Customization Rule — Configure a Customization Rule on the AD application schema. In the rule, inspect the distinguishedName attribute: if it contains OU=Services, set the type attribute to "Service Account". This runs during aggregation on every account and is the cleanest, most direct mechanism for this use case.
Then I’ve added it as a source mapping in Identity Attribue “type”
I get the attribute in the objects after aggregation but the type still not filled in the identity object and I have these warnings in the logs during aggregation :
WARN QuartzScheduler_Worker-3 sailpoint.api.Identitizer:4161 - Identity type value [Service Account] not found in IdentityConfig. Skipping setting of the attribute.
@alimd Try doing a source mapping in existing Type attribute and you can write a global rule. It’ll be applicable for all the types and you need to make sure, service accounts and user accounts are there on separate identities. In case due to some correlation failure, if they are merged, then you may not see the right type attribute set on the identities.