In apps with different Roles and permissions you may need to get information about AD Groups. Here are some snippets which can help you with this part of the task.

Get info about current user in PowerShell

get-aduser -Identity $env:USERNAME

Get AD Groups for current user in PowerShell

Get-ADPrincipalGroupMembership $env:USERNAME | select name

Get AD Groups for a user in .Net (C#)

using System.DirectoryServices.AccountManagement;
// ...
using (PrincipalContext pc = new PrincipalContext(ContextType.Domain))
{
    UserPrincipal? domainuser = UserPrincipal.FindByIdentity(pc, IdentityType.SamAccountName, userLogin);
    if (domainuser == null)
    {
        Console.WriteLine("Error. No user found");
    }
    if (domainuser != null)
    {
        List<string> groups = domainuser.GetGroups().Select(x => x.Name).ToList();
        string userDomainGroups = String.Join(", ", groups.ToArray());
        Console.WriteLine(userDomainGroups);
    }
}

If you use the C# code for SharePoint solution, don't forget to execute it with RunWithElevatedPrivileges()

    SPSecurity.RunWithElevatedPrivileges(delegate ()
                {
            ...
                });