Step-by-Step Guide: Collect custom attribute by using Azure AD entitlement management

In my previous blog post, I have explained how we can collect custom attribute values by using Azure AD user flows. We had custom attributes setup in Azure AD and when a guest user accesses an application for the first time, the values for these custom attributes will be collected by using user flows. Azure AD entitlement management feature does identity governance by allowing organizations to manage identity and access life cycle with help of access packages, workflows, and reviews. In one of my previous blog posts, I have talked about entitlement management in detail and it can be accessed using . Now we can also collect these custom attribute values when a user accesses an access package. In my Azure environment, I have an application and its access life cycle is managed by using Azure AD entitlement management. This application is also open for guest users. When a guest user requests access, I need to collect values for two custom attributes called “Organization ID” and “User Token”. After the guest user is provided this information, the approver will cross-check these values with the internal system to make sure the request is legitimate. Once the verification process is completed, the approver will go ahead and process the request.

In this blog post, I am going to demonstrate how we can set up this. Another important to mention in here is, similar to the user flow method, the collected custom attribute values will be saved in Azure AD and if required we can query these values using Microsoft Graph.

Current Setup

In my existing environment, I already created two custom attributes called “Organization ID” and “User Token”. I have covered the steps for that in my previous blog post.

I have also created an access package for the application under the Azure AD entitlement management. This particular application is hosted in on-prem server and it is using Azure AD application proxy for remote access.

As per the policy, this application is open for any external user. Also, any access request will go through the approval process.

Configure required attributes for the application

Let’s go ahead and see how we can configure require attributes feature for the application.

1. Log in to Azure Portal and go to Azure AD | Identity Governance | Click on the access package you want to modify (I assume you already have relevant access packages configured)

2. Then click on Resource roles

3. The next step of the configuration is to add the application to the access package. To do that click on + Add resource roles

4. Then, click on + Applications

add new application to access package

5. It will list down the applications. From the list select the application you want to manage. In this demo, I am choosing an application called rebelapp01.

6. Once the selection is done, choose the role you going to manage by using the access package.

choose the application role

7. To complete the process, click on Add at the end.

Add application to access package

8. This completes the process of adding an application to the access package. The next step is to add the required attributes to the application. To do that, select the application and click on Require attributes (preview) option.

choose require attributes

9. It opens up the attribute page. In there we can see two attributes and those are inbuilt attributes. We need to add the two custom attributes to the list. To do that, under attributes type choose Directory schema extension.

Directory schema extension

10. Then click on the drop-down in the attribute column to see the custom attributes values. In there I select the User.OrganizationID attribute first.

select custom attibute

11. After that, we need to define the Default display string value for the attribute. This is what users will see in the form.

define Default display string

12. Answer format allows us to choose what sort of input to expect from the user. I am going to keep it as short text.

input format

13. I also want attribute value to be editable during direct assignments and self-service requests. So, I select Yes for attribute value is editable option.

14. This completes the configuration for the custom attribute Organization ID. I did the same for User Token attribute and click on Save to apply changes.

Complete customer attribute configration

Next, we need to do some testing to verify the configuration.


I am going to start the testing process by login into the corporate access portal using my Microsoft account (

After successful login, we can see the available access packages. Choose the relevant access package and click on Request.

It will open up a new window. In there we can see the two custom attributes we added, as required fields. I went ahead and fill the form with relevant data, accept the privacy policy statement and click on Submit.

Completed access form

Then I log in as Approver to my access portal. In there under approvals, I can see the new access request we created.

Pending access request

Before processing the request, let’s go ahead and check the access request details. To do that select the request and click on details.

View access request details

It opens up a new window, in there under request details we can see the Organization ID and User Token data as expected.

User provided data

After review, I went ahead and approve the request. This created a new guest user in Azure AD with custom attribute values. We can query these values using Microsoft Graph.

In above the attribute name has extension_54be41fb7bd047bc9b42c9a5282490f1_ . In there, 54be41fb7bd047bc9b42c9a5282490f1 is the app id of AAD extension app. This is used to store user data. You can find it under AAD app registrations.

This marks the end of this blog post. Hope now you have a better understanding of how to use the required attribute feature in Azure AD entitlement management. If you have any questions feel free to contact me on also follow me on Twitter @rebeladm to get updates about new blog posts.

This blog featured as part of Azure Week. Find more great Azure content here.

About the Author:

I am Dishan Francis. I’m a Azure/Identity Consultant at Microsoft. I’m a dedicated and enthusiastic information technology expert who enjoys professional recognition and accreditation from several respected institutions. I am maintaining this blog for last 7 years. This includes more than 400 articles already. These are mainly about Microsoft Active Directory Service and Azure Active Directory Service. I also blog about different Azure services. If you need further help on subject matters, feel free to contact me on Also to get latest updates, follow me on twitter @rebeladm


Francis, D. (2022). Step-by-Step Guide: Collect custom attribute by using Azure AD entitlement management. Available at: [Accessed: 11th July 2022].

Share this on...

Rate this Post: