Create Multi-Host Integration
POSThttps://sailpoint.api.identitynow.com/v2025/multihosts
This API is used to create Multi-Host Integration. Multi-host Integration holds similar types of sources.
A token with Org Admin or Multi-Host Admin authority is required to access this endpoint.
Request
- application/json
Bodyrequired
The specifics of the Multi-Host Integration to create
Multi-Host Integration's human-readable name.
My Multi-Host Integration
Multi-Host Integration's human-readable description.
This is the Multi-Host Integration.
owner objectrequired
cluster objectnullable
Connector script name.
multihost-microsoft-sql-server
connectorAttributes object
managementWorkgroup objectnullable
Date-time when the source was created
2022-02-08T14:50:03.827Z
Date-time when the source was last modified.
2024-01-23T18:08:50.897Z
Responses
- 201
- 400
- 401
- 403
- 404
- 429
- 500
OK. Returned if the request was successfully accepted into the system.
- application/json
- Schema
- Example (auto)
Schema
- AUTHENTICATE: The source supports pass-through authentication.
- COMPOSITE: The source supports composite source creation.
- DIRECT_PERMISSIONS: The source supports returning DirectPermissions.
- DISCOVER_SCHEMA: The source supports discovering schemas for users and groups.
- ENABLE The source supports reading if an account is enabled or disabled.
- MANAGER_LOOKUP: The source supports looking up managers as they are encountered in a feed. This is the opposite of NO_RANDOM_ACCESS.
- NO_RANDOM_ACCESS: The source does not support random access and the getObject() methods should not be called and expected to perform.
- PROXY: The source can serve as a proxy for another source. When an source has a proxy, all connector calls made with that source are redirected through the connector for the proxy source.
- SEARCH
- TEMPLATE
- UNLOCK: The source supports reading if an account is locked or unlocked.
- UNSTRUCTURED_TARGETS: The source supports returning unstructured Targets.
- SHAREPOINT_TARGET: The source supports returning unstructured Target data for SharePoint. It will be typically used by AD, LDAP sources.
- PROVISIONING: The source can both read and write accounts. Having this feature implies that the provision() method is implemented. It also means that direct and target permissions can also be provisioned if they can be returned by aggregation.
- GROUP_PROVISIONING: The source can both read and write groups. Having this feature implies that the provision() method is implemented.
- SYNC_PROVISIONING: The source can provision accounts synchronously.
- PASSWORD: The source can provision password changes. Since sources can never read passwords, this is should only be used in conjunction with the PROVISIONING feature.
- CURRENT_PASSWORD: Some source types support verification of the current password
- ACCOUNT_ONLY_REQUEST: The source supports requesting accounts without entitlements.
- ADDITIONAL_ACCOUNT_REQUEST: The source supports requesting additional accounts.
- NO_AGGREGATION: A source that does not support aggregation.
- GROUPS_HAVE_MEMBERS: The source models group memberships with a member attribute on the group object rather than a groups attribute on the account object. This effects the implementation of delta account aggregation.
- NO_PERMISSIONS_PROVISIONING: Indicates that the connector cannot provision direct or target permissions for accounts. When DIRECT_PERMISSIONS and PROVISIONING features are present, it is assumed that the connector can also provision direct permissions. This feature disables that assumption and causes permission request to be converted to work items for accounts.
- NO_GROUP_PERMISSIONS_PROVISIONING: Indicates that the connector cannot provision direct or target permissions for groups. When DIRECT_PERMISSIONS and PROVISIONING features are present, it is assumed that the connector can also provision direct permissions. This feature disables that assumption and causes permission request to be converted to work items for groups.
- NO_UNSTRUCTURED_TARGETS_PROVISIONING: This string will be replaced by NO_GROUP_PERMISSIONS_PROVISIONING and NO_PERMISSIONS_PROVISIONING.
- NO_DIRECT_PERMISSIONS_PROVISIONING: This string will be replaced by NO_GROUP_PERMISSIONS_PROVISIONING and NO_PERMISSIONS_PROVISIONING.
- USES_UUID: Connectivity 2.0 flag used to indicate that the connector supports a compound naming structure.
- PREFER_UUID: Used in ISC Provisioning AND Aggregation to decide if it should prefer account.uuid to account.nativeIdentity when data is read in through aggregation OR pushed out through provisioning.
- ARM_SECURITY_EXTRACT: Indicates the application supports Security extracts for ARM
- ARM_UTILIZATION_EXTRACT: Indicates the application supports Utilization extracts for ARM
- ARM_CHANGELOG_EXTRACT: Indicates the application supports Change-log extracts for ARM
Multi-Host Integration ID.
2c91808568c529c60168cca6f90c1324
Multi-Host Integration's human-readable name.
My Multi-Host Integration
Multi-Host Integration's human-readable description.
This is a Multi-Host Integration.
owner objectrequired
cluster objectnullable
accountCorrelationConfig objectnullable
accountCorrelationRule objectnullable
managerCorrelationMapping objectnullable
managerCorrelationRule objectnullable
beforeProvisioningRule objectnullable
schemas object[]
passwordPolicies object[]nullable
Optional features that can be supported by a source. Modifying the features array may cause source configuration errors that are unsupportable. It is recommended to not modify this array for SailPoint supported connectors.
Possible values: [AUTHENTICATE
, COMPOSITE
, DIRECT_PERMISSIONS
, DISCOVER_SCHEMA
, ENABLE
, MANAGER_LOOKUP
, NO_RANDOM_ACCESS
, PROXY
, SEARCH
, TEMPLATE
, UNLOCK
, UNSTRUCTURED_TARGETS
, SHAREPOINT_TARGET
, PROVISIONING
, GROUP_PROVISIONING
, SYNC_PROVISIONING
, PASSWORD
, CURRENT_PASSWORD
, ACCOUNT_ONLY_REQUEST
, ADDITIONAL_ACCOUNT_REQUEST
, NO_AGGREGATION
, GROUPS_HAVE_MEMBERS
, NO_PERMISSIONS_PROVISIONING
, NO_GROUP_PERMISSIONS_PROVISIONING
, NO_UNSTRUCTURED_TARGETS_PROVISIONING
, NO_DIRECT_PERMISSIONS_PROVISIONING
, PREFER_UUID
, ARM_SECURITY_EXTRACT
, ARM_UTILIZATION_EXTRACT
, ARM_CHANGELOG_EXTRACT
, USES_UUID
, APPLICATION_DISCOVERY
]
["PROVISIONING","NO_PERMISSIONS_PROVISIONING","GROUPS_HAVE_MEMBERS"]
Specifies the type of system being managed e.g. Workday, Multi-Host - Microsoft SQL Server, etc.. If you are creating a delimited file source, you must set the provisionasCsv
query parameter to true
.
Multi-Host - Microsoft SQL Server
Connector script name.
multihost-microsoft-sql-server
Fully qualified name of the Java class that implements the connector interface.
sailpoint.connector.OpenConnectorAdapter
connectorAttributes object
Number from 0 to 100 that specifies when to skip the delete phase.
Possible values: >= 0
and <= 100
10
When this is true, it indicates that the source is referenced by an identity profile.
false
false
managementWorkgroup objectnullable
When this is true, it indicates that the source is healthy.
false
true
Status identifier that gives specific information about why a source is or isn't healthy.
Possible values: [SOURCE_STATE_ERROR_ACCOUNT_FILE_IMPORT
, SOURCE_STATE_ERROR_CLUSTER
, SOURCE_STATE_ERROR_SOURCE
, SOURCE_STATE_ERROR_VA
, SOURCE_STATE_FAILURE_CLUSTER
, SOURCE_STATE_FAILURE_SOURCE
, SOURCE_STATE_HEALTHY
, SOURCE_STATE_UNCHECKED_CLUSTER
, SOURCE_STATE_UNCHECKED_CLUSTER_NO_SOURCES
, SOURCE_STATE_UNCHECKED_SOURCE
, SOURCE_STATE_UNCHECKED_SOURCE_NO_ACCOUNTS
]
SOURCE_STATE_HEALTHY
Timestamp that shows when a source health check was last performed.
2021-09-28T15:48:29.380Z
Connector ID
multihost-microsoft-sql-server
Name of the connector that was chosen during source creation.
Multi-Host Microsoft SQL Server
Type of connection (direct or file).
Possible values: [direct
, file
]
direct
Connector implementation ID.
multihost-microsoft-sql-server
Date-time when the source was created
2022-02-08T14:50:03.827Z
Date-time when the source was last modified.
2024-01-23T18:08:50.897Z
If this is true, it enables a credential provider for the source. If credentialProvider is turned on, then the source can use credential provider(s) to fetch credentials.
false
false
Source category (e.g. null, CredentialProvider).
null
CredentialProvider
accountsFile objectnullable
{
"id": "2c91808568c529c60168cca6f90c1324",
"name": "My Multi-Host Integration",
"description": "This is a Multi-Host Integration.",
"owner": {
"type": "IDENTITY",
"id": "2c91808568c529c60168cca6f90c1313",
"name": "MyName"
},
"cluster": {
"type": "CLUSTER",
"id": "2c9180866166b5b0016167c32ef31a66",
"name": "Corporate Cluster"
},
"accountCorrelationConfig": {
"type": "ACCOUNT_CORRELATION_CONFIG",
"id": "2c9180855d191c59015d28583727245a",
"name": "Directory [source-62867] Account Correlation"
},
"accountCorrelationRule": {
"type": "RULE",
"id": "2c918085708c274401708c2a8a760001",
"name": "Example Rule"
},
"managerCorrelationMapping": {
"accountAttributeName": "manager",
"identityAttributeName": "manager"
},
"managerCorrelationRule": {
"type": "RULE",
"id": "2c918085708c274401708c2a8a760001",
"name": "Example Rule"
},
"beforeProvisioningRule": {
"type": "RULE",
"id": "2c918085708c274401708c2a8a760001",
"name": "Example Rule"
},
"schemas": [
{
"type": "CONNECTOR_SCHEMA",
"id": "2c9180835d191a86015d28455b4b232a",
"name": "account"
},
{
"type": "CONNECTOR_SCHEMA",
"id": "2c9180835d191a86015d28455b4b232b",
"name": "group"
}
],
"passwordPolicies": [
{
"type": "PASSWORD_POLICY",
"id": "2c9180855d191c59015d291ceb053980",
"name": "Corporate Password Policy"
},
{
"type": "PASSWORD_POLICY",
"id": "2c9180855d191c59015d291ceb057777",
"name": "Vendor Password Policy"
}
],
"features": [
"PROVISIONING",
"NO_PERMISSIONS_PROVISIONING",
"GROUPS_HAVE_MEMBERS"
],
"type": "Multi-Host - Microsoft SQL Server",
"connector": "multihost-microsoft-sql-server",
"connectorClass": "sailpoint.connector.OpenConnectorAdapter",
"connectorAttributes": {
"multiHostAttributes": {
"password": "Password",
"user": "Username",
"connector_files": "mssql-jdbc-8.4.1.jre8.jar",
"authType": "SQLAuthentication"
},
"connectorFileUploadHistory": {
"connectorFileNameUploadedDate": "2024-08-29T10:20:38.896479Z"
},
"maxAllowedSources": 30,
"lastSourceUploadCount": 50,
"showEntitlementSchema": true,
"showAccountSchema": true,
"multihost_status": "ready"
},
"deleteThreshold": 10,
"authoritative": false,
"managementWorkgroup": {
"type": "GOVERNANCE_GROUP",
"id": "2c91808568c529c60168cca6f90c2222",
"name": "My Management Workgroup"
},
"healthy": true,
"status": "SOURCE_STATE_HEALTHY",
"since": "2021-09-28T15:48:29.380Z",
"connectorId": "multihost-microsoft-sql-server",
"connectorName": "Multi-Host Microsoft SQL Server",
"connectionType": "direct",
"connectorImplementationId": "multihost-microsoft-sql-server",
"created": "2022-02-08T14:50:03.827Z",
"modified": "2024-01-23T18:08:50.897Z",
"credentialProviderEnabled": false,
"category": "CredentialProvider",
"accountsFile": {
"name": "My Accounts File",
"key": "2c91808568c529c60168cca6f90c2222",
"uploadTime": "2022-02-08T14:50:03.827Z",
"expiry": "2022-02-08T14:50:03.827Z",
"expired": false
}
}
Client Error - Returned if the request body is invalid.
- application/json
- Schema
- Example (auto)
Schema
Fine-grained error code providing more detail of the error.
400.1 Bad Request Content
Unique tracking id for the error.
e7eab60924f64aa284175b9fa3309599
messages object[]
causes object[]
{
"detailCode": "400.1 Bad Request Content",
"trackingId": "e7eab60924f64aa284175b9fa3309599",
"messages": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "The request was syntactically correct but its content is semantically invalid."
}
],
"causes": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "The request was syntactically correct but its content is semantically invalid."
}
]
}
Unauthorized - Returned if there is no authorization header, or if the JWT token is expired.
- application/json
- Schema
- Example (auto)
Schema
A message describing the error
JWT validation failed: JWT is expired
{
"error": "JWT validation failed: JWT is expired"
}
Forbidden - Returned if the user you are running as, doesn't have access to this end-point.
- application/json
- Schema
- Example (auto)
- 403
Schema
Fine-grained error code providing more detail of the error.
400.1 Bad Request Content
Unique tracking id for the error.
e7eab60924f64aa284175b9fa3309599
messages object[]
causes object[]
{
"detailCode": "400.1 Bad Request Content",
"trackingId": "e7eab60924f64aa284175b9fa3309599",
"messages": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "The request was syntactically correct but its content is semantically invalid."
}
],
"causes": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "The request was syntactically correct but its content is semantically invalid."
}
]
}
An example of a 403 response object
{
"detailCode": "403 Forbidden",
"trackingId": "b21b1f7ce4da4d639f2c62a57171b427",
"messages": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "The server understood the request but refuses to authorize it."
}
]
}
Not Found - returned if the request URL refers to a resource or object that does not exist
- application/json
- Schema
- Example (auto)
- 404
Schema
Fine-grained error code providing more detail of the error.
400.1 Bad Request Content
Unique tracking id for the error.
e7eab60924f64aa284175b9fa3309599
messages object[]
causes object[]
{
"detailCode": "400.1 Bad Request Content",
"trackingId": "e7eab60924f64aa284175b9fa3309599",
"messages": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "The request was syntactically correct but its content is semantically invalid."
}
],
"causes": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "The request was syntactically correct but its content is semantically invalid."
}
]
}
An example of a 404 response object
{
"detailCode": "404 Not found",
"trackingId": "b21b1f7ce4da4d639f2c62a57171b427",
"messages": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "The server did not find a current representation for the target resource."
}
]
}
Too Many Requests - Returned in response to too many requests in a given period of time - rate limited. The Retry-After header in the response includes how long to wait before trying again.
- application/json
- Schema
- Example (auto)
Schema
A message describing the error
Rate Limit Exceeded
{
"message": " Rate Limit Exceeded "
}
Internal Server Error - Returned if there is an unexpected error.
- application/json
- Schema
- Example (auto)
- 500
Schema
Fine-grained error code providing more detail of the error.
400.1 Bad Request Content
Unique tracking id for the error.
e7eab60924f64aa284175b9fa3309599
messages object[]
causes object[]
{
"detailCode": "400.1 Bad Request Content",
"trackingId": "e7eab60924f64aa284175b9fa3309599",
"messages": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "The request was syntactically correct but its content is semantically invalid."
}
],
"causes": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "The request was syntactically correct but its content is semantically invalid."
}
]
}
An example of a 500 response object
{
"detailCode": "500.0 Internal Fault",
"trackingId": "b21b1f7ce4da4d639f2c62a57171b427",
"messages": [
{
"locale": "en-US",
"localeOrigin": "DEFAULT",
"text": "An internal fault occurred."
}
]
}
Authorization: oauth2
type: Personal Access Tokenscopes: idn:multihosts:create, idn:sources:create
- go
- powershellSailPoint SDK
- pythonSailPoint SDK
- csharp
- curl
- dart
- http
- java
- javascript
- kotlin
- c
- nodejs
- objective-c
- ocaml
- php
- r
- ruby
- rust
- shell
- swift
- NATIVE
package main
import (
"fmt"
"strings"
"net/http"
"io"
)
func main() {
url := "https://sailpoint.api.identitynow.com/v2025/multihosts"
method := "POST"
payload := strings.NewReader(`{
"name": "My Multi-Host Integration",
"description": "This is the Multi-Host Integration.",
"owner": {
"type": "IDENTITY",
"id": "2c91808568c529c60168cca6f90c1313",
"name": "MyName"
},
"cluster": {
"type": "CLUSTER",
"id": "2c9180866166b5b0016167c32ef31a66",
"name": "Corporate Cluster"
},
"connector": "multihost-microsoft-sql-server",
"connectorAttributes": {
"maxSourcesPerAggGroup": 10,
"maxAllowedSources": 300
},
"managementWorkgroup": {
"type": "GOVERNANCE_GROUP",
"id": "2c91808568c529c60168cca6f90c2222",
"name": "My Management Workgroup"
},
"created": "2022-02-08T14:50:03.827Z",
"modified": "2024-01-23T18:08:50.897Z"
}`)
client := &http.Client {
}
req, err := http.NewRequest(method, url, payload)
if err != nil {
fmt.Println(err)
return
}
req.Header.Add("Content-Type", "application/json")
req.Header.Add("Accept", "application/json")
req.Header.Add("Authorization", "Bearer <TOKEN>")
res, err := client.Do(req)
if err != nil {
fmt.Println(err)
return
}
defer res.Body.Close()
body, err := io.ReadAll(res.Body)
if err != nil {
fmt.Println(err)
return
}
fmt.Println(string(body))
}