We have enabled the provisioning of certain Active Directory groups to users through SailPoint IIQ. However, we have observed that some users are being added to Active Directory groups outside the SailPoint provisioning process. Could we identify these users whose Active Directory group memberships were assigned externally to SailPoint during the account aggregation process?
You can enable the Native Change Detection option in the Active Directory application to identify users whose Active Directory group was added outside of SailPoint.
You can also look at the IdentityEntitlement table and get more information around the state and source of that entitlement assignment to the account. I’m thinking there is an attribute called ‘isAssigned’ or similar that might help figure out which of these went through SailPoint vs. native change
Not yet, we are exploring the possible solutions to identity group membership assignment external to SailPoint. We will explore native change detection option.
@nailwalnavistar
If you don’t have NCD it is tough to identify. we cannot rely on the source column of spt_identity_entitlement table
Couple of approaches you have is if at all you are looking for a recent groups added in AD and you are retaining provisioning transactions in Sailpoint you can check against those transactions if group is provisioned via Sailpoint
But once you enable native change detection, this should be simple to identify the rogue memberships added outside SailPoint.
For these kinds of situations, it is preferable to enable native change detection at the application level.
OOTB gives you many options for managing native changes.
For instance, When a native change is implemented, SailPoint can be configured to request approval (for example manager), and depending on the decision, it can either keep the users in the group or remove them from the assigned groups.