Saviynt unveils its cutting-edge Intelligence Suite products to revolutionize Identity Security!
Click HERE to see how Saviynt Intelligence is transforming the industry.
Saviynt Copilot Icon

Request to Create ADGroup with Accounts

Joon
Regular Contributor II
Regular Contributor II

Hello Team,

I would like to make a request to create AD group with members by API like below.

{
    "accesstype": "roles",
    "requestor": "CP006194",
    "displayname": "RBAC_VAULT_PROD_joon_test64",
    "roletype": "ADGroup",
    "entitlementtype": "memberOf",
    "suffix": "RBAC_VAULT_PROD_joon_test64,OU=Role Based Groups,OU=Global IT Support Groups",
    "requesttype": "create",
    "category": "Security",
    "securitysystem": "Corp ad - stg",
    "endpoint": "Corp ad - stg",
    "domain": "DC=corpstg,DC=oncoupangstg,DC=net",
    "environment": "Prod",
    "application": "DC=corpstg,DC=oncoupangstg,DC=net",
    "owner": [
        {
            "ownername": "CP006194",
            "rank": "1"
        }
    ],
    "accounts":[{"accountname":"ddipong"}]
}

Task will be generated and provisioned without an error, but the membership won't be applied.

anyone can give me an advise to add members to the group when it's created ?

This is a request when I make a request to create AD group through ARS.

Joon_0-1694618732528.png

What I would like to know is how to create that "ADD ACCESS" task with "ENTITLEMENT REQUEST" by calling the API.

[This post has been edited by a Moderator to merge two posts.]

3 REPLIES 3

sudeshjaiswal
Saviynt Employee
Saviynt Employee

Hello @Joon,

Can you please check if add access task are getting created.Once you are create account task is provisioned.
First create entitlement task is being created, on successful provisioning add access task will be created.

Thanks,

If you find the above response useful, Kindly Mark it as "Accept As Solution".

pmahalle
All-Star
All-Star

Hi @Joon ,

Use below request payload. It will create "Create Entitlement" type task and once it's completed, "Add Access" type task will be created.

{
"accesstype": "roles",
"requestor": "CP006194",
"displayname": "RBAC_VAULT_PROD_joon_test64",
"roletype": "ADGroup",
"entitlementtype": "memberOf",
"suffix": "RBAC_VAULT_PROD_joon_test64,OU=Role Based Groups,OU=Global IT Support Groups",
"requesttype": "create",
"category": "Security",
"securitysystem": "Corp ad - stg",
"endpoint": "Corp ad - stg",
"domain": "DC=corpstg,DC=oncoupangstg,DC=net",
"environment": "Prod",
"application": "DC=corpstg,DC=oncoupangstg,DC=net",
"owner": [
{
"ownername": "CP006194",
"rank": "1"
}
],
"accounts": [
{
"accountname":"ddipong",
"updatetype":"add"
}
]
}

 


Pandharinath Mahalle(Paddy)
If this reply helps your question, please consider selecting Accept As Solution and hit Kudos 🙂

Darshanjain
Saviynt Employee
Saviynt Employee

Hi @Joon 

Can you please add the below line in the json

"accounts": [
{
"accountname":"ddipong",

"updatetype": "add"
}
]

 

Also the add access is created only after entitlement is created.

 

Thanks

Darshan