Sailpoint – Refresh Identity Cubes

In Sailpoint’s Identity IQ Refresh Identity Cubes” is one among the most important internal tasks. Refresh Identity Cubes helps in building 360 degree purview of an identity based on all the data aggregated from external sources.

The following video is an extensive discussion on various aspects of Refresh Identity Cubes.

The various aspects that are covered as part of this video are:

  1. Mechanisms to filter the identities to be considered for Refresh.
  2. Various options in the Refresh Identity Cubes.
  3. Using Multi-threading to improve the performance

 

 

 

 

Sailpoint Unix Integration

Unix is the mother of all operating systems and also is the foundation for Tim Berner Lee’s invention.

Every enterprise has a huge Unix foot print spanning across thousands of servers running various legacy applications.

As part of the mammoth task of securing the IT environments, securing the Unix servers would be the first step.

At ENH iSecure, we thrive to achieve complete and impeccable solutions leaving nothing to chance.
As a part of these efforts, we are speaking about Identity Governance in Unix with the help of Sailpoint’s IIQ.

The following is a video where we speak about governance of Unix using Sailpoint’s IIQ.

The following is a demo on Unix integration with Sailpoint.

IdentityIQ parallel and serial approvals

 Introduction

Out of the box Sailpoint’s IdentityIQ provides numerous workflows for provisioning, we can implement our custom workflows according to the necessity. Similarly, parallel and serial approvals are workflows used in an enterprise to manage the access of the user.

Requirement

In the world of IAM, one thing every developer should remember is that “Right thing must be accessed by the Right user at a Right time“, from the above sentence we can say that an access must be rightfully distributed to the user.

In this requirement a user in an enterprise requested an entitlement or role using IdentityIQ then that access must be approved by the work groups which are maintaining that privilege.

Understanding parallel and serial approvals in IdentityIQ

The following video illustrates about parallel and serial approvals.

Working demo of parallel and serial approvals

The following video demonstrates how parallel and serial approvals accomplishes.

 

 

 

Solving problem SailPoint IdentityIQ “Mark Invalid Error”

Problem description 

When we try to correlate the accounts into SailPoint’s identityIQ using multiple authoritative sources the following
exception may arise.

Why this happens

The main reason for this error is ambiguity of accounts. After the account aggregation task completed when we try to run the task refresh identity cubes. Task is not running and error is displays as Task stopped by user. When you see the log file there a exception named Mark Invalid.

 

.erroe_scrn_sht

Case 1

The main cause for this error is, If you have added more than one authoritative sources marked for one identity. The following exception will arise. that means you have added two Authoritative sources representing the same data if run the aggregation task the accounts will be populated with their name then If we perform refresh identity cubes task the accounts will not linked its respective manager account because there will be an ambiguity between two accounts which has to be correlate as manager account.

Case 2

In other cases if you have any accounts or identities not properly deleted.

Solution

The solution I found is to get backup of the rules and application into a xml file using the console.Shutdown the application server and drop all the tables in database using the sql scripts provided by identityIQ then create the tables using the scripts. Import the init.xml using the iiq console.Then import the xml file which represents the application object. Then if you run the aggregation and correlation tasks you can see that all the identities and their managers are correlated in identity warehouse.

Using lists in Identity IQ workflows at approval steps

Sailpoint’s Identity IQ converts all the empty lists that go through an approval step in a workflow into NULL values. This does not hold the same with non-empty lists.

null diagram

For example, we have a global variable in the workflow which is an empty ArrayList ( [] ). It is going to be converted to ( NULL ) once it goes through an approval step. So in order that the lists work as per our need, we could provide a dummy value so that list is never converted to NULL when it goes through an approval.

Solving the problem with ‘&’ character while importing files into IdentityIQ

Sailpoint’s IdentityIQ uses xml files for importing various objects like applications, rules. If you have a script that uses a ‘logical and’ (&)  in your code , normally the import fails. This is because of the way in which normal xml files are read. This is one of the special characters.

To solve the problem replace all the ‘logical and’s which are represented by the character ‘&’ to ‘&’. This would make your import successful.

Kindly observe the following screenshot for reference:

ampersand in xml

Find related information at this link.

IdentityIQ Migration from MySQL to Oracle database

Sailpoint’s IdentityIQ migration from Oracle Database to MySQL could probably cause a problem with  work items, event logs, identity requests. Creation of work items, event logs, identity requests fail with the following error :

“unable to find the sequence”

The problem was caused because of migration to the Oracle database. Sailpoint’s IdentityIQ sql script for MySQL in IdentityIQ creates these sequences as tables and the same is translated into the Oracle database.

Here is how you solve the problem:-

IdentityIQ has 3 sequences in all.

  1. identityiq.spt_syslog_event_sequence.
  2. identityiq.spt_identity_request_sequence.
  3. identityiq.spt_work_item_sequence.

We can find the current values of these sequences by the following  queries on your new Oracle Database:

select * from spt_syslog_event_sequence

select * from spt_identity_request_sequence

select * from spt_work_item_sequence

Drop all these tables by the following queries:

drop table spt_syslog_event_sequence;

drop table spt_identity_request_sequence;

drop table spt_work_item_sequence;

Create the required sequences by the following queries:

create sequence identityiq.spt_syslog_event_sequence start with <current_sequence_value> increment by 1 nocache;

create sequence identityiq.spt_identity_request_sequence start with <current_sequence_value> increment by 1 nocache;

create sequence identityiq.spt_work_item_sequence start with <current_sequence_value> increment by 1 nocache;

Now that we have the sequences in place , creation of event logs,  work items, identity requests will be working fine.

Enabling group attributes with Delimited Files in IdentityIQ

It is very usual that delimited file applications can contain groups. Along with specifying group schema in configuration , we need to specify the group attribute i.e., the attribute which speaks about the membership of an account in a group.

In Sailpoint’s IdentityIQ 6.2 and previous versions, we have a GUI facility to mark such group attribute. From Sailpoint’s IdentityIQ 6.4, there is no such GUI facility to mark group attribute. This can be modified by modifying the definition in debug pages of IdentityIQ.

Here is how you mark group attribute:

  1.  Open the debugpages which are available at <iiqhostname>/debug
  2. Select Application as object Type and open the xml representing your application
  3. Go to the tag that defines schemas and then to the specific schema that represents your application accounts.
  4. Find the AttributeDefinition tag that represents your group attribute.
  5. Add the following attribute to that tag.

schemaObjectType=”group”

Please find the following screenshot for reference :-

schemaobjecttype

Run required aggregations to see that your group structure is intact.