Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
attribute provider integrations.Overview
The Entra ID Attribute Provider uses the Microsoft Graph API to look up user profile data, group memberships, and other directory attributes. It shares the same connector type as the Microsoft Entra ID IdP connector, but configured without OIDC authentication fields. This connector is not an identity provider. It does not handle authentication. Instead, it is paired with an IdP connector (such as Okta, ADFS, or Microsoft Entra ID OIDC) to supplement the session with additional attributes from Microsoft Entra ID.Use Cases
- Unified SSO with Entra ID attribute enrichment — Enrich sessions with Entra ID profile data (department, job title, manager) so applications receive consistent identity attributes regardless of which IdP handles authentication
- Cross-IdP authorization with Entra ID groups — Query Entra ID group memberships to drive authorization decisions in Orchestrator policies, even when users authenticate through a non-Microsoft IdP like Okta or ADFS
- Bridge identity data during IdP consolidation — During migration away from or toward Entra ID, maintain access to Microsoft directory attributes so applications continue to receive the claims they depend on
- Multi-directory identity enrichment — Combine Entra ID attribute lookups with authentication from any supported IdP, bridging identity data across organizational boundaries such as post-acquisition environments
Configuration
- Console UI
- Configuration
To create a Microsoft Entra ID Attribute Provider connector in the Maverics Console:
- Navigate to Identity Fabric in the Console sidebar.
- Click Create and select Microsoft Entra ID Attribute Provider.
- Enter a Name — this is the friendly name that identifies your provider.
- Enter the Microsoft Graph URL — this defines the endpoint used to make calls to the Microsoft Graph API. Use
https://graph.microsoft.com/v1.0for the stable API version. - Optionally enter the OIDC Well Known URL — the URL that returns OpenID Connect metadata about the Entra ID authorization server. This follows the pattern
https://login.microsoftonline.com/{tenant-id}/v2.0/.well-known/openid-configuration. - Enter the OAuth Client ID — the client ID of the Maverics application registered in the Entra ID organization.
- Enter the OAuth Client Secret — the client secret of the Maverics application registered in the Entra ID organization.
- Click Save.
Troubleshooting
- Verify the
graphURLis reachable from the Orchestrator host — the standard endpoint ishttps://graph.microsoft.com/v1.0 - Ensure the app registration has the correct Graph API permissions — without
User.Read.Allor similar scopes, attribute lookups will fail with 403 errors - Check that the
oauthClientSecretreference resolves correctly via your secret provider — Entra ID client secrets expire and need periodic rotation - Confirm the tenant ID in the
oidcWellKnownURLmatches the directory where the app registration and target users reside