hi are you trying to automatically assign access profiles when the user has certain job codes. If this is your use case then you have to create assignment based roles by using standard criteria mapping to assign multiple access profiles.
Or is the use case this?
The user already has multiple job codes from target application and there are access profiles in your tenant with the job codes mapped. You are not able to see all the access profiles. Validate in your source account schema if you have made the jobcode attribute as multivalued and entitlement with the type mapped to correct entitlement type.
If the use case is completely different from above two can you provide more details.
If the attribute is coming from your Auth source you need not make it as multi valued. You can have it as string. Now in your assignment criteria you have to use Operation as “Contains” and give the JobTitleName something like this. You can add more or conditions
ents coming from auth source? I don’t think this is a good practice having entitlement access management upon auth source. I suggest you do not go auth source with ents.
Might be you want to grant access on job codes I guess.
How you are assigning the AP , via Role assignment criteria ? Did you check if the contain operator would be able to help this?
I would suggest create a sailpoint ticket . Sailpoint can check internally if this is not supported , if not then this is bug and sailpoint will enhance assignment crertia to support this.
Hi @amulpuru - A role should ideally be sufficient for this requirement.
In the assignment criteria, use type account attribute and not identity attribute (to avoid complications with refresh order, as you are dealing with an authoritative source. Sometimes, there are unintended results when using identity attributes in such scenarios).
If the jobCode contains jobcode1, assign role 1. If jobCode is jobcode2, create another role and assign role 2 and so on.
In the access to provision, tag your intended access profiles (if need be, skip them and directly use entitlements in roles).