Export Users with Custom Security Attributes using Powershell

Custom security attributes extend the default attributes associated with user and group objects. These custom attributes enable you to store additional information about users and groups, which can be used for various purposes, such as access control, reporting, and compliance.

Custom security attributes in Entra ID can be valuable when storing specific information unique to your organization or applications. For instance, you may want to include attributes like Cost CenterEmployee hire dateHourly SalaryWeekly Salary, or any other custom information relevant to your business processes.

Custom security attributes allow for various data values, such as strings, booleans, and integers. These attributes can be single or have multiple values. You also have the option to preset a value for an attribute, which helps minimize the risk of errors when assigning the attribute to an Entra ID user.

As of this blog post’s writing, custom security attributes are supported for Entra ID users, Entra ID enterprise applications (Service Principals), and Managed Identities.

Knowing the permissions necessary for setting up and managing security attributes is essential. You’ll need an Entra ID Premium P1 or P2 license to work with custom security attributes.

This blog post primarily focuses on exporting a list of Entra ID users with Custom security attributes assigned to them. It is assumed that you have already completed the steps to create and assign custom security attributes to the Entra ID users as a prerequisite.

Permissions for Management of Custom Security Attributes

To manage custom security attributes in Entra ID, you would require Attribute Definition Administrator or Attribute Assignment Administrator roles. By default, Global Administrator and any other administrator role do not have permission to read, define, or assign custom security attributes.

A Global Administrator can assign the roles of Attribute Definition Administrator or Attribute Assignment Administrator to a user responsible for managing custom security attributes, and this user could also be another Global Administrator.

  • Attribute Definition Administrator – Manage all aspects of attribute sets and Manage all aspects of custom security attribute definitions
  • Attribute Assignment Administrator – Read attribute sets, Read custom security attribute definitions, and Read and update custom security attribute keys and values for users and service principals.

Export Users with Custom security attributes using Powershell

First, you must connect to Microsoft Graph using the Connect-MgGraph cmdlet. Subsequently, you can utilize the Get-MgUser cmdlet to retrieve the custom security attributes assigned to the users. Below are the values you’ll require for the PowerShell script:

Based on our example, you will need the values below for the Powershell script. (Replace the values with those specific to your organization accordingly).

  • Attribute Set Name: The name of the Attribute set. For example, CostCenter
  • Attribute Names: All the attributes under the attribute set CostCenter, such as CloudInfra, Techpress, etc., which we will define in an array.

Connect to Microsoft Graph

Connect-Mggraph -scopes "User.ReadWrite.All,Directory.ReadWrite.All,CustomSecAttributeAssignment.ReadWrite.All,CustomSecAttributeDefinition.ReadWrite.All"

You might get a prompt to provide consent and accept the required permissions. Please consent and click on Accept. This action will create an Enterprise Application in Entra ID. To access it, navigate to the Entra Admin Center, then go to Identity > Applications > Enterprise applications.

  • Click on Microsoft Graph Command Line Tools.
Microsoft Graph Command Line Tools
Microsoft Graph Command Line Tools
  • After clicking on the application, scroll down to Permissions under the Security section. Here, you’ll find a list of all the permissions that you’ve consented to using Connect-MgGraph.
Microsoft Graph Command Line Tools Permissions
Microsoft Graph Command Line Tools Permissions
  • After successfully connecting to Microsoft Graph using the provided scopes, you can export the list of users using the following PowerShell script.
  • You can use the PowerShell script below to Export users with their Custom Security Attributes.


    This script Export the users having CostCenter Attribute 
    Author: Jatin Makhija
    Site: cloudinfra.net
    Version: 1.0.0
#Provide all Custom security Attributes in an Array
$CSA = @('CloudInfra', 'TechPress')
#Initialize an empty array
$Users = @()
$Users = Get-MgUser -All -Property CustomSecurityAttributes, Id, DisplayName
$object = ForEach ($User in $Users) {
    If ($User.customsecurityattributes.AdditionalProperties['CostCenter'] -ne $Null) {
        $data = $User.customsecurityattributes.AdditionalProperties['CostCenter']
        $value = $data.keys | foreach-object {if ($_ -in $CSA) {$data[$_]}}
         Name = $User.DisplayName
         CostCenterCode = $value
 $object | Export-Csv c:\temp\CloudinfraUsers.csv -NoTypeInformation
  • I’ve checked the contents of the CloudInfraUsers.csv file. The Excel file has two columns: Name and CostCenterCode. This is the custom security attribute we applied to the users.
Export users based on Custom security attributes to CSV file
Export users based on Custom security attributes to CSV file


In this blog post, we’ve explored the process of exporting a list of users with custom security attributes. The data is exported in a CSV file that can be re-formatted according to your requirements.

Leave a Comment