Skip to main content

Active Directory Attribute Reference

This reference provides a complete listing of Active Directory attributes that can be synchronized with EmpowerID Person objects, including their AD schema mappings and recommended flow configurations.

For step-by-step instructions on configuring attribute flow rules, see Configure Attribute Flow for Active Directory. For conceptual information about flow directions and authority scoring, see Configure Attribute Flow Rules.

Understanding Attribute Mappings

Each attribute mapping connects an EmpowerID Person attribute to its corresponding Active Directory schema attribute:

  • Person Attribute — The attribute name in EmpowerID Person objects
  • AD Attribute — The corresponding LDAP attribute name in Active Directory schema
  • Description — What the attribute stores and its purpose
  • Notes — Special considerations, typical sources, or security warnings

Use the Configure Attribute Flow Rules decision framework to determine appropriate flow directions for your environment based on your authoritative sources and organizational policies.

Identity Attributes

Core attributes that define user identity and naming.

Person AttributeAD AttributeDescriptionNotes
FirstNamegivenNameUser's first nameTypically from HR system
MiddleNamemiddleNameUser's middle name or initial
LastNamesnUser's surname or family nameTypically from HR system
NamenameUser's full display nameOften calculated from FirstName + LastName
PersonalTitlepersonalTitleHonorific or title prefix (Mr., Ms., Dr., etc.)
GenerationalSuffixgenerationQualifierGenerational suffix (Jr., Sr., III, etc.)
InitialsinitialsUser's name initials

Employment Attributes

Attributes related to employment, organizational structure, and job roles.

Person AttributeAD AttributeDescriptionNotes
TitletitleUser's job title or positionTypically from HR system
DepartmentdepartmentDepartment or organizational unit nameTypically from HR system
DepartmentNumberdepartmentNumberDepartment identifier or code
DivisiondivisionDivision or business unit name
CompanycompanyCompany or organization name
EmployeeIDemployeeIDPrimary employee identifierSet during provisioning; should not sync after creation
EmployeeIDOtheremployeeNumberAlternate employee number or identifier
EmployeeTypeemployeeTypeEmployment classification (FTE, contractor, temporary, etc.)
ManagerPersonIDmanagerDistinguished name of user's managerTypically from HR system
Critical - EmployeeID

Set EmployeeID to No Sync to prevent ongoing synchronization. While EmpowerID populates this during account creation, subsequent changes should not flow to prevent identifier conflicts.

Contact Attributes

Communication and contact information attributes.

Person AttributeAD AttributeDescriptionNotes
EmailmailPrimary email addressFlow direction depends on authoritative source
EmailAddressesJSONproxyAddressesEmail proxy addresses for Exchange (multi-valued)Uses custom handler for Exchange integration
TelephonetelephoneNumberPrimary telephone number
BusinessPhoneotherTelephoneAdditional business telephone number
MobilePhonemobileMobile or cellular phone numberOften user-updatable through self-service
HomeTelephonehomePhoneHome telephone number
FaxfacsimileTelephoneNumberFax number
PagerpagerPager or beeper number

Location Attributes

Physical location and address attributes.

Person AttributeAD AttributeDescriptionNotes
OfficephysicalDeliveryOfficeNameOffice location name or identifier
RoomNumberroomNumberRoom or suite number
StreetAddressstreetStreet addressMaps to both street and streetAddress AD attributes
StreetAddressstreetAddressStreet addressMaps to both street and streetAddress AD attributes
CitylCity name
StatestState or province name
PostalCodepostalCodePostal or ZIP code
CountrycoCountry nameUses custom handler for country name/code mapping
LocationlocationGeneral location identifier
Street Address Mapping

The StreetAddress Person attribute maps to both street and streetAddress AD attributes. Both mappings are typically configured identically to ensure consistency across directory queries.

Security and Authentication Attributes

Attributes related to authentication, authorization, and security.

Person AttributeAD AttributeDescriptionNotes
LoginsamAccountNameAccount login name (SAM account name)CRITICAL: Must be set to No Sync to prevent authentication issues
ValidUntilaccountExpiresAccount expiration date and timeUses custom handler for date format conversion
Critical - Login Attribute

The Login attribute must always be set to No Sync. Allowing attribute flow to modify samAccountName after account creation causes authentication failures and security issues. While EmpowerID populates the login name during provisioning, it must remain static thereafter.

Descriptive Attributes

General descriptive and miscellaneous attributes.

Person AttributeAD AttributeDescriptionNotes
DescriptiondescriptionUser description or notes
NotesinfoAdditional information or comments
AssistantassistantName of user's assistant
BusinessCategorybusinessCategoryBusiness category or classification
CarLicensecarLicenseLicense plate numberUses encrypted handler for sensitive data
ClearanceLevelSBAPersonClearanceLevelSBASecurity clearance level
CustomAttribute4typeCustom attribute field (type)
CustomAttribute27thumbnailPhotoUser photo thumbnailBinary data
LocaleIDlocaleIDLocale identifier for regional settings
PreferredLanguagepreferredLanguagePreferred language code

Determining Flow Direction

Flow direction for each attribute depends on your organization's identity architecture and authoritative sources. Use the Configure Attribute Flow Rules decision framework to determine appropriate flow directions:

  • Inbound — When Active Directory is authoritative for the attribute
  • Outbound — When EmpowerID or another system (such as HR) is authoritative
  • Bidirectional — When both systems can legitimately update; last change wins
  • No Sync — When the attribute should not synchronize after initial provisioning

Consider your organization's source of truth for each attribute category before configuring flow rules.

Common Configuration Patterns

HR-Driven Environment

When an HR system provides authoritative employee data:

  • Outbound to AD: Identity attributes, employment attributes, most location attributes
  • Bidirectional: Contact attributes users can self-update (mobile phone, personal information)
  • No Sync: Login, EmployeeID (static after creation)

AD as Authoritative Source

In organizations without HR integration where AD manages identity data:

  • Inbound from AD: Identity attributes, employment attributes, contact attributes
  • No Sync: Login (critical - never synchronize)

Mixed Authority

When different systems are authoritative for different attribute categories:

  • Configure authority scores to define precedence
  • Use Bidirectional flow where both systems can legitimately update
  • Clearly document which system owns which attributes

Custom Flow Handlers

Some attributes use custom flow handlers for attribute-specific transformation logic:

  • ValidUntil — ExpirationDateAttributeHandler
  • Country — CountryAttributeflowHandler
  • CarLicense — EncyptedAttributeFlowHandler
  • EmailAddressesJSON — CustomPersonEmailForADAttributeFlowHandler
  • ManagerPersonID — ManagerAttributeFlowHandler

Custom handlers are specified in the account store configuration and typically do not require modification during normal operations.