Entitlement Aggregation: Can we view how an Entitlement entered the system? (Entitlement Agg, Account Agg, Manual/Bulk, etc)

When reviewing the entitlements on a source, I am seeing that the numbers of entitlements on the source is 1.5x the number of entitlements returned by the Entitlement Aggregation. I would like to put together a list of the entitlements that are coming from other avenues than the Entitlement Aggregation, but I do not see any attributes that denote how the entitlement was found, nor can I seem to extract a list of the entitlements that came in the aggregation.

Is there a way to get this information?

The only workaround I can think of would be to do an Entitlement Reset, then do the Entitlement Aggregation, export the entitlements, then do the Account Aggregation and bulk upload (If any. none in our case). This has a lot of downsides to it since we have to re-setup all the roles and access profiles after too.

Related Idea: Delete individual entitlements: https://ideas.sailpoint.com/ideas/GOV-I-2068

I recently saw something similar. We had a source where the initial aggregation was run prior to the entitlement aggregation. We noticed that the number of entitlements was too small so we ran an entitlement aggregation. When we were done, we had more than the number of entitlements generated. It was like the ones that were collected from the account aggregation did not align with the ones picked up from the entitlement aggregation. We ended up resetting the entitlements and the accounts and then redoing the aggregation entitlements first and then accounts.

I don’t have that source again that I can use. However, I did have an AD source. For the entitlements that were gathered through aggregation, we don’t have any attribute data just {}:

image

However, when I did entitlement aggregation, another attribute had that section filled in;

You might see if you see something similar. I think the problem will be though even if you identity them what do you do next since a reset would create a lot of work.

  1. There is no attribute for how the entitlement was created
  2. There is no option to remove/delete the entitlement in IDN unlike in IIQ
  3. Not having deletion make sense as, If you upload the entitlements through a File and if you remove any entitlements in next upload, the same entitlements will be deleted.
  4. Similarly entitlements should be deleted at source side (just like deletion in file which is the source here)
  5. Since we cannot create Entitlements at IDN unlike in IIQ, there is no need of deletion

However I agree with you that If there is a way to delete entitlements then you don’t need source reset which will prevent the removal of entitlements in Roles/AccessProfiles.

As a best practice, check the data before you create any access, do the resets or entire source deletion as many times as you want before continuing to the next step which is Access Model.

Thanks
Krish

I was noticing this as well, that when they came from the Aggregation, they would have the additional attributes (if configured) and when they came from the Account Aggregation, they did not. This might be the easiest way to check is to see if they have an attribute set from the Entitlement Aggregation, but it is not fool-proof.

Yeah, in this case, I jsut wanted to remove specific entitlements that were incorrect. We ended up having to go through support to have them fix 3 entitlements, so this process likely would not have resolved them anyways.

I agree that this is a best practice when configuring new sources, however it is not always possible in the real world. In this case, the source and access was already existing, and we identified that the original configuration was too broad and pulled in additional values that were not needed for the system. This is a good point to make for others though who might find this post.

1 Like

This topic was automatically closed 60 days after the last reply. New replies are no longer allowed.