If user is member of specific AD groups then user should be provisioned to other sources like MSSQL source with some roles/entitlements.
Can we implement the above feature using access profiles tied to AD groups and when user raises request for access profile then user can provisioned to MSSQL source with some roles/entitlements
@kalyannambi2010 Yes, you can do it exactly with the below steps. Create a new role with membership criteria as below:
Type - Entitlement
Source - your AD source name
Operation - Equals
Entitlement - Here, select the AD group names for which you wan to check the membership for granting MS SQL access
Once this criteria is defined, go to Manage Access tab in the role to add the MS SQL source related entitlements/access profiles and then - save the role, enable the role
With this, whenever an identity has access to the AD groups you’ve defined in this role, the criteria is satisfied for such identities and MS SQL source related entitlements/access profiles are provisioned to the identities.
Similarly, the more number of sources you need to provision the identities to, you can add those many entitlements/access profiles to this role under Manage Access tab.
Hi @kalyannambi2010 you mention that the AD access profile is requestable. Have you thought of creating a requestable role instead which contains the AD AP and any other APs, eg MSSQL, which are required too?
Hi @prashanthrns could you please more information on this ?
We need to create an access profile tied to AD groups and whenever the user request for an access profile is fulfilled automatically user will be provisioned to MSSQL source?
Hi @Arshad could you please more information on this ?
We need to create an access profile tied to AD groups and whenever the user request for an access profile is fulfilled automatically user will be provisioned to MSSQL source?
In this scenario, you would be creating requestable Access Profiles which are mapped to AD groups as underlying entitlements. Now once a user makes a manual request for this access profile, the access profile is assigned to the identity where the underlying AD groups are assigned on AD account.
Now, as per my solution above, you would be creating a membership criteria based role where the criteria is to check the entitlements on the identity (which were provisioned earlier with access profile request). And this role would check the entitlements on the identity (in this case, your AD groups) and once found, it would provision the MS SQL source based entitlements mapped in that role in a automated fashion.
If the user is provisioned to AD groups based on access profiles through request center then how the will be provisioned to MSSQL sources with some roles/entitlements if we do not add access profiles under role Define Assignment. Where can we add access profiles so that user will be provisioned to MSSQL sources with some roles/entitlements.
You need to setup a role with the above mentioned membership criteria. This role needs to have corresponding MS SQL related entitlement (or) access profiles mapped under “Define Assignment” page. Enable the role.
Now on a separate note, you would already have Access Profile mapped to AD groups.
Please understand that the role contains MS SQL access only and Access profile contains AD groups only. Both these are separate.
Now, you request access profiles containing AD groups through Request Center for an identity.
Identity gets assigned with the access profile and underlying AD groups in the access profiles are assigned on the AD account.
Once the identity is assigned with the requested access profile, the identity gets refresh automatically and during this refresh, ISC will identity that the identity satisfies the membership criteria of the new role containing MS SQL related access.
The role containing MS SQL access gets provisioned automatically.
The membership criteria that you would define in the role would make it an automatic role assignment. No manual intervention would be required.
This is how the flow would be. You don’t need to map the MS SQL related entitlements in your AD groups related access profile. Because you will be mapping them into a separate role that gets auto assigned based off the criteria.
In your case:
Access Profile would be mapped with AD groups
Role would be mapped with MS SQL entitlements along with a membership criteria.
Under “Manage Access” tab I have provided “MSSQL source entitlement/access profile”.
Under “Define Assignment” I have provided “AD source group”
Enabled the newly role “Sample”.
Click on “Apply Changes”.
getting below error.
[“Unable to process database user provisioning for user- null Reason: sailpoint.connector.ConnectorException: Provide valid database name.”,“Unable to process database user provisioning for user- null Reason: sailpoint.connector.ConnectorException: Provide valid database name.”]
Have you configured provisionining related configurations on your MS SQL source? The create provisioning policy, the JDBC provisioning rule etc. If not, then provisioning to your JDBC source wouldn’t work.
This happens when you JDBC source configurations are incomplete.
Here are some useful resources you can refer and validate your configs:
it is not JDBC connector type but of MSSQL connector and which rules we can use then for provisioning? I think we are not going to create any new accounts but associating based on the roles assignment?
We are using below OOTB for account creation.
$(firstname).$(lastname)$(uniqueCounter) for Create Unique Account ID
@kalyannambi2010 Can you confirm if the test connection on you MS SQL connector based source is successful and working? Additionally, also confirm if the full account aggregation is working on your MS SQL source and you’re seeing the accounts aggregated successfully?
Hi @Arshad test connection and full aggregation working fine. Observed looks like accounts are getting created but getting error like " Create Account Failed", " Add Entitlement Failed" and no roles/entitlements associated with the accounts.
[“Unable to process database user provisioning for user- null Reason: sailpoint.connector.ConnectorException: Provide valid database name.”,“Unable to process database user provisioning for user- null Reason: sailpoint.connector.ConnectorException: Provide valid database name.”]
With the error message, its mentioning that you have not specified the database name correctly in your configuration. Can you show how the Connection Setting > Database URL is configured on your MS SQL source?