We’ve got ourselves into an interesting issue. Had an incident where a Role’s assignment criteria go mixed up which ended up creating many Google accounts for disabled identities. This was a human error and was corrected in 10 minutes. Our Google admin has removed super admin from our service account. In our environment we are not creating Google accounts. We only aggregate accounts and groups and provision users to Groups only. We’ve limited the Google Source Feature string to remove Provisioning so we don’t create accounts anymore but that is not enough for our Google admin. So we are trying to modify our config for our Google source to work without Super Admin. So, we removed the Role entitlement type and tried to delete the Role account attribute from the account schema but get a message:
Trace ID: 03a3dcd580854fed877454192ed10bdd
Details:
Unable to delete attribute "Roles" because it is referenced by "attribute sync configuration".
Referenced by internal schema property "Roles". Contact SailPoint.
Referenced by internal managed attribute "_USER_MANAGEMENT_ADMIN_ROLE". Contact SailPoint.
Referenced by internal managed attribute "Frontline IT Revised". Contact SailPoint.
Referenced by internal managed attribute "_GROUPS_READER_ROLE". Contact SailPoint.
Referenced by internal managed attribute "_GROUPS_ADMIN_ROLE". Contact SailPoint.
Referenced by internal managed attribute "_STORAGE_ADMIN_ROLE". Contact SailPoint.
Referenced by internal managed attribute "_PLAY_FOR_WORK_ADMIN_ROLE". Contact SailPoint.
Referenced by internal managed attribute "_SEED_ADMIN_ROLE". Contact SailPoint.
Referenced by internal managed attribute "_GROUPS_EDITOR_ROLE". Contact SailPoint.
Referenced by internal managed attribute "kconley-test". Contact SailPoint.
Referenced by internal managed attribute "_SERVICE_ADMIN_ROLE". Contact SailPoint.
Referenced by internal managed attribute "_HELP_DESK_ADMIN_ROLE". Contact SailPoint.
Do we literally need to open a Sailpoint ticket or is there another way we can remove these entitlements? We cannot complete an aggregation since we don’t have rights to roleAssignments in google api.
Any suggestions?
The only dreadful one we have is to create a new Google connector and setup from the start without the entitlement types for Roles and just leave Group. Then update all our Access Profiles with the new Source’s group entitlements.