Custom security attributes in Microsoft Entra ID are business-specific attributes (key-value pairs) that you can define and assign to Microsoft Entra objects. You can use these attributes to store information, categorize objects, or enforce fine-grained access control over specific Azure resources. Custom security attributes can be used with Azure attribute-based access control (Azure ABAC).
This article provides an overview of how to use the Microsoft Graph API to programmatically define and assign your own custom security attributes.
Key resource typesThe following are the building blocks of custom security attributes.
Attribute setsAn attribute set is a group of related custom security attributes. The following are the general characteristics of attribute sets:
To configure attribute sets, use the attributeSet resource type.
Custom security attribute definitionsA custom security attribute definition is the schema of a custom security attribute or key-value pair. For example, the custom security attribute name, description, data type, and predefined values. The following are the general characteristics of custom security attributes definitions:
To configure custom security attribute definitions, use the customSecurityAttributeDefinition resource type.
Allowed valuesAllowed values represent the predefined values of a custom security attribute. The following are the general characteristics of allowed values:
To configure allowed values, use the allowedValue resource type.
Which directory objects support custom security attributes?Custom security attributes can be assigned to the following objects by using the customSecurityAttributes property. Directory synced users from an on-premises Active Directory can also be assigned custom security attributes.
For examples of custom security attribute assignments, see Examples: Assign, update, list, or remove custom security attribute assignments using the Microsoft Graph API.
Limits and constraintsFor a list of the limits and constraints for custom security attributes, see Limits and constraints.
PermissionsTo manage custom security attributes, the calling principal must be assigned one of the following Microsoft Entra roles. By default, Global Administrator and other administrator roles do not have permissions to read, define, or assign custom security attributes.
Also, the calling principal must be granted the appropriate custom security attributes permissions.
Next stepsRetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4