Is this question regarding a custom connector? If so, please share relevant details below.
No, this question is not regarding a custom connector.
Share all details related to your problem, including any error messages you may have received.
I have been able to create a safe and give permission to an existing account in CyberArk. But I have not been able to create an account in CyberArk. I need to be able to add an existing Active Directory account into CyberArk. If anyone has done this before I would really like to see the code.
I do have an example provisioning plan that was given during a Sailpoint meeting.
• Create the external Active Directory account inside CyberArk createExternalAccount: plan.
Sorry for not answering your question, but keep in mind IIQ8.1 is on limited support from SailPoint and the dropped support date s Feb 21, 2024.
(see IdentityIQ end of life dates)
@jhuggard your plan seems correct and is how I’ve done it in the past. Is this integration with the newer CyberArk Identity SaaS offering (Provision accounts with SCIM) or with the older standalone Java SCIM server (Marketplace)? The newer SaaS offering had a ton of issues when trying to integrate, I think this issue here with LDAP attributes being one of them. The older Java SCIM server was a lot less of a headache.
Yes we have the exact configurations.
I’m using the application name of our Active Directory in SailPoint as the “source”. Guessing that is incorrect?
Yes, that is incorrect. source needs to be set to the name of the LDAP source defined in CyberArk since the account you are creating in CyberArk needs to be linked against that LDAP source. Get that info from your CyberArk admin (if that isn’t you).
If those attributes are in your account schema (should be if they are not), you may be able to gather the source value from accounts already existing in that CyberArk environment that you have aggregated into IIQ which have been synced from the LDAP source in CyberArk.
Thanks. That was correct. I just forgot to un comment out the adding the AccountRequest to the plan. So the correct source is the LDAPDirectoryName in cyberArk or and existing account in SailPoint.