IdentityNow has a direct connector available to integrate with Workiva. While the integration is achievable, I have noticed a few issues, I wanted some suggestions from the community.
Workiva has different workspaces, and each workspace has got different entitlements. For a user to be assigned a Workiva entitlement, he should already be a part of the workspace. This is a known limitation from Workiva.
" When using SCIM groups to add a user to a workspace role or workspace group, the user being added must already be a member in the workspace (see Step 5: Manage user roles and groups for more details). If they’re not already a member in the workspace, our system will hold for up to 30 seconds before failing while we wait for your identity provider to request the user be added to the workspace. If they’re added before time runs out, this action will be resumed and completed successfully."
If we create one access profile to one entitlement in IdentityNow the access profile assignment will fail with below error:
“[“openconnector.ConnectorException: Please make sure User is a member of Workspace : workspace:QWNjb3VudB8xMTgzODAxMTg0OQ before adding them to Workspace Group: workspace:QWNjb3VudB8xMTgzODAxMTg0OQ:group:V0ZHcm91cB5XRkdyb3VwOmUyYTQ0OTNiLTI1YWEtNDFjMS1iNWQwLWU1OGQyMzQzNWE4MA”]”
Instead, we can add the workspace entitlement along with the actual entitlement in the access profile. So that, when the entitlement is being assigned, the user will be made part of the workspace, if he is not already part of it.
Although, this type of design works well when user is requesting multiple access profiles from same workspace, it fails when any of the existing access profiles are being revoked from the user. i.e., When user has two access profiles say “Editor” and “Viewer” from Workspace1 and “Viewer” is being revoked, the user is completely being removed from the workspace.
This is against my understanding of IdentityNow dealing with access profiles / entitlements:
IdentityNow uses a cumulative model for entitlements:
** It tracks entitlements based on access profile membership.*
** If an entitlement is provided by multiple access profiles, it is only removed when all profiles that grant it are revoked.*
This ensures that users don’t lose access prematurely due to overlapping entitlements..
Please suggest.


