Managing external identities to enable secure access for partners, customers, and other non-employees
Entra External ID: Federated email claim not present in OnAttributeCollectionStart/Submit payload
We are using a federated OIDC identity provider with Microsoft Entra External ID.
The email claim is successful:
- returned from the IdP
- mapped via OIDC claim mapping (
email -> email) - correctly prefilled in the UI during sign-up
However, email is not present in:
-
OnAttributeCollectionStart -
OnAttributeCollectionSubmit
payloads.
Expected Behavior
If email:
- is provided by the IdP
- is mapped via OIDC claim mapping
- is used to prefill the UI
then it should also be available in:
userSignUpInfo.attributes.email
in custom authentication extension payloads.
Actual Behavior
Email is missing from the payload:
"userSignUpInfo": {
"attributes": {
"displayName": "...",
"givenName": "...",
"surname": "..."
},
"identities": [
{
"signInType": "federated",
"issuerAssignedId": "<redacted>"
}
]
}
Key Observation (Important)
If we map email to another attribute (for example, postalCode or streetAddress):
"postalCode": {
"value": "user@example.com"
}
Then the value does appear in the payload.
This proves:
- the IdP sends email
- the mapping works
- the payload can carry the value
But the email attribute is specifically excluded.
Repro Steps
- Configure the OIDC IdP.
- Map:
email -> email - Enable Email in the user flow attributes.
- Add a Custom Authentication Extension (Start + Submit).
- Trigger a federated sign-up.
Result:
- UI shows email
- Payload does not contain email
Additional Context
- Protocol: OAUTH2.0
- signInType: federated
- issuerAssignedId: non-email opaque ID (expected for this IdP)
Sanitized Payload Sample
{
"type": "microsoft.graph.authenticationEvent.attributeCollectionSubmit",
"data": {
"userSignUpInfo": {
"attributes": {
"displayName": "Test User",
"givenName": "Test",
"surname": "User"
},
"identities": [
{
"signInType": "federated",
"issuer": "https://login.live.com<tenant>",
"issuerAssignedId": "<redacted>"
}
]
}
}
}
Business Impact
- Cannot access email inside the custom authentication extension.
- Blocks validation and enrichment scenarios.
- Forces workarounds using incorrect attributes (e.g.
postalCode).
Questions to Microsoft
- Is this expected behavior for federated users?
- Why is
emailexcluded from the payload while other mapped attributes are included? - Is there a supported way to access the federated email in:
-
OnAttributeCollectionStart -
OnAttributeCollectionSubmit
-
We suspect this might be a limitation or bug specific to the email attribute handling in External ID custom authentication extensions, since other mapped attributes behave as expected.