Skip to main content
EAP-TLS-with-Entra Groups are thin by design. They carry a name, an Attribute Profile, and one Entra group reference. Everything else — who belongs, who doesn’t — lives in Entra. This page covers how that mapping is created, used at authentication time, and maintained.

The shape

Each EAP-TLS Group on an EntryPoint Context has an Entra Group selector on its Dot1x settings card. When you pick an Entra group, the platform stores that group’s Entra object ID on the EntryPoint Group. From that point, every authentication to this EntryPoint Group asks Entra whether the cert’s bearer belongs to that Entra group.
  • Pick one Entra group per EntryPoint Group. There’s one selector. One-to-one.
  • The Entra group ID is what’s stored. Renaming the Entra group in Entra doesn’t break the mapping (it’s tied to the ID, not the name).
  • Mutating the Entra group’s membership is an Entra-side action. The EntryPoint admin doesn’t invite or revoke users — that’s a role Entra’s admin already holds.
Typical mappings you maintain in parallel with your identity lifecycle:
EntryPoint Group (type)Entra group you map to
Corporate Staff (User Cert)corporate-staff-wifi (Security group, members = all employees)
Finance (User Cert)finance-team (Security group scoped to Finance)
Engineering (User Cert)engineering-team
Managed Laptops (Device Cert)managed-laptops-compliant (Device-group populated by Intune)
Reception Kiosks (Device Cert)reception-kiosks (static device group)
Factory Workstations (Device Cert)factory-workstations
The right-hand column is whatever naming your Entra admin uses for security groups — EntryPoint will accept any group from the tenant connected to the Context’s Identity Store.

How authentication resolves the mapping

On every 802.1X-TLS authentication against this Group:
1

TLS handshake presents the certificate

The supplicant offers the user or device certificate.
2

EntryPoint validates the chain

Against the Trusted CAs on the Context. Invalid chain → Access-Reject with no Entra call.
3

EntryPoint reads the principal from the cert

For user certs, this is a subject attribute that names the user (typically the UPN). For device certs, it’s the bearer identifier you’ve agreed with your PKI — see User certificates and Device certificates and Intune.
4

EntryPoint asks Entra Graph API

Using the credentials on the Identity Store (Application (client) ID + Client Secret), the platform queries Entra for the principal’s group memberships.
5

Match against the Group's stored Entra group ID

The principal must be a member of the Entra group the EntryPoint Group is mapped to. Hit → Access-Accept with the Group’s Attribute Profile. Miss → Access-Reject.
6

If Device Compliance Check is on

A second Entra call checks the device’s compliance posture. Failing compliance rejects the authentication, even if the group membership would have accepted it. See Device certificates and Intune.

Creating a mapped Group

1

Open the Context's Groups tab

Click Add Group on the Context.
2

Pick the Group type

From the Select Group Type dropdown, choose 802.1X-TLS with User Certificate or 802.1X-TLS with Device Certificate depending on the audience.
3

Name the Group

Pick a name that reads cleanly in UI and audit entries — Corporate Staff, Reception Kiosks, Factory Workstations. Typically matches or parallels the Entra group’s name.
4

Pick the Entra Group

The Create Group form shows an Entra Group selector. It’s populated live from the Entra tenant connected on the Identity Store. Find the Entra group you want and select it.
5

Enter a Description

Worth spending a sentence on — this is the audit-side hint for future-you. Employees on MDM-enrolled laptops; mapped to Entra group corporate-staff-wifi.
6

Save

The Group lands on its detail page. Attach an Attribute Profile under Group Settings to drive VLAN or SGT. Nothing else to do — authentication starts working as soon as a device in the Entra group presents a valid cert.

Changing which Entra group a Group points at

Mergers, re-orgs, tenant-side consolidation — sometimes an Entra group changes. Two approaches:
  • Rename-in-place on the Entra side. The Entra group’s ID doesn’t change, so the EntryPoint mapping keeps working untouched.
  • Different Entra group entirely. Open the EntryPoint Group’s Group Settings tab, re-pick the Entra Group in the selector, and save. Next authentication resolves against the new Entra group.
Either way, the EntryPoint Group’s Attribute Profile and audit history stay intact — you keep the VLAN treatment and the evidence trail.

What happens when the Entra group is deleted

The EntryPoint Group keeps its stored Entra group ID, but every authentication’s Entra Graph lookup returns “no such group” and the match fails. Net effect: every device in the (now-gone) Entra group drops off on next re-auth. To recover:
  • Recreate or rename the Entra group (if the deletion was accidental), then no further action is needed if the group object ID is the same; otherwise, re-pick the new group in the EntryPoint Group’s Group Settings.
  • Permanently retire the EntryPoint Group — delete it from the admin UI. The Attribute Profile stays on the Context and can be detached / deleted separately.

Day-to-day maintenance

Once Groups are mapped, the admin-side workload on the EntryPoint side is minimal:
  • Adding audiences. A new business function gets onboarded — create the Entra group, then create the matching EntryPoint Group mapped to it, attach the right Attribute Profile. Five minutes.
  • Decommissioning audiences. Delete the EntryPoint Group (or, gently, detach the Attribute Profile first). The Entra group itself is managed separately by the Entra admin.
  • Changing policy for one audience. Swap the Group’s Attribute Profile; VLAN / SGT changes are immediate on next auth.
  • Auditing who had access when. The Entra side carries the authoritative membership log. The EntryPoint side has the authentication log plus configuration audits.

Operational tips

  • Keep EntryPoint Group names close to Entra group names. Reduces mis-mappings and makes audit rows read naturally.
  • Document the mapping in the Group’s Description. Future admins will read the Description first.
  • Use Entra dynamic groups (rule-based) if Entra-admin team prefers to drive membership by attribute rather than by explicit add / remove. EntryPoint doesn’t care how the Entra group is populated.
  • Don’t map one Entra group to two EntryPoint Groups. That’s legal, but confusing — two Groups authenticating the same Entra population with potentially different Attribute Profiles produces surprising RADIUS responses.

User certificates

Where the cert identifies a user.

Device certificates & Intune

Where the cert identifies a device; Device Compliance Check.

Entra connection

The Context-level wiring to the Entra tenant.

Attribute Profiles

The RADIUS response attached per Group.