EntraID connector - Standard Service Before Provisioning Rule not working

Hi All,

I have used Services Standard IdentityNow BeforeProvisioning Rule in EntraID connector type source to reset random password for users who LCS is changed to terminated. For this I’ve used below JSON snippet.

This connector type EntraID is not executing this provisioning rule. I’ve similar setup in AzureAD connector where its working as expected in Dev environment, Now tried replicate in Test environment with this EntraID connector type its not working as expected.

Whether I’m missing anything or this EntraID type connector won’t support this function? Can anyone guide us further?


 {
        "op": "add",
        "path": "/connectorAttributes/cloudServicesIDNSetup",
        "value": {
            "eventConfigurations": [
                {
                    "eventActions": [
                        {
                            "Action": "ScramblePassword",
                            "Attribute": "password",
                            "Value": null
                        }
                    ],
                    "Identity Attribute Triggers": [
                        {
                            "Attribute": "cloudLifecycleState",
                            "Value": "terminated",
                            "Operation": "eq"
                        }
                    ],
                    "Operation": "Disable"
                }
            ]
        }
    }

Regards,
Vasanth

@vasanthrajsp29 Did you added the EntraID source in provisioning tab for LCS change? If no please add there and try this.

HTP.

Hi @Shantha, Thanks for response
Yes, I’ve added in Identity Profile under provisioning tab to disable Source EntraID when LCS change to terminated.

Can you remove the Identity trigger from the event config and check the behavior.

Hi @Shantha,

Yes tried, No luck.

Hi @vasanthrajsp29,

Assuming you are yet exploring solutions, maybe it would be easier to troubleshoot if you share the /connectorAttributes path of the affected source.

1 Like

Your configuration aligns to what is documented as far as I can tell. Do you happen to have “password” attribute added to your update account profile/update provisioning policy? Give that a try if you see fit.

1 Like

Hi @TheOneAMSheriff ,

Thanks for checking, I’ve added the password attribute in Create account Profile but no luck. I’ve raised support case to investigate on this issue.

Regards,
Vasanth

1 Like

Why not write a transform in the UPDATE profile for the password attribute so that when the LCS = terminated, the attribute is updated. Something like this:

{
  "name": "Update Account",
  "description": null,
  "usageType": "UPDATE",
  "fields": [
    {
      "name": "ScramblePassword",
      "transform": {
        "type": "static",
        "attributes": {
          "value": "#if($LCS = 'Terminated' )$newPassword#{else}#end",
          "newPassword": {
            "type": "randomNumeric",
            "attributes": {
              "length": 32
            }
          },
          "LCS": {
            "type": "reference",
            "attributes": {
              "id": "LCS"
            },
            "ignoreErrors": false
          }
        }
      },
      "attributes": {},
      "isRequired": false,
      "type": "string",
      "isMultiValued": false
    }
  ]
}

No need for a rule then

3 Likes

Hi @phil_awlings,

Thanks, its good option to eliminate rule, I’ve one query does this transform will incorporate password policy.

Regards,
Vasanth

Hi,
You can set the password to whatever your policy requirements are by amending the transform accordingly. The above was just an example

1 Like

Hi @phil_awlings,

Thanks for the workaround, I raised vendor case to trouble shoot why provisioning rule is not working for entra ID saas connector.

Regards,
Vasanth

Hi @phil_awlings,

This workaround is not working in SaaS connector even it’s working in on-prem Azure AD connector.

Have anyone tried disable or Modify provisioning policy transform in SaaS connector?

-Vasanth

I don’t think that Before Provisioning Rules can be used with SaaS connectors. You would need a VA based connector.

SaaS connectors in general support connectivity customizers (There have been some reports that some delivered SaaS connectors do not seem to fire the customizers like custom SaaS connectors based on log files)

Connectivity Customizers | SailPoint Developer Community

Hi @agutschow,

In that case I used a work around by writing a transform in disable provisioning policy even that is not getting impact in SaaS connector.

I’ve a doubt in this case before provisioning rule is not getting impact that’s fine but disable provisioning policy is not working which is quite strange behaviour from connector level.

  • Vasanth