Click HERE to see how Saviynt Intelligence is transforming the industry. |
04/23/2024 09:41 AM
Hi Team,
I am encountering a 400 error unauthorized when attempting to call the API for adding a user to a role. However, I am able to successfully call other APIs. This is the first time I have used a role request. We have a use case where we need to add a user to Bulk AD groups via the API. I have created a role and added all the necessary groups. I expected this to generate the ADD Access for entitlement for the requestable user.
OTHER API call is working.
04/23/2024 11:03 AM
Hi @navneetv ,
Requesting/provisioning experience will be same for both UI and API. It will for sure generate add access for entitlement.
I believe you have added necessary access permission to make this API call. Rest I can only think of other permission to request role.
Please check all the below are configured:
Note: You can also cross verify requesting from UI
If you find the above response useful, Kindly Mark it as Accept As Solution and hit Kudos
04/23/2024 08:13 PM
Please check show All in ROLE_ADMIN is defined as All Roles
04/23/2024 11:35 PM
@rushikeshvartak what exactly this option or function does? if i select all in show roles
04/23/2024 11:40 PM - edited 04/23/2024 11:41 PM
I don't think this would help here.
Did you check all the above configurations mentioned? We are using createrequest API for adding user to the role from long time in PROD (live currently), we haven't faced any issue.
If you find the above response useful, Kindly Mark it as Accept As Solution and hit Kudos
04/23/2024 11:58 PM - edited 04/24/2024 12:08 AM
@PremMahadikar I checked after making the changes to the global configuration along with the requestable role marked true, but I am still encountering the same error. How can I confirm if the permissions are properly set up for my account? I can generate the Add task with the entitlement request, but when I attempt to call the role request API, I receive a 400 error.
04/24/2024 12:42 AM
Few more checks:
04/24/2024 05:06 AM
Hi @PremMahadikar @rushikeshvartak
I would like to know if I can use the roles feature to add an Active Directory account to multiple AD groups through an API call. This is my first time using the roles feature, so I'm not sure if it can accomplish my use case
I tried using the GUI and the request was auto-approved as expected. However, the Add access task was not generated for AD.
04/24/2024 05:08 AM
You can add
04/24/2024 06:41 AM
04/24/2024 09:03 PM
Is there any existing tasks open ?
04/24/2024 10:31 PM
Nothing task was generated for the user.
04/24/2024 10:36 PM
@rushikeshvartak Nothing task was generated for the user. I configured the role. Is there any additional step that needs to be performed to activate the role requestable?
04/25/2024 09:30 PM
Enterprise role should not be tagged to endpoint
04/24/2024 10:39 PM
@PremMahadikar All permissions look good. I have the sav_admin role and I am able to generate the add task for entitlement, but it failed for the role.
04/25/2024 09:39 PM
@rushikeshvartak Is there any way to add users to a bulk Active Directory (AD) group using an API request?
I thought, we could use roles, and roles can be requested via the API. Add access Tasks would be granted for groups that are added to the role.
04/25/2024 09:55 PM
Use multi user bulk file upload for roles / entitlement
04/25/2024 10:06 PM
We are using the FreshService workflow to send an API call to Saviynt as per the FS request. If there is a request to add users to all 6 groups based on their department, we need to make one API call to Saviynt to add the users to the bulk AD group.
We can use the ENETIELEMT request to add all entitlements in a single body, but since we have many bulk groups that need to be added based on department, using the ENETLEMENT request will require handling lots of logic and API calls in the FS workflow, which can cause performance issue of workflow.
Therefore, I was looking for a role-based solution where they can send one call and generate the add access for AD groups, which are added to role