Customize tokens
As a developer, your primary interaction with Microsoft Entra ID is in requesting a token to identify the user. You also request a token to get authorization to call a web API. The web API token determines what that API can do when it services a particular request. In this article, you learn about the information that you can receive in tokens and how you can customize tokens. These Zero Trust developer best practices improve flexibility and control while increasing application security with least privilege.
Your reasons for customizing your application tokens depend on the process you're using to drive more granular authorization in your applications and APIs. For example, you might have different user roles, access levels, and functionalities in your app that rely on information from tokens.
The Microsoft Graph API provides a robust set of directory information and data across Microsoft 365. You can develop a fine-grained and rich authorization system by building on the data in Microsoft Graph. For example, you can access information from the user's group membership, detailed profile data, SharePoint, and Outlook to use in your authorization decisions. You can also include authorization data in the token from Microsoft Entra ID.
Application-level authorization
It's possible for IT Pros to add app-level authorization without customizing the token nor having the developer add any code.
IT Pros can prevent tokens from being issued to any app in the tenant by using the user assignment required flag to ensure that only a set of users are able to sign in to the application. Without this flag, all users in a tenant can access the application. With this flag, only assigned users and groups can access the application. When an assigned user accesses the app, the app receives a token. If the user doesn't have an assignment, the app doesn't receive a token. Remember to always gracefully handle token requests that don't receive tokens.
Token customization methods
There are two ways to customize tokens: optional claims and claims mapping.
Optional claims
Optional claims specify which claims you want Microsoft Entra ID to send to your application in tokens. You can use optional claims to:
- Select more claims to include in your application tokens.
- Change the behavior of claims that the Microsoft identity platform returns in tokens.
- Add and access custom claims for your application.
Optional claims hang off of the application registration object with a defined schema. They apply to the application no matter where it was running. When you're writing a multitenant application, optional claims work well because they're consistent across every tenant in Microsoft Entra ID. For example, an IP address isn't tenant-specific whereas an application has an IP address.
By default, guest users in a tenant can also sign in to your app. If you want to block guest users, opt-in to the optional claim (acct). If it's 1, then the user has a guest classification. If you want to block guests, then block tokens with acct==1.
Claims mapping policies
In Microsoft Entra ID, policy objects represent sets of rules on individual applications or on all applications in an organization. A claims mapping policy modifies the claims that Microsoft Entra ID issues in tokens for specific applications.
You use claims mapping for tenant-specific information that has no schema (for example, EmployeeID, DivisionName). Claims mapping applies at the service principal level that the tenant admin controls. Claims mapping corresponds to the enterprise app or the service principal for that application. Each tenant can have its own claims mapping.
If you're developing a line of business application, you can look specifically at what your tenant does (what specific claims your tenant has available that you can use in your token). For example, if an organization has a user's division name property (not a standard field in Microsoft Entra ID) in their on-premises Active Directory, you can use Microsoft Entra Connect to sync it to Microsoft Entra ID.
You can use one of the standard extension attributes to contain that information. You can define your token with a division name claim that you can compose from the corresponding extension (even if it doesn't apply across every tenant). For example, an organization puts their division name in extension attribute 13.
With claims mapping, you can make it work for another tenant that puts their division name in attribute seven.
Plan token customization
Which token you customize depends on your type of application: client application or API. There's no difference in what you can do to customize your token. What you can put in the token is the same for each of them. Which token you choose to customize depends upon which token your app consumes.
Customize ID tokens
If you're developing a client application, you customize the ID token because it's the token that you request to identify the user. A token belongs to your app when the audience claim (aud
) in the token matches the client ID of your application. For a client application that calls APIs but doesn't implement them, make sure you only customize your app's ID token.
The Azure portal and Microsoft Graph API allow you to customize the access token for your app as well, but those customizations have no effect. You can't customize an access token for an API that you don't own. Remember, your app must not attempt to decode or inspect an access token that your client app receives as authorization to call an API.
Customize access tokens
If you're developing an API, you customize the access token because your API receives access tokens as part of the client's call to your API.
Client applications always customize the ID token that they receive to identity the user. APIs customize the access tokens that the API receives as part of the call to the API.
Groups and app roles
One of the most common authorization techniques is to base access on a user's group membership or assigned roles. Configure group claims and app roles in tokens shows you how to configure your apps with app role definitions and assign security groups to app roles. These methods help to improve flexibility and control while increasing application zero trust security with least privilege.
Next steps
- B2B collaboration user claims mapping describes Microsoft Entra ID support for customizing the claims that are issued in the Security Assertion Markup Language (SAML) token for B2B collaboration users.
- Customize app SAML token claims when a user authenticates to an application through the Microsoft identity platform using the SAML 2.0 protocol.
- API Protection describes best practices for protecting your API through registration, defining permissions and consent, and enforcing access to achieve your Zero Trust goals.
- Authorization best practices helps you to implement the best authorization, permission, and consent models for your applications.
- Use Zero Trust identity and access management development best practices in your application development lifecycle to create secure applications.