Events
Mar 17, 9 PM - Mar 21, 10 AM
Join the meetup series to build scalable AI solutions based on real-world use cases with fellow developers and experts.
Register nowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Custom security attributes in Microsoft Entra ID are business-specific attributes (key-value pairs) that you can define and assign to Microsoft Entra objects. You can use these attributes to store information, categorize objects, or enforce fine-grained access control over specific Azure resources. Custom security attributes can be used with Azure attribute-based access control (Azure ABAC).
This article provides an overview of how to use the Microsoft Graph API to programmatically define and assign your own custom security attributes.
The following are the building blocks of custom security attributes.
An attribute set is a group of related custom security attributes. The following are the general characteristics of attribute sets:
To configure attribute sets, use the attributeSet resource type.
A custom security attribute definition is the schema of a custom security attribute or key-value pair. For example, the custom security attribute name, description, data type, and predefined values. The following are the general characteristics of custom security attributes definitions:
To configure custom security attribute definitions, use the customSecurityAttributeDefinition resource type.
Allowed values represent the predefined values of a custom security attribute. The following are the general characteristics of allowed values:
To configure allowed values, use the allowedValue resource type.
Custom security attributes can be assigned to the following objects by using the customSecurityAttributes property. Directory synced users from an on-premises Active Directory can also be assigned custom security attributes.
For examples of custom security attribute assignments, see Examples: Assign, update, list, or remove custom security attribute assignments using the Microsoft Graph API.
For a list of the limits and constraints for custom security attributes, see Limits and constraints.
To manage custom security attributes, the calling principal must be assigned one of the following Microsoft Entra roles. By default, Global Administrator and other administrator roles do not have permissions to read, define, or assign custom security attributes.
Also, the calling principal must be granted the appropriate custom security attributes permissions.
Events
Mar 17, 9 PM - Mar 21, 10 AM
Join the meetup series to build scalable AI solutions based on real-world use cases with fellow developers and experts.
Register now