This is available in all tenants. Comment on this announcement if you have questions or concerns about it!
A new option on the Lifecycle State UI enables admins to remove inactive identities from:
• Identity Picklists in Request Center
• My Team UI for Managers
• Identity Processing
You’ll know this is available in your tenant when you see a configuration option for Identity State
on the Lifecycle State UI.
How do I implement the feature?
Watch this 25 minute video for a step-by-step implementation guide. Continue reading this post if you prefer text over video!
How do Identity States work?
Admins use the configuration option
Admins make a selection when creating new lifecycle states. Existing lifecycle states have the value set to null
as the default, but admins can update them at any time.
Identities receive an identity attribute
All identities receive an Identity State (identityState)
attribute. This attribute is non-configurable on the Mappings UI since it’s configured elsewhere.
An identity’s state typically reflects the value that has been configured for their assigned lifecycle state. If an identity’s assigned lifecycle state is null
OR their assigned lifecycle state hasn’t had its state configured, their Identity State
will be Active
.
Identity processing keeps attribute up-to-date
Identity processing updates an identity’s state when the identity changes lifecycle states, or when the configuration for the identity’s current lifecycle state is changed.
Identity Security Cloud uses attribute for filtering
Identity Security Cloud uses the attribute to filter inactive identities from its services.
How are the three states used?
Active
identities will be included in all services. Inactive (short-term)
will be excluded from some services. Inactive (long-term)
will be excluded from most services.
Our initial focus is in these areas. Future releases will focus on additional areas.
Area | Active | Inactive (short-term) | Inactive (long-term) |
---|---|---|---|
Identity Picklists in Request Center | Included | Excluded | Excluded |
My Team UI for Managers | Included | Excluded | Excluded |
Scheduled Processing | Included | Included | Excluded |
Apply Changes on Roles, Access Profiles, and Apps UIs | Included | Included | Excluded |
Apply Changes on Identity Profiles UI | Included | Included | Included |
Processing for Select Identities | Included | Included | Included |
Identity Attribution Promotion after Accounts Updated in Aggregations | Included | Included | Included |
How should I map my lifecycle states?
Active
Lifecycle States that represent identities who are joining or work for your organization should be mapped to Active
. Here are some prevalent lifecycle states we recommend mapping into this bucket:
- Pre-Hire
- Active
Inactive (short-term)
Lifecycle States that represent identities that are leaving or have a restricted relationship with your organization should be mapped to Inactive (short-term)
.
With regards to “leaving,” tenants can use two or more lifecycle states for multi-phase termination. For example, identities might move to Terminated
when first separated, and then moved to Deleted
when separated 90+ days.
With regards to “restricted relationship,” some regions or countries consider on-leave identities as active.
You shouldn’t feel compelled to use this state unless it’s relevant to your implementation.
Here are some prevalent lifecycle states we recommend mapping into this bucket:
- Leave of Absence
- Recent / Phase 1 Terminations
Inactive (long-term)
Lifecycle States that represent identities that have fully separated from your organization should be mapped to Inactive (long-term)
. Here are some prevalent lifecycle states we recommend mapping into this bucket:
- Inactive
- Final / Phase 2 Terminations
- Deleted
How do I apply my Identity State mappings?
Identity Security cloud will let you know that your changes need to be applied through identity processing after you’ve updated a lifecycle state’s Identity State
mapping, enabled it, or disabled it. Press Apply Changes
to update the Identity State
attribute for all identities.
More on Disabled Lifecycle States
A lifecycle state must be enabled for its Identity State
mapping to take effect.
What if I have identities that are not assigned to lifecycle states?
An identity’s Identity State
typically reflects the value that has been configured for their assigned lifecycle state. If an identity’s assigned lifecycle state is null
OR their assigned lifecycle state hasn’t had its Identity State
configured, their Identity State
will be Active
.
Submit details about your use case if you’ve got inactive identities who can’t be assigned a lifecycle state.
How do I see an identity’s state via the UI?
You’re able to see an identity’s state via the Identity Management UI.
How do I search for identities in each state?
Use these queries to search for all identities in each state:
attributes.identityState:ACTIVE
attributes.identityState:INACTIVE_SHORT_TERM
attributes.identityState:INACTIVE_LONG_TERM
How do I filter for identities in each state via the APIs?
GET /beta/identities?filters=identityState eq "ACTIVE"
GET /beta/identities?filters=identityState eq "INACTIVE_SHORT_TERM"
GET /beta/identities?filters=identityState eq "INACTIVE_LONG_TERM"
GET /v3/public-identities?filters=identityState eq "ACTIVE"
GET /v3/public-identities?filters=identityState eq "INACTIVE_SHORT_TERM"
GET /v3/public-identities?filters=identityState eq "INACTIVE_LONG_TERM"
How are inactive identities returned to active?
You will encounter identities who are re-hired after long separations. Identity Security Cloud will process an inactive when their authoritative or other accounts are updated. This processing could run joiner-mover-leaver transforms/rules to move inactives back into active lifecycle states.
How do I initiate identity processing for inactive identities?
If you encounter a scenario where Inactive (long-term)
identities are stuck in an inactive lifecycle state after being re-hired, update your joiner-mover-leaver configuration to prevent future occurrences. Then, initiate identity processing for the inactives.
If you encounter a scenario where Inactive (long-term)
identities are stuck in a role, update your role membership criteria to prevent future occurrences. Then, initiate identity processing for the inactives.
The Process Identity
button on the Identity List UI is a useful way to initiate identity processing for a handful of inactives. You could also use the process identities endpoint for up to 250 inactives.
How do I trigger a workflow when identity states change?
Identity State is an identity attribute. You could use the Identity Attribute Changed trigger to initiate a workflow when identity state values change.
What are the next priorities?
Here are the areas we intend to expand this feature in the future. Submit questions or feedback about your top priorities.
- Certifications
- Access Modeling
- Login Capability
- Removing Requestable Roles
- Elsewhere
Thank You
Thank you to the 320+ voters who showed your support for GOV-I-1864: Management of Inactive Identities, as well as all the admins who joined us for interviews!