I’m currently working on an After Operation Rule in ISC and I’m using PowerShell via IQService.
My requirement is to retrieve a specific identity attribute (e.g., email, lastname, or a custom attribute like calculatedPrimaryEmailDomain) inside the PowerShell script.
However, I’m unable to access the identity attribute from the PowerShell side, even though the attribute is available in the Identity Profile and visible in the UI.
What I’ve tried:
• Using Get-AttributeValueFromAccountRequest function inside PowerShell
• Attempting to log $AccountRequest and $Plan objects for debugging
My questions:
What are the reliable ways to pass identity attributes to PowerShell via IQService in an After Operation Rule?
Is there a SailPoint-recommended method to reference identity attributes from within PowerShell scripts used in rules?
Hi @saikumarS - connector rule doesn’t have access to identity data. To pass identity data during account creation, you must first map the identity attribute to an account attribute. This is done by configuring a Create Account policy , which allows the identity attribute to be passed through the provisioning process.
hi, as Sahil mentioned you cannot call the specified functions to get an identity attribute. You need to think of sending identity attributes in your AccountRequest. This depends on the operation you are going to perform.
For Create Account: As Sahil mentioned you can add them in Create Account profile.
For Modify/Enable/Disable: As per SailPoint you need to use a Before Provisioning Rule to send identity attribute. A sample logic would start from the plan
There is no way you can access the Identity Attributes directly from CONNECTOR RULE. CONNECTOR RULES do not have access to IDENTITY ATTRIBUTES at all but it can access the attributes which is passed to it through “PROVISIONING PLAN”. Hence, you can say it can access the account attributes that are present in provisioning plan.
Therefore, if you want to get any identity attribute into your AFTER CONNECTOR RULE for any kind of manipulations, then, there are following ways to bring it.
APPROACH 1
Create an attribute in the CREATE ACCOUNT PROFILE of the source.
Map it to respective identity attribute
If you don’t want this attribute to be passed in the ACTIVE DIRECTORY, then, you can exclude that account attribute from provisioning by adding below JSON in the source.
Manipulate the attributes in the before provisioning cloud rule as CLOUD RULE Has access to identity attribute object
If you don’t want this attribute to be passed in the ACTIVE DIRECTORY, then, you can exclude that account attribute from provisioning by adding below JSON in the source.
By excluding the account attribute, your after connector rule will receive the attribute through provisioning plan which you can use for further dynamic manipulations but it wont be sending that attribute to AD domain controller for provisioning.
Using APPROACH 1 will be better as you don’t have to include SAILPOINT to deploy the CLOUD RULE and control of execution for that attribute will be with you.