Key areas to validate in this scenario:
i. Verify in the Lifecycle Management tab whether the assigned access item includes the required entitlement.
ii. Ensure that the RBAC configuration contains the necessary entitlement.
iii. Confirm that provisioning is enabled for the source.
So account creation is driven by entitlement assignment rather than the lifecycle event itself. I’ll check if the entitlement from the AD source is actually getting assigned as expected.
Thanks for sharing these points, this really helps.
I’ll go through the Lifecycle Management tab and verify if the required entitlement is part of the assigned access. Also will double-check the RBAC configuration and whether provisioning is enabled for the source.
The point about the Create Account profile and attribute mappings is also helpful — I’ll review that as well.
Technically you could add an access profile to the LCS which contains the entitlement to allow provisioning of accounts, but I prefer to do it via Roles
Adding an access profile to the LCS could work, but using roles feels cleaner and more structured, especially from a design and governance perspective.
I guess it also helps keep things consistent across users instead of handling it at the lifecycle level.