Configure how attributes map from identity providers to SSO Profiles.
When a user authenticates via SSO, WorkOS normalizes identity provider attributes into a standard SSO Profile object. Understanding how this mapping works helps you plan which user data your application can access and how to configure additional attributes.
Every SSO Profile comes with the following standard attributes. These are the core set of attributes that are common across all identity providers. These are structured fields with a guaranteed schema in the top-level SSO Profile payload.
| Attribute | Description |
|---|---|
idp_id | The user’s unique identifier, assigned by the identity provider. Different identity providers use different ID formats |
email | The user’s email |
first_name | The user’s first name |
last_name | The user’s last name |
For more detailed user information, additional predefined attributes can be opted into and custom attributes can be defined. These attributes appear in the custom attributes field on SSO Profile objects and are configured in the WorkOS Dashboard.
When using AuthKit, SSO Profile custom attributes are also available on the organization membership’s custom_attributes field. See JWT Templates for how to include these in your access tokens.
When enabled, organization admins are asked to map these attributes during SSO configuration in Admin Portal. These fields are always optional if enabled. These fields are named and schematized by WorkOS and cannot be renamed.
| Attribute | Type and description | Status |
|---|---|---|
addresses | The user’s list of address objects (street_address, locality, region, postal_code, country, primary, raw_address) | Optional |
cost_center_name | The user’s cost center name | Optional |
department_name | The user’s department name | Optional |
division_name | The user’s division name | Optional |
emails | The user’s list of email objects (type, value, primary) | Optional |
employee_type | The user’s employment type | Optional |
employment_start_date | The user’s start date | Optional |
job_title | The user’s job title | Optional |
manager_email | The email address for the user’s manager | Optional |
username | The user’s username | Optional |
Predefined attributes can be enabled or disabled in the WorkOS Dashboard on the Identity Provider Attributes page.

For SSO Profiles, making changes to IdP attributes will take effect upon next sign-in.
Custom attributes enrich SSO Profiles with additional data from the identity provider. Custom attributes appear as fields in the Admin Portal. Customers map these fields to the correct values in their system when setting up SSO with their identity provider.
Custom attributes can be created in the WorkOS Dashboard on the Identity Provider Attributes page.

For SSO Profiles, making changes to IdP attributes will take effect upon next sign-in.
When a custom attribute is deleted, SSO Profiles will retain these existing attribute values until the next sign-in.
If attribute data for a particular SSO connection has changed and is no longer mapped properly, attribute mappings can be edited via the WorkOS Dashboard connection page or by the organization admin via the Admin Portal.

The visibility of custom attribute mapping for Directory Sync and Single Sign-On flows in the Admin Portal is controlled at the environment and organization level.
The environment-level setting is controlled on the Identity Provider Attributes page in the WorkOS Dashboard.

Organization-level settings are controlled on an individual organization’s Attributes tab in the WorkOS Dashboard. Organizations mirror the environment-level settings by default.
Additional predefined and custom attributes are supported for all SAML SSO connections.
This functionality is not currently supported. Custom attributes must be defined in the WorkOS Dashboard first. Reach out to support for specific use cases.
Attributes that cannot be mapped for a particular SSO Profile will result in a null value for the attribute.