From cryptic SIDs to clear names: The end of Entra identity confusion

Windows Insider Build 27881 introduces native Entra SID-to-name resolution, letting admins finally see clear, human-readable Entra groups and roles on Windows devices without scripts or workarounds.
Picture of Stella

Stella

Table of contents

One of the longest-standing pain points for administrators managing Entra-joined devices is finally being addressed. Starting with Windows Insider build 27881, Microsoft has introduced a long-awaited improvement: Windows can now automatically translate Entra group and Intune role SIDs (like Device Administrators and Company Administrators) into readable names — directly on the device.

The mysterious S-1-12-1 SIDs

If you’ve ever added an Entra group or Intune role to a local Windows group, you probably noticed that instead of a clear name, you were greeted with a cryptic S-1-12-1-xxxx SID.

While Entra users have been properly resolved for years, Entra groups and built-in roles were simply invisible to the Windows local identity system. Even critical roles like “Device Administrators” would just appear as “Unknown Account,” leaving admins guessing who actually had elevated privileges.

To make sense of those SIDs, admins relied on PowerShell scripts or community tools, since Windows itself couldn’t ask Entra who those identities really were.

What’s new in Windows Insider Build 27881

Microsoft has quietly filled that long-missing gap with a new feature known internally as AADSidToNameV2Support.
This enhancement expands the existing SID-to-name lookup process, which previously handled Entra users, to now include groups and roles as well.

Here´s what that means in practice: when Windows encounters an unfamiliar Entra SID – whether a user, group, or role – it now follows a smarter resolution process.

Check the local cache: Windows first looks for the SID in the local identity cache.

Ask Entra if necessary: If it´s not cached, Windows securely queries Entra to identify who that SID belongs to.

Cache the result: Once resolved, the translated name is stored locally so it appears instantly next time – even offline.

This entire process happens quietly in the background, using secure authentication between the device and Entra. The translation data lives under the registry path:


HKLM\SOFTWARE\Microsoft\IdentityStore\Cache\<SID>\IdentityCache
The Entra SID-to-Name Endpoint
Under the hood, Windows reaches out to a new Entra endpoint:
https://login.microsoftonline.com/<tenant>/sidtoname 


Windows builds a device-signed JSON Web Token (JWT) proving its identity and includes the unknown SID in the request. Entra responds with the corresponding identity name and display information. If the lookup succeeds, Windows updates its local cache – meaning the SID will appear correctly from that point forward. If the lookup fails, the SID remains as-is until it can be resolved.

Backward compatibility with NT4-style names

Some legacy Windows components still expect the classic DOMAIN\User format. To support these, Windows automatically generates a compatible alias (for example, AzureAD\GroupName) using a background process called GenAndPersistNT4StyleName. This makes sure that Entra identities can be displayed consistently across both modern and legacy Windows interfaces.

Before and after: What you’ll see

With the feature disabled, the local Administrators group might show entries like:

S-1-12-1-1234567890-987654321-…

Once AADSidToNameV2Support is enabled, those same entries appear as:

Device Administrators
Company Administrators
apv2_users

In other words, Entra groups and roles now appear exactly as you expect them to – human-readable, accurate, and instantly recognizable.

Why this change matters

This improvement isn’t just about aesthetics. It’s about clarity, manageability, and security. Easier administration – No more guessing which SID corresponds to which Entra group. Better policy targeting – Intune and security baselines can now correctly identify and apply settings to named Entra groups. Improved troubleshooting – Admins can instantly see which cloud identities have local privileges, reducing confusion and potential misconfigurations.

For now, this enhancement is exclusive to Insider builds and hasn’t yet rolled out to the general release versions of Windows 11 (24H2 or 25H2). But it’s a clear signal that Windows is becoming fully Entra-aware, closing the gap between local and cloud identity management.

The bottom line

After years of seeing unintelligible SIDs in the local Administrators group, Windows finally understands Entra identities natively. With AADSidToNameV2Support, Microsoft is delivering what admins have been asking for all along: a readable and accurate view of who’s who on a device – no scripts or workarounds required.

Windows is finally learning to speak Entra fluently and that’s a big win for every IT admin managing cloud-connected devices.

More blog posts like this one

How XOAP modernizes Citrix MCS and PVS
Library

How XOAP modernizes Citrix MCS and PVS

Automate Citrix MCS and PVS workflows, speeding deployments, ensuring consistency and improving IT efficiency across hybrid environments.

Scroll to Top