Microsoft Entra ID Attribute Provider

Prev Next

Overview

Configure Maverics to source attributes for claims, headers and authorization rules using Entra ID as an attribute provider.

Identity Fabric → Microsoft Entra ID Attribute Provider → Configure Identity Fabric → Select as attribute provider in user flow

Steps

  1. Go to Identity Fabric, click Create, and select Microsoft Entra ID Attribute Provider from the list.

  2. Configure the Identity Fabric for your Microsoft Entra ID instance.

  3. Setup an attribute provider in a user flow.

    1. Select your Entra ID Attribute Provider identity fabric in the Attribute Provider section.

    2. Select the Identity Provider that is being used for authentication.

    3. Select the attribute provided by the IDP that will be mapped to the OUD Search Key to look up attributes.

  4. Using it in a user flow:

    • Authorization: Select attributes from Entra ID for roles or attribute based policies.

    • Claims and headers: Select attributes from Entra ID to be included in OIDC claims, SAML assertions, or Proxy App headers.

Configure Identity Fabric

Maverics requires the following information for Entra ID as an attribute provider.

image.png

Use a Secret Provider

Production settings ought to implement a secret management system. Maverics connects with multiple secret management systems, which keep secrets that Orchestrator instances retrieve during startup. To cite a secret from your provider, enclose the name in angle brackets. (e.g. <app client-id>)

Learn more about Secret Providers

NameDescriptionExample
NameThe friendly name of your attribute provider.Company_Entra_Graph_Attr_Provider
Microsoft Graph URLDefines the endpoint used to make calls to the Microsoft Graph API.https://graph.microsoft.com
OIDC Well Known URLThe URL that returns OpenID Connect metadata about the Entra ID authorization server. Replace with your tenant's Auth0 domain in the following URL:https://login.microsoftonline.com//v2.0/.well-known/openid-configuration.https://login.microsoftonline.com/[TENANT ID]/v2.0/.well-known/openid-configuration
OAuth Client IDThe client ID of the registered Maverics application.12345678-abcd-9876-efgh-123abc456def
OAuth Client SecretThe client secret of the registered Maverics application. Production environments should use a secret management solution. Maverics integrates with various secret management solutions, which store secrets that Orchestrator instances load when starting up.secret_value

Entra ID Configuration

  1. Log into Entra ID.

  2. Find the Maverics App Registration entry.

  3. Click on API Permissions.

  4. Select Microsoft Graph.

  5. Select Application Permissions.

  6. Find and select the User.Read.All permission. Click Add Permission.

  7. If required by your organization, click "Grant admin consent for [ORGANIZATION]"

Required Permissions

The User.Read delegated permission is not sufficient for retrieving all of a user's attributes.

image.png