Forum Discussion
How to map a user custom security attribute to OIDC id and access token ?
We are integrating keycloak with azure entra via OIDC.
- We have created custom security attribute to map some extension fields for the user.
- We tried to map these as tokens,
- but the custom security attributes doesn't show up in the dropdown under the token > add optional claims
- We then tried to define them under the Enterprise App > Single SignOn > Attributes & Claims; but unable to find these custom security attributes in the drop down there either !
Any help for this problem is deeply appreciated.
Thanks,
Raghav
3 Replies
- VijayIreddyCopper Contributor
Hi,
By default the custom security attributes are not supported within the claims. If you are planning to use a key value pair in your access token, I recommend configuring the extensions (https://learn.microsoft.com/en-us/graph/extensibility-overview?tabs=http).
- rollschrisCopper Contributor
Hi did you have any luck with this?
- rollschrisCopper Contributor
Hey I'm also having the same issue, I have the custom security attribute which we are using as a Tenant/CustomerId, I'm able to query for a list of users on that attribute but I need the current users, i want it to be in the access token. I cannot see it any drop downs... I can see user.extensionattributeN but i think that might be for something else,
Did you get anywhere with this?
Thanks