Share via

Entra External ID: Federated email claim not present in OnAttributeCollectionStart/Submit payload

Yuliia Bashko 80 Reputation points
2026-04-17T14:05:29.75+00:00

We are using a federated OIDC identity provider with Microsoft Entra External ID.

The email claim is successful:

  • returned from the IdP
  • mapped via OIDC claim mapping (email -> email)
  • correctly prefilled in the UI during sign-up

However, email is not present in:

  • OnAttributeCollectionStart
  • OnAttributeCollectionSubmit

payloads.

Expected Behavior

If email:

  • is provided by the IdP
  • is mapped via OIDC claim mapping
  • is used to prefill the UI

then it should also be available in:

userSignUpInfo.attributes.email

in custom authentication extension payloads.

Actual Behavior

Email is missing from the payload:

"userSignUpInfo": {
  "attributes": {
    "displayName": "...",
    "givenName": "...",
    "surname": "..."
  },
  "identities": [
    {
      "signInType": "federated",
      "issuerAssignedId": "<redacted>"
    }
  ]
}

Key Observation (Important)

If we map email to another attribute (for example, postalCode or streetAddress):

"postalCode": {
  "value": "user@example.com"
}

Then the value does appear in the payload.

This proves:

  • the IdP sends email
  • the mapping works
  • the payload can carry the value

But the email attribute is specifically excluded.

Repro Steps

  1. Configure the OIDC IdP.
  2. Map:
       email -> email
    
  3. Enable Email in the user flow attributes.
  4. Add a Custom Authentication Extension (Start + Submit).
  5. Trigger a federated sign-up.

Result:

  • UI shows email
  • Payload does not contain email

Additional Context

  • Protocol: OAUTH2.0
  • signInType: federated
  • issuerAssignedId: non-email opaque ID (expected for this IdP)

Sanitized Payload Sample

{
  "type": "microsoft.graph.authenticationEvent.attributeCollectionSubmit",
  "data": {
    "userSignUpInfo": {
      "attributes": {
        "displayName": "Test User",
        "givenName": "Test",
        "surname": "User"
      },
      "identities": [
        {
          "signInType": "federated",
          "issuer": "https://login.live.com<tenant>",
          "issuerAssignedId": "<redacted>"
        }
      ]
    }
  }
}

Business Impact

  • Cannot access email inside the custom authentication extension.
  • Blocks validation and enrichment scenarios.
  • Forces workarounds using incorrect attributes (e.g. postalCode).

Questions to Microsoft

  1. Is this expected behavior for federated users?
  2. Why is email excluded from the payload while other mapped attributes are included?
  3. Is there a supported way to access the federated email in:
    • OnAttributeCollectionStart
    • OnAttributeCollectionSubmit

We suspect this might be a limitation or bug specific to the email attribute handling in External ID custom authentication extensions, since other mapped attributes behave as expected.

Microsoft Security | Microsoft Entra | Microsoft Entra External ID

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.