Skip to content

Commit 59c2308

Browse files
Merge pull request #239602 from FaithOmbongi/updateExtensionsComparison
Compare extensions and custom security attributes
2 parents 0a8dbea + ba82937 commit 59c2308

File tree

1 file changed

+11
-5
lines changed

1 file changed

+11
-5
lines changed

articles/active-directory/fundamentals/custom-security-attributes-overview.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -56,13 +56,19 @@ Currently, you can add custom security attributes for the following Azure AD obj
5656
- Azure AD enterprise applications (service principals)
5757
- Managed identities for Azure resources
5858

59-
## How do custom security attributes compare with directory extensions?
59+
## How do custom security attributes compare with extensions?
6060

61-
Here are some ways that custom security attributes compare with [directory extensions](../develop/active-directory-schema-extensions.md):
61+
While both extensions and custom security attributes can be used to extend objects in Azure AD and Microsoft 365, they are suitable for fundamentally different custom data scenarios. Here are some ways that custom security attributes compare with [extensions](/graph/extensibility-overview):
6262

63-
- Directory extensions cannot be used for authorization scenarios and attributes because the access control for the extension attributes is tied to the Azure AD object. Custom security attributes can be used for authorization and attributes needing access control because the custom security attributes can be managed and protected through separate permissions.
64-
- Directory extensions are tied to an application and share the lifecycle of an application. Custom security attributes are tenant wide and not tied to an application.
65-
- Directory extensions support assigning a single value to an attribute. Custom security attributes support assigning multiple values to an attribute.
63+
| Capability | Extensions | Custom security attributes |
64+
|--|--|--|
65+
| Extend Azure AD and Microsoft 365 objects | Yes | Yes |
66+
| Supported objects | Depends on the extension type | Users and service principals |
67+
| Restricted access | No. Anyone with permissions to read the object can read the extension data. | Yes. Read and write access is restricted through a separate set of permissions and RBAC. |
68+
| When to use | Store data to be used by an application <br/> Store non-sensitive data | Store sensitive data <br/> Use for authorization scenarios |
69+
| License requirements | Available in all editions of Azure AD | Requires an Azure AD Premium P1 or P2 license |
70+
71+
For more information about working with extensions, see [Add custom data to resources using extensions](/graph/extensibility-overview).
6672

6773
## Steps to use custom security attributes
6874

0 commit comments

Comments
 (0)