07/04/2023 10:42 PM
Hi Team,
We have a requirement where we wanted to create and update account task for a rejected request.
Please let me know if we can create using workflow modification or any other way is there.
Regards,
Dheeraj
07/04/2023 11:03 PM
07/04/2023 11:21 PM
Hi Rushikesh,
Thanks for the reply.
let me explain the condition in detail.
We are auto-rejecting the modify access request for a specific account type and sending email to user, we want to trigger update account json for such type of account along with email notification.
auto-rejection is required since we can't add requested entitlement for that type of account just want to update some of the account attribute.
Regards,
Dheeraj
07/04/2023 11:46 PM
Hi @draut ,
Are you saying you want to create update account task for a rejected request? I don't think that is possible from workflows. You can alternatively use actionable analytics to achieve this.
07/04/2023 11:55 PM
Hi Naveen,
Do you have any sample query for the tasks creation for the rejected request?
Regards,
Dheeraj
07/05/2023 08:36 PM
This is not good practices to update metadata of rejected request. if some attributes are not needed to updated then use if else condition in Connector
07/05/2023 10:36 PM
@rushikeshvartak We need to update multiple attributes, it is kind of disabling that specific type of account so that user can raise a request for normal account again.
Can you please help with the query to get the list of accounts for all rejected request in last 24 hrs for the specific endpoint, wanted to update those account using actionable analytics query.
07/06/2023 03:06 AM
Change query as per your need
SELECT ENDPOINTASCSV AS 'APPLICATION', SUBSTR(jbpmprocessinstanceid, INSTR(jbpmprocessinstanceid, '.') + 1, LENGTH(jbpmprocessinstanceid)) AS 'REQUEST ID', CASE WHEN ra.accesstype = 3 AND ra.accesskey = 0 THEN 'Account' WHEN ra.accesstype = 2 THEN (SELECT entitlement_value FROM entitlement_values v WHERE v.entitlement_valuekey = ra.accesskey AND ra.ACCESSTYPE != 3) WHEN ra.accesstype in(7, 1) THEN (SELECT role_name FROM ROLES r WHERE r.ROLEKEY = ra.ACCESSKEY) END AS 'REQUESTED ENTITLEMENT', u.username AS 'REQUESTED FOR', app.username AS 'Approver Name', ar.REQUESTDATE AS 'REQUEST DATE', aa.APPROVEDATE, CASE WHEN (ar.requesttype = 1 OR ar.requesttype = 3) THEN 'Grant Access' WHEN ar.requesttype = 2 THEN 'Revoke Access' END AS 'REQUEST TYPE' FROM ars_requests ar, request_Access ra, users u, USERS app, ACCESS_APPROVERS aa WHERE ra.requestkey=ar.requestkey AND u.userkey = ra.userkey AND aa.approveby = app.userkey AND ar.requesttype in (1, 2) AND ar.REQUESTDATE > curdate() - INTERVAL 6 MONTH AND aa.APPROVEDATE > curdate() AND ra.REQUEST_ACCESSKEY = aa.REQUEST_ACCESS_KEY AND ar.ENDPOINTASCSV in ('E1','E2')
07/05/2023 12:01 AM
@draut Actionable analytics can serve the purpose.
As a default action select Update Account Action.
The mandatory attribute for this action is accountkey of the account.
You can refer Configuring Allowed Actions (saviyntcloud.com)