Forum Discussion

tvraghavan's avatar
tvraghavan
Copper Contributor
Feb 28, 2025

How to map a user custom security attribute to OIDC id and access token ?

We are integrating keycloak with azure entra via OIDC.

  • We have created custom security attribute to map some extension fields for the user.
  • We tried to map these as tokens,
    • but the custom security attributes doesn't show up in the dropdown under the token > add optional claims 
  • We then tried to define them under the Enterprise App > Single SignOn > Attributes & Claims; but unable to find these custom security attributes in the drop down there either !

 Any help for this problem is deeply appreciated.

 

Thanks,
Raghav

3 Replies

  • VijayIreddy's avatar
    VijayIreddy
    Copper Contributor

    Hi, 

    By default the custom security attributes are not supported within the claims. If you are planning to use a key value pair in your access token, I recommend configuring the extensions (https://learn.microsoft.com/en-us/graph/extensibility-overview?tabs=http).

  • rollschris's avatar
    rollschris
    Copper Contributor

    Hey I'm also having the same issue, I have the custom security attribute which we are using as a Tenant/CustomerId, I'm able to query for a list of users on that attribute but I need the current users, i want it to be in the access token. I cannot see it any drop downs... I can see user.extensionattributeN but i think that might be for something else,

     

    Did you get anywhere with this?

    Thanks 

Resources