Announcing the Saviynt Knowledge Exchange unifying the Saviynt forums, documentation, training,
and more in a single search tool across platforms. Read the announcement here.

Azure Connector

shibinvpkvr
Regular Contributor II
Regular Contributor II

Team,

We have gone through the Saviynt - Azure integration guide and noted that many entitlements can only be imported but cannot be provisioned.

https://docs.saviyntcloud.com/bundle/Azure-v23x/page/Content/Supported-Features.htm 

During an initial discussion with the customer about the connector capabilities following questions came up. 

1. Can the connector bring in "Azure Management Groups" ? it is not mentioned in the documentation

2. Can the connector be extended to provision more types of access? currently it says only 4 types are supported for provisioning

3. Why AADGroup is showing under Azure as well? (We have already integrated AzureAD and AADGroup is already imported part of that)

18 REPLIES 18

sudeshjaiswal
Saviynt Employee
Saviynt Employee

Hello @shibinvpkvr,

1. Can the connector bring in "Azure Management Groups" ? it is not mentioned in the documentation - No, It's not supported right now.
2. Can the connector be extended to provision more types of access? currently it says only 4 types are supported for provisioning? - Yes. It can be extended as it uses RESt conneector for provisioning usecases.
3. Why AADGroup is showing under Azure as well? (We have already integrated AzureAD and AADGroup is already imported part of that) - AADGroups are not getting imported as part of Azure Connector but get copied from the mapped Azure AD endpoint.

Thanks,

If you find the above response useful, Kindly Mark it as "Accept As Solution".

chrismeisner
New Contributor
New Contributor

For #1  Access is granted to Azure resources at management group, subscription, resource group, and in the resources directly. Why would management groups be omitted? This is a huge gap. Can the connector be extended to include management groups?

sudeshjaiswal
Saviynt Employee
Saviynt Employee

Hello @chrismeisner,

Please create a enhancement with your requirement in the Saviynt's Ideas portal.

Thanks,

If you find the above response useful, Kindly Mark it as "Accept As Solution".

shibinvpkvr
Regular Contributor II
Regular Contributor II

shibinvpkvr
Regular Contributor II
Regular Contributor II

@sudeshjaiswal we are in process of setting up the connector (Azure connector) for our Azure tenant. 

However, the connector requires below parameter. 

SUBSCRIPTION ID

Represents a unique identifier of Azure subscription which grants you access to Azure services and to the Azure Resource Management Portal.

Our production tenant has 90+ subscriptions under 10+ management groups. Wondering how we can provide subscription id in this case in the connector. Can we pass it comma separated? 

 

Thanks

Shibin

shibinvpkvr
Regular Contributor II
Regular Contributor II

@sudeshjaiswal @timchengappa any inputs from your side for the above question?

sudeshjaiswal
Saviynt Employee
Saviynt Employee

Hello @shibinvpkvr,

For Each Subscription, Seperate connections needs to be created.
You can raised the enhancement to support the multiple subcription in single connections.

Thanks.

If you find the above response useful, Kindly Mark it as "Accept As Solution".

shibinvpkvr
Regular Contributor II
Regular Contributor II

Do you mean to say that if I have 90 subscriptions in the tenant, then 90 connections and that many endpoints?! I was wondering then why subscription is configured as an entitlement type as well under the endpoint 

SUMAIYA_BABU
Regular Contributor
Regular Contributor

Can we customize the attribute mappings for the azure accounts anywhere?

You can do in Azure AD Connector -> ACCOUNT_ATTRIBUTES


Regards,
Rushikesh Vartak
If you find the response useful, kindly consider selecting Accept As Solution and clicking on the kudos button.

SUMAIYA_BABU
Regular Contributor
Regular Contributor

Azure AD is a different endpoint, which has no issues. If I add attributes in Azure AD connector, the mappings are specific to Azure AD accounts. Azure accounts have a default mapping, out of which we don't see employeeid to correlate with users.

We are able to map accounts emp id to users emp id 

{
"acctLabels": {
"customproperty1": "First Name",
"customproperty2": "Last Name",
"customproperty3": "Office Phone",
"customproperty10": "Account Status",
"customproperty11": "Employee ID",
"customproperty12": "Job Title",
"customproperty13": "User Type",
"customproperty14": "Directory Synced",
"customproperty16": "City",
"customproperty30": "Visibility"
},
"colsToPropsMap": {
"accountID": "id~#~char",
"name": "userPrincipalName~#~char",
"displayname": "displayName~#~char",
"customproperty1": "givenName~#~char",
"customproperty2": "surname~#~char",
"customproperty3": "businessPhones~#~char",
"customproperty10": "accountEnabled~#~bool",
"customproperty11": "employeeId~#~char",
"customproperty12": "jobTitle~#~char",
"customproperty13": "userType~#~char",
"customproperty14": "onPremisesSyncEnabled~#~bool",
"customproperty16": "city~#~char",
"customproperty30": "visibility~#~char"
}
}

rushikeshvartak_0-1705028877787.png

 


Regards,
Rushikesh Vartak
If you find the response useful, kindly consider selecting Accept As Solution and clicking on the kudos button.

SUMAIYA_BABU
Regular Contributor
Regular Contributor

Hi Team,

We have also noticed that even for the supported entitlement type, the privileges(roles) are not added properly during reconciliation. The roles are not properly mapped to the entitlement types of users during reconciliation.

 

Can you elaborate with examples 


Regards,
Rushikesh Vartak
If you find the response useful, kindly consider selecting Accept As Solution and clicking on the kudos button.

SUMAIYA_BABU
Regular Contributor
Regular Contributor

@rushikeshvartak In Azure, the user gets a subscription S1 from a role r1 and the user has another role r2 as well. But in saviynt, after recon, the entitlement hierarchy shows r2 under subscription S1. It should be r1 ideally.

Role is AppRole Entitlement Type or Saviynt Role Object


Regards,
Rushikesh Vartak
If you find the response useful, kindly consider selecting Accept As Solution and clicking on the kudos button.

@rushikeshvartak  Azure role/privilege assigned to any account which will be reconciled as an entitlement into saviynt

riteshkumar
Saviynt Employee
Saviynt Employee

@SUMAIYA_BABU Can you please share the screenshot of example from Saviynt and Azure (along with permission type in Azure) ?