Entitlement import not create entitlement in Active Directory

Which IIQ version are you inquiring about?

8.4

Please share any images or screenshots, if relevant.

Hi Experts,

I am trying to create entitlements in Active Directory in bulk using the “Import” feature available in the “Entitlement Catalog.” However, I noticed that while the entitlements appear as imported in the SailPoint portal, they are not created in Active Directory. I would like to confirm whether this is a supported feature.

# type, application, attribute, value, displayName, iiqElevatedAccess, owner, requestable, classifications, unixEnabled, isRequestableFromWebService, mailEnabled, approvalType, firstApproverWorkgroup, secondApproverWorkgroup, worker, isSystemAdminAccess,entitlementBadgeType, accessReviewInterval, additionalAttributeChange, additionalKeywords, genericOrSystemAccount
group,AD,memberOf,"CN=BatchRequestEntitlementTest3,CN=Builtin,DC=xxxdemo,DC=info",BatchRequestEntitlementTest3,FALSE,Owner-11,TRUE,,,,,,,,,,,,,,
group,AD,memberOf,"CN=BatchRequestEntitlementTest4,CN=Builtin,DC=xxxdemo,DC=info",BatchRequestEntitlementTest4,FALSE,Owner-11,TRUE,,,,,,,,,,,,,,

Hi @Bernardc Can you try to create entitlement through Entitlement Catalog UI with the value ‘CN=BatchRequestEntitlementTest4,CN=Builtin,DC=xxxdemo,DC=info’ ? See if you encounter any error. Perhaps Builtin would be OU instead of CN, but it varies based on your container.
Also, In my view - Group DN and sAMAccountname is mandatory attributes. But you can validate this when you try to create entitlement through UI.

Hi @Arpitha1 ,

Create single entitlement using “Add New Entitlement” button is fine (using same value as in previous csv), it provisioned to the AD.

OOTB AD Group Provisioning Form, Group DN and sAMAccountName is mandatory. have you updated those while creating new entitlement ?

Hi @Arpitha1 ,

Does this mean that I should add these two attributes to the CSV file header and provide the respective values if using import feature?

Yes, with columns distinguishedName and sAMAccountName respectively. (distinguishedName represents Group DN)

Hi @Arpitha1 ,

Unfortunately, it shows error below error if add sAMAccountName or distinguishdName in the header of the csv file.

# type, application, attribute,sAMAccountName , value, displayName, iiqElevatedAccess, owner, requestable, classifications, unixEnabled, isRequestableFromWebService, mailEnabled, approvalType, firstApproverWorkgroup, secondApproverWorkgroup, worker, isSystemAdminAccess, entitlementBadgeType, accessReviewInterval, additionalAttributeChange, additionalKeywords, genericOrSystemAccount
group,AD,memberOf,BatchRequestEntitlementTest4,"CN=BatchRequestEntitlementTest4,CN=Builtin,DC=xxxdemo,DC=info",BatchRequestEntitlementTest4,FALSE,Owner-11,TRUE,,FALSE,FALSE,FALSE,Defined Approvers,,,TRUE,FALSE,All,None,,,FALSE
group,AD,memberOf,BatchRequestEntitlementTest6,"CN=BatchRequestEntitlementTest6,CN=Builtin,DC=xxxdemo,DC=info",BatchRequestEntitlementTest6,FALSE,Owner-11,TRUE,,FALSE,FALSE,FALSE,Defined Approvers,,,TRUE,FALSE,Blue Badge,None,,,FALSE

Hi @Bernardc

I apologize for the confusion. I attempted to replicate this issue on my local setup, and it appears that the entitlement has not been created at the target.

Additionally, distinguishedName and sAMAccountName are not required, as they are identity attribute and display attribute of the Group Object.

I will investigate further to resolve this issue and will inform you if I find a solution.

Hi @Arpitha1 ,

Much apricated it!!!

@Bernardc ,

What is the name of the Active Directory application defined in IIQ?
Is it “AD” as in your data file?

I have similar use case. I want to build a custom quicklink and form to create AD groups. Does anyone know how to create a quicklink/form for creating entitlements?

Hi @Jose_Perez ,

The application name is corrected.

Did correcting name fixed it?

Hi @Jose_Perez ,

Unfortunately, nope…

Hi @Arpitha1 ,

Do you have any updates on your end?

Hey @Bernardc unfortunately, I don’t have an answer at the moment. I encountered a similar use case and reviewed the connector code. It seems that Entitlements are being updated directly within SailPoint, but I’m unsure if this will reflect on the target system. I’ve already raised a case with the SailPoint team, and I’ll keep you updated if I receive any confirmation on this.

Hi @Bernardc SailPoint team has confirmed that, it’s a product bug and they created ETN IIQETN-12189

1 Like

Thanks a lot, @Arpitha1 for communicating with us, it’s a product bug and Sailpoint released an ETN :), appreciated!

1 Like

Hi @MuhammadMustafa ,

Do you have that particular release’s link? Much appriciated.

Hi @Bernardc, unfortunately no, I don’t have it, but maybe @Arpitha1 can help here, or you can reach-out to the support directly to send that to you.

Have a nice and great one!

Regards,
Muhammad