How to Filter Out Domain Users Entitlements on Remove All Access

Hi,

I’m running into an issue when enabling “Remove All Access” on the Inactive lifecycle state for Active Directory sources.

I receive the following error related to Domain Users:

["Failed to update attribute memberOf Error occurred while setting group membership CN\u003dDomain Users,CN\u003dUsers,DC\u003dDomain,DC\u003dcom. The server is unwilling to process the request. The server is unwilling to process the request. 0000055E: SvcErr: DSID-031A126A, problem 5003 (WILL_NOT_PERFORM), data 0 0000055E: SvcErr: DSID-031A126A, problem 5003 (WILL_NOT_PERFORM), data 0 . HRESULT:[0x80072035]"]

I understand, this is happening because Domain Users is the primary/default group in AD and cannot be removed like a normal group membership.

After reviewing other posts, I believe the correct approach is to modify the plan using a Cloud Before Provisioning Rule to exclude “Domain Users” from any memberOf removal operations triggered by “Remove All Access.”

My Questions:

  1. Is using a Cloud Before Provisioning Rule the best practice for handling this scenario?

  2. Does anyone have a sample code snippet that filters out “Domain Users” from the memberOf removal list?

  3. Is there a cleaner approach within SailPoint (IdentityNow / ISC) configuration to prevent this group from being targeted during Remove All Access?

Any guidance or examples would be greatly appreciated.

Thanks

I don’t think this setting is trying to remove the Domain users membership from the user. Have you looked at other settings that might be trying to remove this group? May be this is included in a BR role that the user is losing due to LCS change which is triggering the removal process?

I only see this error when I turn on the “Remove all Access” setting. We do have the Services Standard Before Provisioning Rule on our AD sources. That is what we were using to remove entitlements before the new feature became available. I removed the old logic from the source and am only removing entitlements through the lifecycle state on the identity profile.

Do you have this feature enabled and you don’t get these errors?

Do you mean one of my BR roles has the domain users entitlement added to it?

Hello,
Unfortunately there’s no way to apply filters!What you can do is filter Domain User group to not be aggregated!

The “workaround” for this is to add the access you wish to keep in the access profile section of the lifecycle state

2 Likes

Yes, I have used this few times and do not remember seeing the error you mentioned.

Yes, this is what I meant

1 Like

Since @iamnithesh suggested this fix, can you please credit him with the solution?

1 Like