Hi @RitikaK ,
This endpoint only deletes the account from IdentityNow, not the source itself, which can result in the account’s returning with the next aggregation between the source and IdentityNow.
Delete source account is not possible for direct connected sources. You need to use a Before provisioning rule to change the provisioning plan to delete operation (if the source supports delete operation).
You can disable the accounts during lifecycle state change and then you can capture the event in the before provisioning rule and change the action to delete.
You can refer SailPoint Standard Service Rule which is of great use for AD connectors to get an insight to this.
Hi! Remember that ISC does not deletes accounts from sources (and is discouraged). Problem is that even if you get to delete some account, it will appear again on identity after aggregation.
Some workaround could be that after these 10 days, you change some identity attribute (perhaps with a transform), and that triggers some provisioning of that attribute to endpoint account. Finally (not available to all connectors), you can filter aggregated accounts only to read accounts not having this flag.
As an example, talking about AD, you can have a transform that after 10 days changes the DN. This will cause AD account to move to some X OU, which is not under connector base DN. This will cause aggregation will not bring this account next time, and will dissapear from your identity accounts.
I think you have to analyze each source, because connectors have different capabilities.