serving an occasional file share or legacy SQL auth call. The rest—those phantom ACLs used by retired applications—belong in deletion queue number two.

Then comes eligibility. AD, predictably, doesn’t make this easy. To be eligible for Group Writeback and modern management, the group must be universal, security-only, and non-mail-enabled. Global? Convert it to universal. Distribution? Stop pretending that e-mail routing equals access control. Mail-enabled security? Fine, finish your Exchange migration first, because the Exchange APIs remain their own kingdom. You can’t convert what Entra doesn’t fully govern yet.

Every hybrid setup still clinging to on-prem mail has one critical rule: finish the mail migration first. Only pure cloud messaging estates qualify for Source of Authority conversion. Anything else risks a civil war between Entra policies and Exchange schema.

Now, the technical act itself—this is where most admins overthink. There’s no dramatic wizard. It’s a single API patch in Microsoft Graph Explorer. You authenticate, fetch the group’s object ID, and perform a PATCH request setting isCloudManaged to true. That’s it. One Boolean flips, and the chain of authority changes domain. AD becomes witness, not ruler.

You need proper scope to do this—specifically, the Group.OnPremisesSyncBehavior permission. Grant it once in Graph Explorer, consent globally, and you’re free to convert. No premium license for the switch itself, though you’ll need P1 for Group Writeback. Microsoft, for once, doesn’t charge for freedom—only for the round trip.

Immediately after the flip, add governance scaffolding. Assign at least one owner (and not “Domain Admins,” please). Enable self-service to let teams request membership without helpdesk tickets. Link the group into Access Packages and Access Reviews so it inherits lifecycle controls and compliance oversight. The post-conversion stage is where Entra begins to justify its authority—dynamic rules, approval flows, automated expirations.

And because you’re a responsible adult now, document the conversion. Audit logs automatically capture the event, but humans forget why they performed it. Note what’s been flipped, what remains pending, and who screamed during tests.

Humor with truth: when you finish, you’ll notice that formerly grayed-out membership fields in the portal suddenly turn editable. It feels dangerously empowering. That’s Microsoft finally admitting you can manage without supervision.

At this point, most organizations breathe a sigh of relief—until they realize not everyone has followed them into the cloud. Some servers still authenticate against legacy groups. That’s where Group Writeback redeems its reputation. By adding the converted Entra groups into the writeback scope, you allow them to project identities downward, ensuring ancient systems can still resolve access. It’s diplomacy again—new citizens managing old borders.

Once you’ve executed batch conversions, monitor synchronization cycles and review audit entries for each group. The rare failure usually traces back to mislabelled distribution lists or non-universal scopes. Correct and repeat until parity stabilizes.

When the dust settles, you’ll stand with a hybrid directory where Entra governs and AD merely mirrors. It’s democracy with a ceremonial monarch—perfectly British.

Section 5: Post‑Conversion Reality—Living in a Dual‑Authority World

After conversion, reality looks less utopian and more like a constitutional compromise. You have Entra-managed groups enjoying all the modern privileges: dynamic memberships, owner assignments, automated reviews. Simultaneously, you have AD relics that still gatekeep certain file shares or VPNs. And somewhere in between, some groups are mirrored through Group Writeback—citizens of both worlds, recognized by each but fully controlled by neither.

Managing this trinity requires strategy, not improvisation. Start with human-centric groups—those tied to departments, projects, or HR data. These belong in Entra; their memberships change dynamically with role attributes. Next, migrate security-role groups that define application access. Last come the vestigial distribution lists. Their time will come once Exchange hands them over.

Operationally, unification pays off fast. Your audits simplify—they run from a single pane showing which identities belong to which group and why. Governance reviews actually produce action instead of spreadsheets collecting dust. The Graph API now responds when automation requests membership changes, and Power Automate flows no longer fail because “property is read-only.” It’s liberation disguised as progress.

For HR systems and provisioning tools, the workflow inverts. Instead of shoving updates into AD and waiting for Connect to sync upward, they now talk straight to Entra through the Provisioning API. It’s faster, cleaner, and verifiable in logs that auditors can actually interpret without necromancy. Legacy connectors stay around only for the assets still breathing local air—file servers, line-of-business apps, and the occasional VPN concentrator waiting for retirement.

Monitoring becomes straightforward. Every Source-of-Authority change writes to the audit log, visible under Governance > Activity. You can filter by ChangedBy, TargetId, or OperationType, watching who’s taking groups to the cloud. Access Reviews then enforce lifecycle: if no owner reaffirms purpose, Entra retires them automatically. No more zombie objects idling in compliance purgatory.

Expect to maintain this dual-authority world for a while. A complete purge of AD-linked groups rarely happens overnight—politics and procurement stall reality. But that’s fine. Each cycle of conversions shortens the list of holdouts, and those holdouts lose influence as fewer systems depend on them. Eventually, you’ll check your configuration and realize that AD is running purely for backward compatibility and nostalgia.

Keep an eye on Microsoft’s trajectory: group Source of Authority conversion was only phase one. User-level conversion is next, enabling direct identity control from Entra without relying on AD at all. That’s the horizon line—pure cloud governance with optional writeback for the fossils that refuse extinction.

The dual system isn’t a burden; it’s the transitional ecosystem between eras. Treat AD as the legacy archive of record and Entra as the living constitution. They coexist, but only one evolves. Every month, run a simple audit: “Which groups remain AD-managed, and why?” If the answer sounds like sentimentality, schedule their conversion.

Administrators often find themselves oddly emotional at this stage—watching domains they’ve nurtured for decades become redundant. There’s a psychology to letting go of authority, even digital authority. But remember: progress is not betrayal; it’s succession.

Reframe success metrics from uptime of domain controllers to agility of governance. The more you automate through Entra, the less energy you spend maintaining ceremonial infrastructure. Eventually, Active Directory becomes what it always should have been—a backend for the few legacy identities still in exile.

And when you finally decommission your last on-prem controller, don’t mourn it. Archive its logs, display its last event ID proudly, and move on. Because by then, your identity realm will no longer revolve around a local clock or a dusty OU structure—it will live where your users already live: in the cloud, under Entra, governed by policies that refresh with the same frequency as reality itself.

Section 6: The Real Reason People Don’t Do This

Here’s the dirty truth: most admins don’t avoid Source of Authority conversion because it’s hard. They avoid it because it’s emotional. Active Directory isn’t code to them—it’s heritage. It’s the fortress they built early in their career, the domain where they held absolute power. Changing that feels like surrender.

Comfort masquerades as stability. They say, “Our hybrid setup works fine.” Of course it does, in the same way a cassette tape still plays music—technically correct but existentially obsolete. AD’s blinking green lights soothe the anxious admin soul. You can touch it, back it up, even walk down the server room to hug it during a maintenance window. The cloud offers no such reassurance. It’s everywhere and nowhere—logical, efficient, terrifyingly abstract.

The result is cognitive dissonance in patch cables. On one hand, they evangelize AI-driven governance and cloud automation. On the other, they panic if a domain controller’s fan sounds different. They call it prudence; it’s really nostalgia with a sysadmin lanyard.

Then there’s ego economics. Many organizations justify keeping AD purely because “it’s already there.” Translation: someone doesn’t want to explain to management that the infrastructure they’ve spent years maintaining has become ornamental. No one wants to be the administrator whose career milestone—“built the domain from scratch”—becomes a historical footnote. But let’s face it, maintaining AD for ego costs more than migrating it for efficiency. Electricity, licensing, patch management—each one a monthly invoice to denial.

And yet, it’s 2024. Some shops still treat domain controllers like family heirlooms, polishing them during weekend maintenance. It’s sentimental, almost sweet. But identity authority isn’t a nostalgia project—it’s a governance engine. Authority must live where activity lives, and right now, that’s the cloud. The place your users authenticate, collaborate, and get security enforced—the only place that matters.

This reluctance isn’t villainy. It’s inertia. Admins don’t mean to perpetuate the lie; they simply confuse familiarity with control. The truth? You’re not losing power—you’re relocating it. Moving Source of Authority to Entra doesn’t erase your expertise; it makes it relevant again. AD will survive as an archive, but the cloud is the arena where governance actually plays out. The sooner you accept that, the sooner you stop babysitting virtual ghosts.

Conclusion: Reclaiming Authority

Your groups don’t need therapy—they need emancipation. For decades, Active Directory raised them, disciplined them, and decided their destinies. But parenthood ends when the children outgrow the house, and Entra is that adulthood. Stop forcing cloud-native systems to obey an on-prem curfew.

Think of AD as the photo album—it holds memories. Entra is the person those memories belong to. By insisting AD remain in charge, you’re syncing baby pictures while the grown version is running an enterprise. It’s tender, but it’s wasteful. Identity must live where it acts, and today, action lives in Entra.

So reclaim authority—not from Microsoft or from policy logs, but from your own outdated instincts. Flip that bit. Set isCloudManaged to true. Assign ownership where governance belongs. Stop treating updates like foreign invasions and start treating them like maturation.

Because the longer you pretend your groups owe allegiance to a basement controller, the longer you delay every automation, every access review, every compliance proof that could’ve been done already. AD had its golden age; let it retire gracefully. Its function now is archival, not authoritarian.

Here’s the provocation: sovereignty isn’t about holding the crown. It’s about holding relevance. The admins who embrace Entra as their new capital will run circles around those worshipping at the altar of SYSVOL.

Now, if you’re ready to stop endlessly syncing the past and start governing the present, subscribe. Comment with your biggest hybrid headache, and join the ones who don’t fear the switch—they automate it. Authority isn’t given; it’s maintained. The question is: who’s maintaining yours?



This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit m365.show/subscribe

Mirko Peters Profile Photo

Founder of m365.fm, m365.show and m365con.net

Mirko Peters is a Microsoft 365 expert, content creator, and founder of m365.fm, a platform dedicated to sharing practical insights on modern workplace technologies. His work focuses on Microsoft 365 governance, security, collaboration, and real-world implementation strategies.

Through his podcast and written content, Mirko provides hands-on guidance for IT professionals, architects, and business leaders navigating the complexities of Microsoft 365. He is known for translating complex topics into clear, actionable advice, often highlighting common mistakes and overlooked risks in real-world environments.

With a strong emphasis on community contribution and knowledge sharing, Mirko is actively building a platform that connects experts, shares experiences, and helps organizations get the most out of their Microsoft 365 investments.