Forum Discussion
How to map a user custom security attribute to OIDC id and access token ?
We are integrating keycloak with azure entra via OIDC.
- We have created custom security attribute to map some extension fields for the user.
- We tried to map these as tokens,- but the custom security attributes doesn't show up in the dropdown under the token > add optional claims
 
- We then tried to define them under the Enterprise App > Single SignOn > Attributes & Claims; but unable to find these custom security attributes in the drop down there either !
Any help for this problem is deeply appreciated.
Thanks,
Raghav
3 Replies
- VijayIreddyCopper ContributorHi, By default the custom security attributes are not supported within the claims. If you are planning to use a key value pair in your access token, I recommend configuring the extensions (https://learn.microsoft.com/en-us/graph/extensibility-overview?tabs=http). 
- rollschrisCopper ContributorHi did you have any luck with this? 
- rollschrisCopper ContributorHey I'm also having the same issue, I have the custom security attribute which we are using as a Tenant/CustomerId, I'm able to query for a list of users on that attribute but I need the current users, i want it to be in the access token. I cannot see it any drop downs... I can see user.extensionattributeN but i think that might be for something else, Did you get anywhere with this? Thanks