Version 4 of the HP Authentication Suite of applications has been released,Including Microsoft Universal Print Anywhere!
Do not update firmware to V5.9.x please search "Known Issues" Article
Search V4 Release update

Custom Security Attributes and why we chose this pathway?

Modified on Thu, 5 Feb at 6:25 PM


⭐ Benefits of Azure Custom Security Attributes

Microsoft Entra Custom Security Attributes are business‑specific key–value attributes that can be assigned to users, service principals, and applications. They enable deeper governance, data organization, and fine‑grained access control.

Below are the major benefits:


1. Store Business‑Specific Information

Custom security attributes let you extend identity profiles with additional fields tailored to your organization—without altering the base schema. In HP Authentication Managers Case we store users Card/Badge identities' and other user specific custom values.
[learn.microsoft.com]


2. Fine‑Grained Access Control with Azure ABAC

Custom attributes integrate with Azure Attribute-Based Access Control (ABAC), enabling conditional, attribute‑driven permissions.

Benefits include:

  • Restrict access to resources such as Azure Storage blobs based on project or classification tags.
  • Reduce the number of role assignments by using attribute‑based conditions.
  • Improve security posture by tying access to identity attributes instead of shared keys or SAS tokens.    [thetechtrails.com], [techcommun…rosoft.com]

3. Scoped and Secure Storage of Sensitive Information

Unlike extension attributes, custom security attributes can be locked down so only authorized administrators can view or modify them.

This enables storing sensitive information safely inside Entra ID.    [techcommun…rosoft.com]


4. Better Organizational Governance & Attribute Management

Custom attributes support:

  • Grouping into attribute sets for organized administration.
  • Role‑based governance using dedicated attribute management roles (e.g., Attribute Definition Administrator, Attribute Assignment Administrator).
  • Assigning roles at tenant or attribute‑set scope for granular delegation.    [docs.azure.cn]

5. Flexible Data Types & Structures

Custom security attributes support:

  • Multiple data types (Boolean, integer, string)
  • Single or multi‑value formats
  • Predefined or free‑form values

This flexibility makes it easier to model real business scenarios.    [learn.microsoft.com]


6. Enhanced Filtering & Reporting

You can query Azure AD/Entra objects using custom attribute filters, enabling:

  • Cleaner application inventory management
  • Easier auditing
  • Category‑based reporting of applications & identities    [learn.microsoft.com]

7. Supports On‑Prem AD Synced Users

If your environment uses hybrid identity, custom security attributes can also be assigned to directory‑synced users.    [learn.microsoft.com]


Summary

Benefit CategoryDescription
Business CustomizationAdd business‑specific identity attributes.
Fine‑Grained Access ControlEnable ABAC for highly targeted permissions.
Security & ComplianceRestrict access to sensitive attributes via scoped RBAC.
Governance & DelegationAttribute sets and dedicated admin roles support structured governance.
Data FlexibilityMulti‑type, multi‑value, predefined or free‑form options.
Improved Inventory & ReportingUse attributes for filtering, categorizing, and auditing.
Hybrid SupportWorks with directory‑synced users.



⭐Why does Microsoft allow HP Authentication Manager custom attribute set names to be deactivated but not deleted?


1. Are there any Security risks of not being able to delete Attribute Set Names?

The inability to delete attribute sets (or their contained custom security attribute definitions) does not introduce security risks. Microsoft Entra’s design relies on deactivation rather than deletion to preserve the integrity and traceability of directory data.

2. Why this poses no security risk

  • Deactivated attributes cannot be used going forward.
    Once an attribute or attribute set is deactivated, it is completely unavailable for assignment or operational use. This prevents any new references from being created while still retaining historical consistency. [learn.microsoft.com]

  • Historical references remain intact for audit and integrity.
    If attributes could be deleted outright, any historical event logs, audit trails, or existing identity records referencing that attribute could become inconsistent or corrupted. Maintaining these references is essential for regulatory compliance and troubleshooting. [learn.microsoft.com]

  • Directory schema stability is critical.
    Custom attributes can be tied to policies, service principals, API connectors, and preview features. Deleting them could break these dependencies unexpectedly. Deactivation ensures the attribute no longer functions without destabilizing the directory. [learn.microsoft.com]

In short: deactivation removes future risk while preserving past accuracy—a principle aligned with identity governance best practices.




⭐Is using Custom Security Attributes Safe ?



The HP Authentication Manager Enterprise service principal is the only identity that needs permission to write a user’s Card ID into the Custom Security Attributes. When a user adds or updates a card, the HP Authentication Manager Enterprise app performs the update on the user’s behalf after the user successfully completes Azure AD authentication.


This ensures that card updates always originate from authenticated user actions and that the application remains the single trusted source for attribute changes.


Assigning the Custom Attribute Assignment Administrator role to a standard (non‑Global Admin) user is optional and should only be considered if the business requires the ability to manually delete a user’s Card ID—for example, when managing lost, stolen, or reused cards.


Even then, this role can be granted temporarily, only access for the duration needed to perform the cleanup.

However, assigning this role to a general user is not recommended.


If the organization uses other vendors or third‑party applications that also rely on Custom Security Attributes, a user with this role could accidentally modify or delete attributes belonging to those other systems.


To avoid this risk, it is best not to assign this role to any human user and instead rely exclusively on the HP Authentication Manager Enterprise application, which is specifically coded to interact only with the correct, designated attribute set.

It’s also important to note that a Global Administrator can always assign this role to themselves. While a Global Admin could manually delete Card ID attributes, this is not a security risk: if a Global Admin removes a user’s Card ID, the next time the user signs in, the HP Authentication Manager Enterprise app will automatically detect the missing value and recreate it.


⭐Why your app works the way it does?


Your HP Authentication Manager Enterprise service principal is correctly assigned permissions so it can:

 

  • Write the user’s Card ID
  • Re‑create missing values at next login 
  • Act on behalf of the user after authentication

 

This is fully aligned with Microsoft’s design: apps, not users, manage custom attribute values.



FAQ

What is custom security attributes

What are custom security attribute roles used for

Are custom security attributes safe to use

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article