Thank you for your response @gsanr, I reread that documentation and see you are right in that the scope of the refreshes does not include the cases you mentioned.
@kirby_fitch, believing you are still working on the behavior of the scheduled refreshes. Could you please read the concerns of @gsanr here?
I do understand the need of SailPoint to prevent unnecessary refreshes and computations. This to save energy costs, which will be better financially and environmentally. And I do support this fully.
However, it seems that the amount of refreshes has been reduced so much, that it has a bad impact on the behavior of ISC, that it now requires continuous executing of manual steps.
If customers notice that an expected refresh (triggering things such as provisioning retries, correlation attempt retries, provisioning back access that was removed from directly from the target application) is not occurring, I think that workaround are being looked for to trigger the refresh, such as creating an identity attribute with a transform that outputs the current day, to guarantee that each day all identities have different identity attributes, or trying to schedule unoptimized account aggregation in some way, to ensure that a proper refresh occurs.
Downside of these workarounds is that we are back at square one: “Too many unneeded refreshes occurring.”
Could you please take a look here, to see if if for each different use case there is a suitable solution to ensure we would need to build these workaround for enforcing a refresh on all identities?
I can think of some use cases here, other cases exist as well:
1: Provisioning fails to a newly requested role, where this application was the only part of the role.
2: Provisioning fails to a newly requested role, where this role contained multiple sources, for which provisioning did succeed.
3: An account is uncorrelated, after which an identity is being created, will correlation occur within a respectable time-frame?
4: Access is directly removed in the target application. unoptimized (Single) account aggregation detects this. Will access be re-provisioned?
5: Attribute sync fails. Will it be retried?
6: Any hiccup on SailPoints side (mentioned in status.sailpoint.com) results in an action not being performed, will it be retried?
I wonder what your advice would be here @kirby_fitch.
Kind regards,
Angelo