Once a cloud rule has been deployed to a tenant, it can be exported with the vscode extension or the API and updated into a different tenant. You can do this with any rule that has been vetted by SailPoint and has been deployed by SailPoint.
My recommendation would be to have SailPoint deploy it to the customer environment. 1) if they implement it into a production environment then the disclaimer of it only being used for a mock project seems to be null and void as SailPoint deployed it. 2) The version I have might be different from what SailPoint is currently deploying. Asking SailPoint to deploy it will allow you to have the most updated version.
Once it is deployed you can export it and review the rule logic for personal understanding and even to write your own rule. When you choose to deploy it to a different tenant, such as a devrel, partner tenant, etc; you can then do a comparison of the source it is being used by.
On the source you are using the rule, you will need to update it to reference the rule:
"accountCorrelationRule": null,
"managerCorrelationMapping": null,
"managerCorrelationRule": {
"type": "RULE",
"id": "f58c1c57af7e45efa5c669fcbefd5f38",
"name": "Cloud Correlate Manager by AccountId"
},
> ***"beforeProvisioningRule": {***
> *** "type": "RULE",***
> *** "id": "35be5905dbcd47ec81c9e174b49a64a9",***
> *** "name": "Services Standard IdentityNow BeforeProvisioning Rule"***
> *** },***
"schemas": [
{
"type": "CONNECTOR_SCHEMA",
"id": "894a9fc01b8948458fc38bea6dcb9457",
"name": "account"
},
Under the connector attributes on the source you will need to add the parameters / logic for the rule for that connector. Below is a sample, not a default config or intended for customers.
"cloudServicesIDNSetup": {
"eventConfigurations": [
{
"eventActions": [
{
"Action": "ThrowError",
"Attribute": null,
"Value": "Identity is not Ready. Stopping provisioning."
}
],
"Identity Attribute Triggers": [
{
"Attribute": "samaccountname",
"Value": "None",
"Operation": "eq"
}
],
"Operation": "Create"
},
{
"eventActions": [
{
"Action": "ChangeOperation",
"Attribute": null,
"Value": "Delete"
}
],
"Account Attribute Update Triggers": [
{
"Attribute": "extensionAttribute1",
"Value": "termDeleted",
"Operation": "eq"
}
],
"Operation": "Modify"
}
]
},
You would also need to add this to the connector attributes section:
"beforeProvisioningRule": "Services Standard IdentityNow BeforeProvisioning Rule",