Aggregated entitlements lost on Identity Refresh
-
Aggregation starts at 18:00
-
Added Administrator entitlement from Netsuite 6 minutes later.
-
Added entitlement 1155 from Netsuite
-
Added Access Profile NetSuite 1493
-
Added entitlement 1493 from Netsuite
-
10 seconds goes by
-
Identity Refresh kicks off:
-
-
Status
-
PASSED
-
System
-
Modify Account Passed
-
2025-10-07 (06:08:58 pm GMT-04:00)
-
-
Additional Event Attributes
-
-
14642
-
Null
-
699740548cf94f3b89ead47ed00d224a
-
Netsuite
-
Identity Refresh
-
Netsuite
-
-
Removed entitlement 1155 from Netsuite
-
Removed entitlement 1493 from Netsuite
-
removed entitlement Administrator from Netsuite
-
Add Netsuite baseline role based on below criteria:
-
Removed access Profile 1493 (from netsuite)
-
10 seconds goes by
-
Identity refresh is triggered:
ModifyAccount Event
-
You are viewing event with id: 49eea3aba5245f17f1302808ba9dcd3da144e632d4eae52f70e340d7af8bb05e
-
Status
-
PASSED
-
Actor
-
System
-
Target
-
user account
-
Name
-
Modify Account Passed
-
Created
-
2025-10-07 (06:09:08 pm GMT-04:00)
-
-
Additional Event Attributes
-
accountName
-
14642
-
accountUuid
-
Null
-
appId
-
699740548cf94f3b89ead47ed00d224a
-
-
Removed Netsuite - baseline role
My thoughts:
From what I see on this account, giveaccess is false, so not sure why the role was evaluated to be added and then removed. I would assume it would have just not done the add for the role, unless the giveaccess has been changed since then. As the giveaccess is an account attribute I don’t know if there is a way to see when it was modified.
I also don’t know why source entitlements are not sticking. I’m not seeing anything in the connector documentation or the connector to enforce source entitlements.
Customer is needing the source to be authoritative on entitlements but also allow a certification revocation. There are minimal access profiles and roles. Majority of the entitlmenents being added are not associated to a profile or role.
