ISC Wrong "self-approval" message and work reassignment when provisioning through task creation

Hi all, :slight_smile:

We have a working source that supports direct provisioning. We want to turn this source into a read only source, for testing purposes (for example to do what-if analysis before a go-live).

So what we do is remove the ENABLE and PROVISIONING features from the source JSON.

We then create a role, which points to an entitlement from this source. We don’t assign any approvers to this role. We do allow access requests though


We then request this role for ourselves. We check the status and see the following:

This should not occur. There is no approval flow, so no approval needed, so there can’t even be such a thing as a self-approval here. So it should directly create a manual task to the source owner, which is me (angelo_mekenkamp) in this case. In the same way how, when we had the features added, it immediately provisioned the access. Now the requests gets forwarded to a random IdentityNow admin.

This makes it more difficult for developers to test the source by temporarily blocking direct provisioning to the source. I believe similar behavior occurs to sources that actually do not support direct provisioning, not just sources where we deliberately removed the PROVISIONING feature flag.

I mentioned this to @jennifer_mitchell, who agreed with me that this behavior is wrong and asked me to submit a bug report for this.

In addition see the following configuration where we would even allow self-approval on roles that have approval steps defined. I don’t think this configuration should actually be relevant here, since we specifically have no approval flow on this role, but I still want to show it for completeness sake:

Kind regards,
Angelo

1 Like

Hi @angelo_mekenkamp , we are also running into the same issue , did we get any fix on this. It would be great if you can share the inputs on the resolution.
Thanks
Narendra

1 Like

Hi @colin_mckibben,

@jennifer_mitchell is aware of this issue existing and asked me to communicate this issue to Support, which I did 24 days ago. SailPoint Support wasn’t able to reproduce the issue on their side and asked tenant access, and I have given them 2 weeks worth of tenant access 10 days ago. I have not heard anything from Support since then, nor have I received an internal ticket from SailPoint Support. SailPoint Support has assigned this issue as a P4 issue.

Since @bkumar592 is noticing the same issue as I and is also interested in the resolution, this might be a good argument or use case for you to use in the attempt to improve the process of reporting and handling of bugs?

Until then, do you advice @bkumar592 and others to submit a support ticket for the same issue as well? Or should they do something else instead?

Kind regards,
Angelo

I think it’s a good idea to open a support ticket for this. I don’t have the time right now to try and reproduce this, but at least support can take a look and help out.

1 Like

FYI, I have been able to reproduce this and have shared the steps I used with support as well. Hopefully that will help them with clarity so the work can be considered and prioritized. (I don’t own this area, but I am doing what I can to help.)

2 Likes

Update from SailPoint Support: (CS0285986)

Note that this issue has been reported by me roughy 8 months ago.

We are facing the same issue at the moment:

1 Like

We’re also experiencing the same “Self-approval reassigned” issue when no approval flow is set, it’s making access request testing very difficult

1 Like

Please see the updates from SailPoint Support on this issue below:

To see the screenshot clearly, open it, right click and open image in new tab. Then click on the image to enlarge it. That worked for me.

Kind regards,
Angelo