Announcing the Saviynt Knowledge Exchange unifying the Saviynt forums, documentation, training,
and more in a single search tool across platforms. Read the announcement here.

How to bulk update EndDate (account_entitlements1) via Analytics

Abhinav
New Contributor
New Contributor

Hi All,

We have an application where Account's access should have End Date. So End Date has been made mandatory in Saviynt Form. Once EndDate is set then it is visible in Saviynt GUI >> Application's Account >> Associated Entitlement >> Access Name 1 >> End Date.

END DATE is needed as access deprovisioning is triggered on that. But existing accounts (in Application) does not have any End Date set.
Once imported, I can use Enhanced Job Query to insert End Date, but deprovisioning Job still won't trigger as it also checks ARSTASKKEY value, which would be empty as this End Date is not inserted by Saviynt.

How can I insert End Date in App Account's access with ARSTASKKEY ?
Is there any way I can use Analytics to check End Date, if missing then raise 'Update Access End Date' as default task ? with this I would be able to set some default End Date value and also would have ARSTASKKEY value updated in account_entitlements1 table ?

Please provide any help or suggestions to achieve this.

Thanks,

3 REPLIES 3

rushikeshvartak
All-Star
All-Star

You can run baseline job for taskkey & update end date from enhanced query


Regards,
Rushikesh Vartak
If you find the response useful, kindly consider selecting Accept As Solution and clicking on the kudos button.

Hi Rushikesh,

Thanks for response!!

Can you please explain bit more on baseline job for taskkey update. 

I am getting below data when imported sample accounts (existing) from Application, where both End Date and ARSTASKKEY is missing:-

Abhinav_0-1705304507929.png

Thanks,

Under Endpoints - Click on Baseline application

Baseline Application/Re-Baseline Application

Baselining of an application is the process of identifying rogue accounts or accesses, and taking measures for onboarding them accordingly.
Rogue accounts or accesses are created, updated, or managed outside the Saviynt environment, directly in the target application. Recognizing and reviewing these rogue accesses becomes highly important, as they are created on the target application directly and may pose a security risk. Therefore, having a baseline for comparison reduces the overhead of manually searching for out-of-band accesses.

A baselining operation is performed by default for every application that is imported within Saviynt. You can also baseline an application manually by clicking Baseline Application for an endpoint by navigating to Admin > Security System > Endpoints.

Saviynt also provides a Re-Baseline Application option that reviews any incremental changes within the application, due to which there could be a new set of rogue accesses. As the name suggests, re-baselining can be performed for applications that have already been baselined before.
A routine scenario where re-baselining applications becomes paramount is during mergers and acquisitions. In these situations, there could be a huge influx of new accounts and accesses to already baselined applications, and therefore these are marked as ‘rogue’. Re-baselining identifies these new ‘rogue’ accounts or accesses and maps them accordingly.

Video: Enhanced Application Baselining

For re-baselining an already baselined application, click the Re-Baseline Application option for an endpoint by navigating to Admin > Security System > Endpoints.

For re-baselining an already baselined application, perform the following steps:

  1. Go to Admin > Security System > Endpoints and click the Re-Baseline Application option for an endpoint.

  2. Re-Baseline Application provides you with the below retrofitting options:

    1. Do you want to repair Role User Mapping?
      Enabling this option allows you to repair the role-user mappings for the application. For more information on repairing role user mappings, see Repairing Role Mappings.

    2. Do you want to repair Rule User Mapping?
      Enabling this option allows you to repair the rule-user mappings for the application. For more information on repairing rule user mappings, see Repairing Rule-User Mappings.

      The Rule User Mapping option is available only when the Enable rule retrofit (repair rule to user mappings) setting is enabled from Admin > Global Configuration > Rules > Settings. For more information, see Configuring Rules

  3. Enable one of the above options as per your requirement, and click Start.
    The baselining process is initiated.

The role-user and rule user repair options have been included in Re-Baselining to ensure that all entitlements are removed for users when they are no longer part of a role or they do not match the rule conditions. They help in scenarios such as a faulty import interrupting the role to user or rule to user relationships.

The ‘i' icon next to the Baseline Application or Re-Baseline Application option to displays details such as the generated ‘arstaskkey’, the user who initiated the baseline application process, the date, and the number of accounts and entitlements that are baselined. For more information about 'arstaskkey’, see the Accounts Table in the Enterprise Identity Cloud Schema Guide.

EIC also provides an out-of-band access detection functionality that detects and revokes accesses that are assigned by the target system. Based on the baseline or re-baseline results, you can choose the DeprovisionAccess or Deprovision Access and Re-create Access Request option from Action for Out of Band Access Detection for the rogue accounts or accesses found. To know more, see Configuring the detection of out-of-band access for endpoints in the Knowledge Base Articles.

 

 

https://docs.saviyntcloud.com/bundle/EIC-Admin-v24x/page/Content/Chapter02-Identity-Repository/Viewi...

 


Regards,
Rushikesh Vartak
If you find the response useful, kindly consider selecting Accept As Solution and clicking on the kudos button.