Skip to content

Commit 98207b4

Browse files
Merge pull request #212634 from FaithOmbongi/patch-2
Update Microsoft Graph info for custom security attributes
2 parents b24955f + ea9cbbd commit 98207b4

File tree

1 file changed

+9
-7
lines changed

1 file changed

+9
-7
lines changed

articles/active-directory/fundamentals/custom-security-attributes-overview.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -55,13 +55,13 @@ Currently, you can add custom security attributes for the following Azure AD obj
5555
- Azure AD enterprise applications (service principals)
5656
- Managed identities for Azure resources
5757

58-
## How do custom security attributes compare with directory schema extensions?
58+
## How do custom security attributes compare with directory extensions?
5959

60-
Here are some ways that custom security attributes compare with [directory schema extensions](../develop/active-directory-schema-extensions.md):
60+
Here are some ways that custom security attributes compare with [directory extensions](../develop/active-directory-schema-extensions.md):
6161

62-
- Directory schema extensions cannot be used for authorization scenarios and attributes because the access control for the extension attributes is tied to the Azure AD object. Custom security attributes can be used for authorization and attributes needing access control because the custom security attributes can be managed and protected through separate permissions.
63-
- Directory schema extensions are tied to an application and share the lifecycle of an application. Custom security attributes are tenant wide and not tied to an application.
64-
- Directory schema extensions support assigning a single value to an attribute. Custom security attributes support assigning multiple values to an attribute.
62+
- Directory extensions cannot be used for authorization scenarios and attributes because the access control for the extension attributes is tied to the Azure AD object. Custom security attributes can be used for authorization and attributes needing access control because the custom security attributes can be managed and protected through separate permissions.
63+
- Directory extensions are tied to an application and share the lifecycle of an application. Custom security attributes are tenant wide and not tied to an application.
64+
- Directory extensions support assigning a single value to an attribute. Custom security attributes support assigning multiple values to an attribute.
6565

6666
## Steps to use custom security attributes
6767

@@ -168,9 +168,11 @@ Azure AD provides built-in roles to work with custom security attributes. The At
168168
> [!IMPORTANT]
169169
> By default, [Global Administrator](../roles/permissions-reference.md#global-administrator) and other administrator roles do not have permissions to read, define, or assign custom security attributes.
170170
171-
## Graph Explorer
171+
## Microsoft Graph APIs
172+
173+
You can manage custom security attributes programmatically using Microsoft Graph APIs. For more information, see [Overview of custom security attributes using the Microsoft Graph API](/graph/api/resources/custom-security-attributes-overview).
172174

173-
If you use the Microsoft Graph API, you can use [Graph Explorer](/graph/graph-explorer/graph-explorer-overview) to more easily try the Microsoft Graph APIs for custom security attributes. For more information, see [Overview of custom security attributes using the Microsoft Graph API](/graph/api/resources/custom-security-attributes-overview).
175+
You can use an API client such as [Graph Explorer](/graph/graph-explorer/graph-explorer-overview) or Postman to more easily try the Microsoft Graph APIs for custom security attributes.
174176

175177
![Screenshot that shows a Microsoft Graph API call for custom security attributes.](./media/custom-security-attributes-overview/graph-explorer-success.png)
176178

0 commit comments

Comments
 (0)