Active Directory - changing Account ID/nativeIdentifier

In my company, our AD OU structure is designed OU=Region,OU=Country,OU=Location; so, as you could imagine, it’s not uncommon for folks to move locations, thus changing their DN. This has caused some issues with provisioning/deprovisioning of AD groups, specifically that IDN tries to add entitlements via the old DN and it either fails or, worst case, continually re-adds even after we revoke.
Wanted to check with the wider community if anyone has changed the Account ID on an Active Directory source from using the Distinguished Name to another attribute (i.e. samAccountName). How did it go? Any roadbumps we should be aware of? Any full-stop blockers?

Thanks in advance!

@AHavenar

SailPoint attempted to change the account ID in a previous release but it was rolled back.

The recommendation is to follow the Best Practices Document.

Best Practices: Active Directory Account Moves - Compass (sailpoint.com)

There is an item in the Ideas Portal that you can vote on to help SailPoint prioritize a change like this.

Allow AD Connector to use Object SID or | SailPoint Ideas Portal

2 Likes

Thank you for the links! Voted on the Idea as it definitely falls into the situation we’re looking at. Object GUID or SID is a much better idea than falling back on samAccountName.
Maybe this is something to do with the new Source view, but it looks to allow an Admin to update the Account Schema on the source, so, we could in theory change it to whatever we would need it to be. The pitfalls described in your screenshot would be what we would be wanting to know before attempting.

Appreciate the input, Alicia, we are following those best practices where we can! Hopefully we’ll get some update soon about enhancements.

This topic was automatically closed 60 days after the last reply. New replies are no longer allowed.