We are using search to get all available existing entitlements for OOTB IdentityNow source. What I am seeing is not all user levels are visible under search for this source.
We want to make Access request admin and read only admin available for user request. To do that we need them coming from group aggregation.
Hack: I can assign user level to any identity and get them from account aggregation but it would be ideal to get these from group aggregation. We are currently using this option.
The problem is more of search query result then on how to manage identitynow roles. I know all of these solutions but I cannot use any of these if search query itself is not getting right results.
I also know how to temporarily resolve my issue as I have mentioned in hack.
In fact Colab source is only managing those 10 entitlements and if you have any other access like AIC reader, Config hub admin, etc it would not manage those.
What is the goal you are trying to accomplish? Do you just want to ‘see’ the user levels or do you also want to know which user levels are assigned to your users?
The goal is to get all user levels in our current webservice loopback source under group aggregation which can only be solved by Sailpoint as it seems.
Not sure why are you getting only 10 results. I created a source in my demo tenant and I can see 22 of them. Also, the attribute type is shown as “UserLevels” in my tenant
Because you are querying the source which you have created. It is not OOTB identitynow source which I am searching against.
You got those entitlements as part of account aggregation and not group aggregation.
Last time I tested there should not be any difference of using entitlement in provisioning if it’s coming from account or group aggregation but it’s just helpful if they are coming from both.