Group SOA Conversion – From AD to Entra!

Entra Connect Sync 2.5.76.0 was released on 2025-07-31, and the release notes included a cool new feature:

Group Source of Authority conversion feature allowing administrators to transfer on-premises Active Directory groups to become cloud only groups managed through Microsoft Entra ID (Public Preview).

Now, the “cloud only” bit in that sentence may be a typo, have no fear, as this feature will in fact take a group that is synced to Entra via Connect Sync, with the SOA being AD, and turn it into a group synced via Cloud Sync, moving the SOA to Entra, and retaining the same group in AD with the same SID in the process!

Why would you want to do this? This is nice as more and more provisioning processes shift to the cloud, and you can utilize things such as access packages in Entra to provide access to existing on-premises services utilizing existing groups.

Requirements and Assumptions

  • Entra Connect Sync 2.5.76.0 installed and configured
  • Entra Cloud Sync 1.1.1370.0 or later installed and configured
    • As of 2024-05-13, version 1.1.1586.0 is the latest
    • Be sure that Connect Sync and Cloud Sync are NOT syncing the same objects!
  • Existing AD group(s) being synced to Entra via Entra Connect Sync
    • These groups MUST be Universal in scope!

Docs

Credits

Lots of credit must be given here to Martin Himken as he was in WinAdmins Discord voice testing this out a bit, but ran into an issue (damn group scope!), and then I decided to test it out after hopping on. He also helped me out with the PowerShell to change the SOA, and my understanding of how to connect to Graph. He’s a pretty cool dude, and you should go follow him!

You can now specify whether an #ADDS group is an #EntraID group or on-premises. This is called a 'change of SOA'. However, be aware that, since @ajf8729.com and I have only just tried this out, the documentation is incomplete for now. Let me explain…đź§µlearn.microsoft.com/en-us/entra/…

Martin Himken | MVP (@intune.best) 2025-08-01T22:26:55.617Z

Let’s Do It!

First I’ll make a new group in the OU I have configured to sync via Connect Sync, add a member, and trigger a delta sync:

Once the delta sync is complete, let’s check the group in Entra, and confirm the source is AD and the membership is correct:

Next, let’s change the SOA using Graph:

Now, if we go back to Entra and refresh, we’ll see the SOA has changed:

At this point, the existing sync via Connect Sync will be broken. By drilling down to the metaverse object properties in Connect Sync (follow the steps listed here), we” see that the attribute “blockOnPremiseSync” is set to “true”:

Finally, let’s add this group to the Entra -> AD Cloud Sync configuration. Under Scoping Filters, select the group and hit Save:

In my example, I have configured the target container to be a different OU than what Connect Sync is currently syncing, which I would recommend, to ensure you have no conflicts between the two sync methods. To speed up this initial process, I’ll trigger an on-demand provision of the group in Entra:

Now let’s look at the group in AD and see what changed:

Sweet! The group was moved to the new OU, the SID is the same, and you’ll see that the Name attribute was changed; the string added to the end of the group name will match the last section of the object ID of the group in Entra. We did it!

Bonus Feature – Doing It All With Entra Cloud Sync!

After getting all of this working, I realized that this can be done entirely with Cloud Sync as well. The new feature and docs are targeted to folks that are currently already syncing group to Entra via Connect Sync, but if you’re like one of the crazy cats out there like Johannes (also a pretty cool dude that you should go follow), you’ve already gotten rid of Connect Sync.

If that’s the case, the first part of the process is to instead add your existing groups to the AD -> Entra Cloud Sync configuration, either by OU DN or adding specific groups. Once they are synced up to Entra, make the same change to the “isCloudManaged” attribute using the same PowerShell above, and then add the groups to the Entra -> AD Cloud Sync configuration, same as the second half of the above steps.

With the Entra -> AD configuration set up to use a different OU, we’ll ensure that the groups are moved between OUs in the process, and never have to worry about any sync conflicts, like I mentioned earlier. Pretty neat!

Related Posts

Leave a Reply

AJ's Tech Chatter
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.