How to Create Azure AD Security Group using Microsoft Graph APIs (Postman & Python Code Sample)
Azure Active Directory (Azure AD) groups are used to manage users that all need the same access and permissions to resources, such as potentially restricted apps and services. Instead of adding special permissions to individual users, you create a group that applies the special permissions to every member of that group.
You can refer to below steps for the scenarios in which you have Azure AD service principle with required permissions to create Security Groups in Azure Active Directory and need to call Microsoft Graph REST APIs from your dev or local environment via Postman or through python code.
First step is to register a client application with Azure AD and assign required permissions to create AD groups
1. Sign in the Azure portal, search for and select Azure Active Directory.
2. In the left panel, under Manage, select App registrations > All Applications > Select your registered application (Service Principal Account) > API Permissions
3. Least Privileged Permissions required to create AAD groups are:
- Group.Read.All
- Group.ReadWrite.All
- Group.Create
Python Source Code:
Refer attached python source code (SecurityGroupCreatePythonSample.zip)
- Update ClientId, ClientSecret and Tenant details in config.cfg file
- Update Request body to create new group in graph.py file
- Install Required dependencies to build the project.
python3 -m pip install azure-identity python3 -m pip install msgraph-core -
Ensure that installed package script path are added into System Environment Variables.
- Run Main.py file. Choice 6 and 7 are the methods to list or create group using SPN (App Only Authentication)
Reference Link:
Build Python apps with Microsoft Graph - Microsoft Graph | Microsoft Docs
Step 7: Build Python apps with Microsoft Graph - Microsoft Graph | Microsoft Docs
Step 8: Build Python apps with Microsoft Graph - Microsoft Graph | Microsoft Docs
Postman:
Create Authorization Header in Postman Requests Collection Folder Level:
Access Token Url: https://login.microsoftonline.com/{{TenantID}}/oauth2/v2.0/token
Scope: https://graph.microsoft.com/.default
Grant_Type = Client Credentials
Rest API to create Group:
Url: https://graph.microsoft.com/v1.0/groups
Request Type: Post
Authorization Type: Bearer Token. Copy the access token created from above step
Request Body:
Reference Link:
Use Postman with the Microsoft Graph API - Microsoft Graph | Microsoft Docs
Note:
- If SPN is granted with Delegated permission, you need to follow User Authorization Code to generate access token
- If SPN is granted with Application permission, you can follow Grant type= Client Credentials
Published on:
Learn moreRelated posts
Announcing the public preview of the Microsoft 365 Copilot Agent Evaluations tool
The Microsoft 365 Copilot Agent Evaluations tool helps developers measure and improve the quality of agents they build for Microsoft 365 Copil...
SharePoint News web part: New Filmstrip layout and multi-site news support
SharePoint News web part introduces a new “Filmstrip” layout for visually prominent news display and expands multi-site news aggre...
Flux.2 Flex model availability in PowerPoint for Microsoft 365 Copilot
Microsoft 365 Copilot in PowerPoint now supports the Flux.2 Flex image generation model, offering higher-quality visuals and layout. Available...
Microsoft 365 Copilot: Schedule prompts in Agent Builder
Microsoft 365 Copilot’s Agent Builder will support scheduled workflows to run prompts automatically on hourly, daily, weekly, monthly, o...
Viva Engage Communities and Storylines in Teams – Individual enablement controls
Starting May 18, 2026, admins can independently enable or disable Viva Engage Communities and Storylines in Teams via new controls in Teams me...
Teams meeting templates: Fundamentals and security upgrade
Microsoft is upgrading Teams meeting templates backend for better security, requiring supported Teams and Outlook versions by June 30, 2026. M...
Power Automate: Teams - When I am mentioned in a channel message Trigger
The Power Automate "When I am @mentioned in a channel message" Teams trigger fires for direct mentions in one channel. Polling based, no repli...
Azure Arc | On-prem + Multi-cloud Management
Managing Servers, and Kubernetes across on-prem, and multiple clouds, can quickly become complex, especially when you're juggling multiple too...