How to Add and Map Custom Fields with Active Directory in Threatcop Admin (TA)
This feature allows administrators to add organization-specific fields in Threatcop Admin (TA) and map them to directory attributes (Azure AD, Google Workspace, Okta, etc.) to keep TLMS records consistent with your identity provider.
Steps
1. Navigate to the Users & Groups → Directory section in Threatcop Admin (TA), then open the Integrations → Directory Integration option.


2. Select and authorize your directory. Grant admin consent or authorize access to allow directory sync.


3. Go to Manage Fields under the Users section. Add a Custom Field (e.g., Employee ID, Address) and save. Confirm the updated field list shows your new field.




4. Return to Directory Integration → Field Mapping. Map each custom field to its corresponding AD attribute (e.g., Employee ID → employeeId, Address → city).



5. Save the mapping. A confirmation message appears: 'Custom field mapping has been set successfully.'


Best Practices
- Add only fields that are necessary for your organization (e.g., Employee ID, Department Code).
- Verify mappings against your directory schema before saving.
- Keep a consistent naming convention between TA custom fields and AD attributes.
- If a required custom field does not appear in the mapping options, confirm that the field name matches exactly as it is defined in your Active Directory. Field names are case sensitive, and even small differences in spelling or capitalization will prevent the field from being recognized.
Limitations
- Only attributes available in your integrated directory service can be mapped.
- Default fields like Name and Email cannot be deleted.
Warnings
- Incorrect mappings may cause sync issues or missing data—double-check before saving.
- Ensure mandatory fields are truly required, as learners cannot proceed without filling them.