Reset password for disabled AD account

Hi All,

Looking for some recommendation on below use case.

Background:
We have a LCS disabling AD account for users who didn’t logged in for long, this is set using pwdLastSet on AD account for the user.
LCS flow: ‘Active’ (AD enabled)–> ‘LPS98’ (AD disabled)
We use password sync group and now when this user changes the password the AD OOTB connector sets the pwdLastSet value as ‘false’ and doesn’t aggregate the latest value for pwdLastSet on AD account. AD account doesn’t get enabled ,needs another (single account) aggregation until AD account which helps perform identity refresh and eventually moving user to active LCS. This is causing users to be in disabled state even after changing password.
LCS Flow:
‘LPS98’ (AD disabled)–>Change password → AD aggregate → ‘Active’ (AD enabled)

Current workaround:
We created a workflow which queries successful password change for users in that LCS and performs single account aggregation on AD account, using scheduled trigger.

Want to know is there any better solution to address this issue using provisioning policy or workflow with specific trigger or any other way?

Seems like a common use case where user is changing password for AD account which is disabled should enable the account and bring back the pwdLastSet value.

Hi @ssaptashwa ,

So “Active” LCS is determined based on both userstatus from HR feed and pwdlastset??

When you say this, how the query knows who changed the password? how is that data coming to SailPoint? Is that via full aggregation?

Yes, Active LCS is based on the userStatus from HR feed.

Using below Search query to check account activity:
“Password Change” AND status:complete AND (sources:“AD”) AND modified:[now-30m TO now]

Currently, AD aggregation is scheduled daily to bring in the data to SailPoint.

@ssaptashwa why how are you handling the lcs is it via a rule or transform or direct mapping.

@schattopadhy Hi, we use transform for LCS handling. We use status from HR feed to make the user active. We are checking pwdLastSet account attribute in transform, if greater than certain days then move to LCS,

Not sure why full aggregation is not able to read the pwdlastset value, but single account aggregation does.

Full aggregation able to bring in the pwdLastSet value. We are facing issue getting the same while single account aggregation after change password call (where AD OOTB connector sets this value as false)

This topic was automatically closed 60 days after the last reply. New replies are no longer allowed.