Provisioning

Add audit logging on target system changes
We would like to have more audit log information available in elastic about recent changes in the configuration of provisioning target systems. The following actions should be audited in elastic as user actions When a user changes the configuration of a target system Configuration changes will be included from the following areas: Mapping Add or remove fields Import mapping Change of current mapped fields Rename field Change type (text, array) Change of description Change of applicable entitlement action configuration(s) Change of mapping configuration when type or value of a mapped field is changed - Options Enable/disable use in notifications Enable/disable store in account data Scripting User lifecycle for PowerShell V2 Permission configuration changes for PowerShell V2 Retrieve permissions script Grant, revoke, update, or all in one script changes scripting Resource configuration Add or remove resource configuration sets Resource creation script Post actions scripting for Active Directory Uniqueness validation Scripting changed Changes in the applicable action selection Correlation configuration Thresholds Enable or disable a threshold Configured threshold value change System configuration Configuration of fields (Custom connector configuration) Configured field values (from configuration TAB) Execute on-premises or cloud changed For target system changes the functionality will be limited to only include the following systems: Active Directory (builtin) PowerShell V2
4
·

complete

Import entitlements for PSv2 target systems
We would like a way in which we can convert the current target system state (accounts & permissions) to HelloID entitlement state based on the business rules. This way we have an good overview of all the entitlements which are already assigned in the target system. Another big advantage is that when we do an evaluation after import that we see which accounts are created and which permission are granted instead of everything. This information should improve the go live experience. Also a advantage is that it requires less actions to be executed and reduces the time to go live. Suggestion: Get the following data from the PowerShell V2 target system Account Account Access Permission A new powershell script per account and per permission definition is required to collect the preferred import data from the target system. Convert the data into entitlements (network entitlement state) based on desired entitlements (configured in Business rules) Needs preview to check what the result of script is (preview times the same as in import) Show the difference and match between the network entitlement state and the desired entitlement state (minus enforcement state) based on the correlation configuration Import the (network entitlement state) as the entitlement state Cross check if account which has an account reference to a person does not correlate to another person Show record when only account access should be imported Show record when only memberships should be imported Update accounts on next enforcement after entitlement is imported Add origin imported entitlement to action on evaluation report (Elastic) audit logging: audit log for each managed/imported entitlement and log user action with summary. (add this also in person\system audit logging as managed logging) Add unmanage logging (bulk or manual) to person\system audit logging Import data based on configured grid filters Update all permissions when imported
7
·

complete

Load More