Getting started with Custom Security Attributes in Azure AD

This blogpost explores the new Custom Security Attributes public preview feature in Azure AD

By Stian A. Strysse

Azure AD has a schema with common attributes for resources like users, e.g. displayName, userPrincipalName, companyName, department and so on. You can also add custom extension attributes via an Application object to extend the schema. However, these attributes are public for all Azure AD users in the organization and should never contain sensitive information. But, what if you need to set a HR termination date on Azure AD users to be consumed by an automation process, or set other sensitive attributes which should only be visible for certain individuals in the organization? And what if you want to control access to Azure resources using attribute values?

AAD Custom Sec thumb

You now have a way to solve this with Microsoft’s public preview of Custom Security Attributes in Azure AD. Custom Security Attributes are organization-specific key-value paired attributes that can be assigned to Azure AD objects like Users, Service Principals and Managed Identities. This type of attribute is by default not available to anyone, not even Global Admins, without specifically assigning permissions.

License requirement for Custom Security Attributes is Azure AD Premium P1.

Let’s dive into this functionality to see how it’s set up and how it can be used.

Assign Azure AD roles for managing Custom Security Attributes, Sets, assignments and values

Custom Security Attributes are created within an Attribute Set, and each Attribute Set has its own access control for defining who can read, define or assign Custom Security Attributes for that specific Set. However, built-in Azure AD roles can be assigned to administrators for providing access to all Custom Security Attributes, Sets, assignments and values tenant-wide. Global Admin and other high-privileged roles do not have access to Custom Security Attributes by default.

The following built-in roles exists both for tenant-level and for specific Attribute Sets:

Role Permissions (can do) Restrictions (cannot do)
Attribute Definition Reader ✔️ Read Attribute Set
✔️ Read Attribute definition
Manage Attribute Set
Manage Attribute definition
Read / assign / manage Attribute values
Attribute Definition Administrator ✔️ Manage Attribute Set
✔️ Manage Attribute definition
Read / assign / manage Attribute values
Attribute Assignment Reader ✔️ Read Attribute Set
✔️ Read Attribute definition
✔️ Read Attribute values
Manage Attribute Set
Manage Attribute definition
Assign / manage Attribute values
Attribute Assignment Administrator ✔️ Read Attribute Set
✔️ Read Attribute definition
✔️ Assign / manage Attribute values
Manage Attribute Set
Manage Attribute definition

This means that for an administrator to be able to manage all Custom Security Attributes, Sets, assignments and values tenant-wide, they need to be assigned both Attribute Definition Administrator and Attribute Assignment Administrator Azure AD roles at the tenant-level (through the Azure AD Portal: Roles and administrators blade or PIM). An individual who only need specific permissions to specific Custom Security Attributes should be assigned set-level role(s) directly on the Attribute Set(s) (AAD: Custom Security Attributes blade -> Attribute Set -> Roles and administrators).

Microsoft Docs has more information on this topic.

There’s also tenant-wide Graph scopes available granting permissions to manage Custom Security Attributes, Attribute Sets, assignments and values through Microsoft Graph.

  • CustomSecAttributeAssignment.ReadWrite.All
  • CustomSecAttributeDefinition.ReadWrite.All

At the time of writing there are only Graph scopes available for read/write operations, not for read-only.

Create an Attribute Set

After assigning tenant-level permissions, the next thing we need to do is to create an Attribute Set. This can be done either in the Azure AD Portal or via Microsoft Graph.

Note: Once you create an Attribute Set, it cannot be deleted from the tenant nor have its Attribute Set name changed. Always test new stuff in a demo tenant!

Azure AD Portal:

  1. Go to the Azure AD Portal: Custom Security Attributes blade.
  2. Click Add attribute set and specify Attribute set name and Description.

    AAD Custom Sec Attributes - create

  3. Click Add to create the new Attribute Set in the tenant.

    AAD Custom Sec Attributes - created

Microsoft Graph (by using Graph Explorer, see my blogpost on how to get started):

  1. Go to Graph Explorer and sign in to your tenant
  2. Consent to Graph permissions CustomSecAttributeAssignment.ReadWrite.All and CustomSecAttributeDefinition.ReadWrite.All
  3. Make a POST request to endpoint /directory/attributeSets (beta) with the properties id (Attribute Set name), description and maxAttributesPerSet in the body:

     {
         "id": "BusinessProjects",
         "description": "Set contains all security attributes for BusinessProjects",
         "maxAttributesPerSet": 25
     }
    

    The Graph response will be:

     {
         "@odata.context": "https://graph.microsoft.com/beta/$metadata#directory/attributeSets/$entity",
         "description": "Set contains all security attributes for BusinessProjects",
         "id": "BusinessProjects",
         "maxAttributesPerSet": 25
     }
    

See the Graph documentation for attributeSet resource type on Microsoft Docs for more details.

Create Custom Security Attributes

Next up is to create one or more Custom Security Attributes in our new Attribute Set. Custom Security Attributes support string, integer and boolean data types - and with exception for boolean it also supports multivalue. There’s also an option for only allowing predefined values to be assigned. Creation of Custom Security Attributes can be done either in the Azure AD Portal or via Microsoft Graph.

Note: Once you create a Custom Security Attribute, it cannot be deleted from the tenant nor have its Attribute name changed. It can however be disabled if no longer in use.

Azure AD Portal:

  1. Go to the Azure AD Portal: Custom Security Attributes blade and click on the Attribute Set created earlier.
  2. Click Add attribute and specify Attribute name, Description, Data type, and choose whether to allow multiple values or require predefined values only.

    AAD Custom Sec Attributes - create attribute

  3. Click Add to create the new Custom Security Attribute in the Attribute Set.

    AAD Custom Sec Attributes - created attribute

Microsoft Graph:

  1. Go to Graph Explorer and sign in to your tenant
  2. Make a POST request to endpoint /directory/customSecurityAttributeDefinitions (beta) with the properties attributeSet (Attribute Set name), description, name (Custom Security Attribute name), status (whether the attribute is enabled or disabled), type (data type), isCollection (if attribute is multivalue), usePreDefinedValuesOnly (whether only allowing predefined values to be assigned) and isSearchable (whether attribute values are indexed) in the body:

     {
         "attributeSet":"BusinessProjects",
         "description":"ProjectID for the assigned BusinessProject",
         "isCollection":false,
         "isSearchable":true,
         "name":"ProjectID",
         "status":"Available",
         "type":"String",
         "usePreDefinedValuesOnly": false
     }
    

    The Graph response will be:

     {
         "@odata.context": "https://graph.microsoft.com/beta/$metadata#directory/customSecurityAttributeDefinitions/$entity",
         "attributeSet": "BusinessProjects",
         "description": "ProjectID for the assigned BusinessProject",
         "id": "BusinessProjects_ProjectID",
         "isCollection": false,
         "isSearchable": true,
         "name": "ProjectID",
         "status": "Available",
         "type": "String",
         "usePreDefinedValuesOnly": false
     }
    

See the Graph documentation for customSecurityAttributeDefinition resource type on Microsoft Docs for more details.

Assign Custom Security Attribute to a user

The prerequisites are complete and we can now assign the new Custom Security Attribute to a user, which can be done either in the Azure AD Portal or via Microsoft Graph.

Azure AD Portal:

  1. Go to the Azure AD Portal: Users blade and click on a user.
  2. Within the user’s profile, click Custom security attributes, then click Add assignment.
  3. In the Attribute set dropdown, select the Attribute Set - and in the Attribute name dropdown, select the Custom Security Attribute created earlier. Then type in an Attribute value in the Assigned value column.

    AAD Custom Sec Attributes - assign attribute

  4. Click Save to assign the Custom Security Attribute and value to the user.

Microsoft Graph:

  1. Go to Graph Explorer and sign in to your tenant
  2. Make a PATCH request to endpoint /users/{id|upn} (beta) with the correct user id or userPrincipalName. Add the properties in the body as shown below, BusinessProjects is the Attribute Set name and ProjectID is the Custom Security Attribute name, while PBX4718 is the Attribute value:

     {
         "customSecurityAttributes": {
             "BusinessProjects": {
                 "@odata.type": "#Microsoft.DirectoryServices.CustomSecurityAttributeValue",
                 "ProjectID": "PBX4718"
             }
         }
     }
    

    The Graph response will be:

     HTTP/1.1 204 No Content
    

    To view the assigned Custom Security Attributes on a user, make a GET request to endpoint /users/{id|upn}?$select=id,userPrincipalName,customSecurityAttributes (beta) with the correct user id or userPrincipalName. The Graph response will be:

     {
         "@odata.context": "https://graph.microsoft.com/beta/$metadata#users(id,userPrincipalName,customSecurityAttributes)/$entity",
         "id": "26406275-67f9-47fe-a80b-f71b18865cf2",
         "userPrincipalName": "[email protected]",
         "customSecurityAttributes": {
             "BusinessProjects": {
                 "@odata.type": "#microsoft.graph.customSecurityAttributeValue",
                 "ProjectID": "PBX4718"
             }
         }
     }
    

This example was for assigning a string Attribute. See the Graph documentation for assigning, updating or removing Custom Security Attributes on Microsoft Docs for other data types and additional information.

Control Azure Storage Blob access with ABAC

ABAC is short for Attribute-based Access Control. This is a new feature introduced by Microsoft for Azure Blob Storage and is now in public preview. ABAC brings a new flavor to access control management of Azure resources, and even though only Azure Blob Storage is supported right now ABAC will likely be introduced to a lot of other Azure resources in the future.

In the Introducing Azure AD custom security attributes article posted in the Azure Active Directory blog on December 1, 2021, Microsoft explains that Custom Security Attributes builds on the ABAC public preview. Now you can grant users access to Azure Blob Storage with Attribute-based Access Control (ABAC) utilizing Custom Security Attributes instead of just through Role-Based Access Control (RBAC), which means fine-grained access control with fewer Azure role assignments.

Check out my blog post Control access to Azure Storage Blobs with Attribute-based Access Control conditions to see how this works.

The future of Custom Security Attributes

Having a way of extending the Azure AD schema for Users, Service Principals and Managed Identities without having to rely on app registrations is really great - and it’s even better that access to these attributes can be controlled with RBAC and that no users have default access to these. Right now you can assign Custom Security Attributes and consume them in apps and scripts by using Microsoft Graph, and we will likely see that more services in Azure and Azure AD will be able to consume these in the future.

I really hope and expect that Microsoft quickly invests further into Custom Security Attributes to help customers solve a broad number of scenarios, like supporting dynamic membership rules for Azure AD groups, Access Package assignments, SAML and OpenID Connect claims, Conditional Access policies and more around access to Azure resources with Attribute-Based Access Control (ABAC). I’ll be sure to update my blog as they announce new features.

Known issues with Custom Security Attributes

At the time of writing there are some known issues listed on Microsoft Docs regarding Custom Security Attributes that you should be aware of. Remember that this feature is in public preview and that Microsoft is still working on making the feature complete and ready for general availability.

In my view the most important known issue is that Global Admins can read Azure AD audit logs to see Custom Security Attribute definitions and assignments, including Attribute values. If you export audit logs elsewhere then others might also be able to view these. Also, users with attribute set-level role assignments can view other Attribute Sets and Custom Security Attribute definitions. And the current lack of read-only Graph scope is also a downside. So you might want to wait with adding highly sensitive attribute values until the feature goes GA.

And that concludes this blogpost, thanks for reading!

Be sure to provide any feedback on Twitter or LinkedIn.

Share: X (Twitter) Facebook LinkedIn