I have an inactive LifeCycle State that disable the sources accounts including active directory when the user is terminated from the authoritative source.
Now, I need to delete the AD accounts after 30 days of being disabled. Is there any out of the box implementation for this requirement?
Have an extended attribute or description that can be used to detect a user is just disabled or ready to be deleted.
For example, description. You can update it as disabled by IdentityNow after end date.
After end date + 30 days, you can update the description to delete
Enable attribute sync for description attribute.
In your Before Provisioning Rule, check description attribute in account request. If it has delete then change your account request to delete operation.
2. Schedule script in IQ Service
You can pull users whose end date was 30 days back
Delete AD account using Remove-ADUser command.
But the problem with this approach is, if user has any AD related manual requested AccessProfiles/Roles, AD account will be created again. You should go for certification campaign to remove all the access of user after end date.