Skip to content
Your new email signature experience is only a few clicks away! Start your free trial today.

How to Use Active Directory for Email Signatures

Brought to you by Exclaimer

It’s one thing to create an amazing email signature design. It’s another to ensure that every user’s contact details populate their signature correctly.

For organizations using Microsoft Exchange Server or Office 365 (now Microsoft 365), personalization in email signatures can be achieved by adding placeholders integrated with contact information from Active Directory (AD). This is where all of their users’ details will be stored. For organizations using G Suite (now Google Workspace), Google Directory would be used for contact information instead.

Using Active Directory for email signatures effectively

Active Directory in email signatures

Using Active Directory for email signatures means each template will be automatically populated with accurate contact information. Examples include a user’s full name, job title, phone number, and email address. Using Active Directory in email signatures has the benefit of adding contact details at the server level. An organization would then use transport rules to implement signatures for all users.

Now, both Microsoft Exchange and Office 365 let you do this without any external help required. Changes might take time, and email signature management is complex, but it can be done with patience. However, Exchange and Office 365 don’t support all Active Directory for email signature user attributes, known as AD Attributes. This means using Active Directory for email signatures can be slightly limiting.

What AD Attributes can I use in Exchange and Office 365 signatures?

Below is a list, in alphabetical order, of the AD attributes you can use in Exchange and Microsoft 365 (formerly Office 365) email signatures. The left column shows the LDAP attribute name in Active Directory, and the right column shows the corresponding Active Directory Domain Services display name for when you are deploying a signature via a VBS script.

Note: Every AD Attribute you use needs to include two percentage symbols on either side of it, e.g.: %%DisplayName%%

Microsoft 365 Display Name Lightweight Directory Access Protocol (LDAP) Name
CityI
Countryco
Companycompany
Departmentdepartment
DisplayNamedisplayName
Emailmail
FaxNumberfacsimileTelephoneNumber
FirstNamegivenName
HomePhoneNumberhomePhone
Initialsinitials
JobTitletitle
LastNamesn
Managermanager
MobileNumbermobile
Notesinfo
OfficephysicalDeliveryOfficeName
POBoxpostOfficeBox
PagerNumberpager
PhoneNumbertelephoneNumber
OtherFaxNumberotherfacsimilieTelephoneNumber
OtherHomePhoneNumberotherHomePhone
OtherPhoneNumberotherTelephone
Statest
StreetstreetAddress
TelephoneNumbertelephoneNumber
Titletitle
UserLogonNameuserPrincipalName
Zip/Postal Codepostalcode

Using additional Active Directory data in email signatures

More AD Attributes can be used in Microsoft Exchange and Office 365 signatures. However, you will not be able to add them if you implement email signatures manually.

Microsoft 365 Display Name Lightweight Directory Access Protocol (LDAP) Name
{CustomAttribute 1-15}extentionAttributes

There are 15 {CustomAttributes} available to use when it comes to Active Directory in email signatures. You must replace CustomAttribute/ extensionAttribute1 with the appropriate number between 1 and 15.

How to effectively use Active Directory in email signatures

If you use a dedicated email signature management tool like Exclaimer, you’ll be able to use Active Directory in email signatures much more effectively. Every email signature remains personalized and tailored for each user.

  • Synchronize user contact details for all members or, if required, select members.
  • Enable additional Azure AD Attributes (up to 100 AD fields).
  • Upload user attributes or overwrite the existing data that is read from the Azure Active Directory.
  • Upload user photos so that they can be added to your email signatures.

Exclaimer also allows an organization to let users edit specific contact information in their email signatures. This is all without having to make change requests to IT:

  • Personal titles
  • Job titles
  • Surname/family changes
  • Personal phone numbers
  • Working hours
  • Next holiday period

The IT team always maintains control over all user information. They determine which details are editable and which are not, ensuring that all email signatures remain accurate and compliant. This is also good for companies that might not have the most up-to-date data in Active Directory for email signatures.

The data is also stored independently of your Active Directory. This means signatures can use information you might not necessarily want to be housed in Active Directory for email signatures. You can then switch back to default AD data when necessary.

Ready to get started?

Exclaimer transforms everyday emails into a valuable platform to drive sales and build stronger relationships.

Start a free 14-day trial today (no credit card information required!) or book a demo with one of our product specialists to find out more. 

Learn more with our range of resources

The Untapped Potential of Corporate Emails 1 Exclaimer

The Untapped Potential of Corporate Emails

Think email signatures are just a way to display contact details? Think again! Discover the full potential of your corporate email signatures in our white paper.

Read More >
Moving from hybrid working from remote working

The Importance of Email Signature Management for Hybrid Workers

Making the move to hybrid working serves up a number of challenges for organizations. Find out how to make sure email signature management isn’t one of them.

Read More >
The Top 10 Email Signature Management Headaches 4 Exclaimer

The Top 10 Email Signature Management Headaches

Find out how to cure the headache of email signature management for IT teams – for good!

Read More >

Try for free today Your new email signature experience
is just a few clicks away