We have a working source that supports direct provisioning. We want to turn this source into a read only source, for testing purposes (for example to do what-if analysis before a go-live).
So what we do is remove the ENABLE and PROVISIONING features from the source JSON.
We then create a role, which points to an entitlement from this source. We don’t assign any approvers to this role. We do allow access requests though
This should not occur. There is no approval flow, so no approval needed, so there can’t even be such a thing as a self-approval here. So it should directly create a manual task to the source owner, which is me (angelo_mekenkamp) in this case. In the same way how, when we had the features added, it immediately provisioned the access. Now the requests gets forwarded to a random IdentityNow admin.
This makes it more difficult for developers to test the source by temporarily blocking direct provisioning to the source. I believe similar behavior occurs to sources that actually do not support direct provisioning, not just sources where we deliberately removed the PROVISIONING feature flag.
I mentioned this to @jennifer_mitchell, who agreed with me that this behavior is wrong and asked me to submit a bug report for this.
In addition see the following configuration where we would even allow self-approval on roles that have approval steps defined. I don’t think this configuration should actually be relevant here, since we specifically have no approval flow on this role, but I still want to show it for completeness sake:
Hi @angelo_mekenkamp , we are also running into the same issue , did we get any fix on this. It would be great if you can share the inputs on the resolution.
Thanks
Narendra
@jennifer_mitchell is aware of this issue existing and asked me to communicate this issue to Support, which I did 24 days ago. SailPoint Support wasn’t able to reproduce the issue on their side and asked tenant access, and I have given them 2 weeks worth of tenant access 10 days ago. I have not heard anything from Support since then, nor have I received an internal ticket from SailPoint Support. SailPoint Support has assigned this issue as a P4 issue.
Since @bkumar592 is noticing the same issue as I and is also interested in the resolution, this might be a good argument or use case for you to use in the attempt to improve the process of reporting and handling of bugs?
Until then, do you advice @bkumar592 and others to submit a support ticket for the same issue as well? Or should they do something else instead?
I think it’s a good idea to open a support ticket for this. I don’t have the time right now to try and reproduce this, but at least support can take a look and help out.
FYI, I have been able to reproduce this and have shared the steps I used with support as well. Hopefully that will help them with clarity so the work can be considered and prioritized. (I don’t own this area, but I am doing what I can to help.)
We’re also experiencing the same “Self-approval reassigned” issue when no approval flow is set, it’s making access request testing very difficult