How to Create Azure AD Security Group using Microsoft Graph APIs (Postman & Python Code Sample)
Azure Active Directory (Azure AD) groups are used to manage users that all need the same access and permissions to resources, such as potentially restricted apps and services. Instead of adding special permissions to individual users, you create a group that applies the special permissions to every member of that group.
You can refer to below steps for the scenarios in which you have Azure AD service principle with required permissions to create Security Groups in Azure Active Directory and need to call Microsoft Graph REST APIs from your dev or local environment via Postman or through python code.
First step is to register a client application with Azure AD and assign required permissions to create AD groups
1. Sign in the Azure portal, search for and select Azure Active Directory.
2. In the left panel, under Manage, select App registrations > All Applications > Select your registered application (Service Principal Account) > API Permissions
3. Least Privileged Permissions required to create AAD groups are:
- Group.Read.All
- Group.ReadWrite.All
- Group.Create
Python Source Code:
Refer attached python source code (SecurityGroupCreatePythonSample.zip)
- Update ClientId, ClientSecret and Tenant details in config.cfg file
- Update Request body to create new group in graph.py file
- Install Required dependencies to build the project.
python3 -m pip install azure-identity python3 -m pip install msgraph-core -
Ensure that installed package script path are added into System Environment Variables.
- Run Main.py file. Choice 6 and 7 are the methods to list or create group using SPN (App Only Authentication)
Reference Link:
Build Python apps with Microsoft Graph - Microsoft Graph | Microsoft Docs
Step 7: Build Python apps with Microsoft Graph - Microsoft Graph | Microsoft Docs
Step 8: Build Python apps with Microsoft Graph - Microsoft Graph | Microsoft Docs
Postman:
Create Authorization Header in Postman Requests Collection Folder Level:
Access Token Url: https://login.microsoftonline.com/{{TenantID}}/oauth2/v2.0/token
Scope: https://graph.microsoft.com/.default
Grant_Type = Client Credentials
Rest API to create Group:
Url: https://graph.microsoft.com/v1.0/groups
Request Type: Post
Authorization Type: Bearer Token. Copy the access token created from above step
Request Body:
Reference Link:
Use Postman with the Microsoft Graph API - Microsoft Graph | Microsoft Docs
Note:
- If SPN is granted with Delegated permission, you need to follow User Authorization Code to generate access token
- If SPN is granted with Application permission, you can follow Grant type= Client Credentials
Published on:
Learn moreRelated posts
How to Set Up Dynamics 365 SharePoint Integration (Step-by-Step + Common Issues & Fixes)
Setting up SharePoint integration with Microsoft Dynamics 365 looks simple - and technically, it is. But here’s where most organizations get i...
Microsoft Teams: Meeting organizers can automatically start transcription without recording
Microsoft Teams will allow meeting organizers to automatically start transcription without recording by selecting the new “Transcribe on...
Microsoft Teams admin center: Events license management for Attendee Capacity Pack licenses
Microsoft Teams admin center will introduce centralized management for Attendee Capacity Pack licenses starting late April 2026. Admins can di...
First channel in new Microsoft Teams will default to threaded conversation layout
Starting May 2026, the first channel in newly created Microsoft Teams will default to the threaded conversation layout instead of Posts. This ...
Microsoft Copilot (Microsoft 365): Now smarter with visuals: Copilot Chat leverages embedded images for richer, more accurate answers
Copilot has been enhanced to interpret and ground responses using images embedded in files such as Word documents (.docx), PowerPoint presenta...
Microsoft Viva: Viva Glint – Configure user and survey data retention for deleted users in Viva Glint
With the new control in Viva Glint, service administrators can now configure whether to retain or delete survey and relevant indefinable user ...
Microsoft Teams: Report external users for security concerns in Teams
Users can now report suspicious external users directly within Teams, alongside existing block actions. Reports are surfaced in the Teams admi...
Microsoft Viva: Viva Glint – Copilot assisted commenting in Glint survey taking
Viva Glint survey takers will be able to use a streamlined version of Microsoft Copilot in the Glint survey taking experience to help them rew...
Microsoft Viva: Viva Glint – Configure data retention policy for Viva Glint
This feature will introduce the capability for Glint service administrators to configure a data retention policy for their Glint instances bas...