7.3 Understanding Variations for Application Sources

7.3.1 Understanding Azure AD MS Graph Account and Permission Collectors

Your old Azure AD User account and permission collectors have been disabled. For more information about collecting from Azure AD MS Graph account and permission collectors, see Section 6.2.1, Collecting from Active Directory with Azure Active Directory.

7.3.2 Understanding GitHub Account and Permission Collectors

Like the other Identity Governance collectors, the GitHub collectors map accounts and permissions to identities by association or other attributes. To successfully map accounts and permissions to identities, identities must be collected using the identity source that is configured in the GIT server. The GitHub permission collector collects organizations, teams, repositories, the permission to permission association, and also the holder association. The GitHub collector has a batch size limit of 100 records. The collector supports two authentication types, and to access all GitHub endpoints, the credentials used for the authentication types should be of an organization owner. The GitHub collector collects all organizations the owner holds.

The GitHub collector template includes mandatory attribute mappings suitable for the target application. However, you can configure other attributes and then edit the transform script to build the required payload. For example, for GitHub accounts if you want to map ‘email’ for the Account-User Mapping attribute, you have to map Account-User Mapping with user and write the script as given to parse the email from the user JSON.

var user = JSON.parse(inputValue) outputValue = user['email'];

Apart from the mapped attributes, you can add other attributes for organization by parsing the values from the organization JSON. For teams, you can parse the values from the teams JSON and for repository from the repository JSON.

If you use Cloud Bridge to collect data from your on-premises data centers, you must specify ordinals for the respective authentication method in the Cloud Bridge user interface (http://localhost (CBA IP address or DNS name):8080).

For more information, see the GitHub Docs.

7.3.3 Understanding the Microsoft Teams Permission Collector

The Microsoft Teams application is a subordinate application and uses the Azure Active Directory database. It consists of teams and channels with members of their own. Teams further divides members into team and channel members, or team and channel owners, with higher privileges. Teams are public and private and channels are standard and private. Each team can have a number of channels with one default standard channel.

While collecting data from Microsoft Teams application, you must use the Azure AD MS Graph collector for collecting accounts and identities and use the MS Teams collector to collect teams, channels, their members, and the associated permissions. However, for the collector to work, you must have the following API permissions in Azure Active Directory.

Resource

Permission

Type

Description

Team

TeamSettings.Read.Group

Application

Read team’s setting

 

TeamSettings.ReadWrite.Group

Application

Read and write team's settings

 

User.Read.All

Application

Read all user profiles

 

User.ReadWrite.All

Application

Read and write all user profiles

 

Team.ReadBasic.All

Application and Delegated

Read names and descriptions of all teams

 

TeamSettings.Read.All

Application and Delegated

Read all team’s settings

 

TeamSettings.ReadWrite.All

Application and Delegated

Read and change all team’s settings

 

Group.Read.All

Application and Delegated

Read all groups

 

Group.ReadWrite.All

Application and Delegated

Read and write all groups

 

Directory.Read.All

Application and Delegated

Read directory data

 

Directory.ReadWrite.All

Application and Delegated

Read and write directory data

 

Directory.AccessAsUser.All

Application

Access directory as the signed in user

 

TeamMember.Read.Group

Application

Read team’s members

 

TeamMember.Read.All

Application and Delegated

Read all team members

 

TeamMember.ReadWrite.All

Application and Delegated

Add, remove, and change roles for members for all teams

 

TeamMember.ReadWriteNonOwnerRole.All

Application

Add and remove members with non-owner role for all teams

Channel

ChannelSettings.Read.Group

Application

Read channel data of a team

 

ChannelSettings.ReadWrite.Group

Application

Update channel data of a team

 

Channel.ReadBasic.All

Application and Delegated

Read all channel names and descriptions

 

ChannelSettings.Read.All

Application and Delegated

Read all channel data of a team

 

ChannelSettings.ReadWrite.All

Application and Delegated

Read and write all channel data

 

Group.Read.All

Application and Delegated

Read all groups

 

Group.ReadWrite.All

Application and Delegated

Read and write all groups

 

Directory.Read.All

Application and Delegated

Read directory data

 

Directory.ReadWrite.All

Application and Delegated

Read and write directory data

 

ChannelMember.Read.All

Application and Delegated

Read channel members

 

ChannelMember.ReadWrite.All

Application and Delegated

Add, remove, and change roles for members for all channels

The Microsoft Teams collector does not collect data for itself. So, you must enable the Azure Active Directory data source to collect permissions from MS Teams. You have the option to configure MS Team collector as a hierarchical structure and map the attribute Unique Application ID with the applicationId.Make sure the outputValue in the ECMA script is mapped to the name of the collector. For example, outputValue='MS_Teams’.

The MS Team Permission collector template includes mandatory attribute mappings, such as ID, objectType. ID is the unique ID from a team or a channel, objectType indicates if the object is for teams or channels.

7.3.4 Understanding the Identity Manager AE Permission Collector

The Identity Manager AE Permission collector is a unique type of Application Source collector. In addition to creating the base Identity Manager application in Identity Governance, it also automatically generates subordinate applications that represent IDM Drivers, such as the CloudAD Driver and SAP User Management Driver, that support Identity Manager entitlements. When the Identity Manager AE Permission collector collects any User record from the Identity Manager application that has an association with a subordinate application (via the DirXML Association attribute on the User) it receives an Account assignment for that subordinate application. The Identity Manager AE Permission collector also automatically maps the User record to the Identity Manager User.

No other application source permission collector provides automatic generation of subordinate applications or accounts. Due to the complexity of the relationships managed by this collector, the template intentionally blocks customization to ensure the integrity of the data collections . When using the Cloud Bridge to collect data from your on-premises data centers, you will need to specify ordinals for the respective authentication method in the Cloud Bridge user interface (http://localhost (CBA IP address or DNS name):8080)

NOTE:When an Identity Manager AE permission is requested in Identity Governance Access Request, the idmDn attribute of the requesting user is utilized in the RBPM SOAP request as the <ser:requester>. If this value is not a valid user DN in the target Identity Manager system, the fulfillment request will fail.

7.3.5 Understanding the Identity Manager Entitlements Account and Permission Collectors

The Identity Manager Entitlement collectors are intended for Identity Manager Standard Edition (IDM SE) users who want to use Identity Governance to provision or revoke accounts and permissions. The entitlement collectors collect accounts and permissions from Identity Manager using IDM drivers that support entitlements such as Azure, Workday, and SCIM drivers. Like the other Identity Governance collectors, the entitlement collectors map accounts and permissions to identities by association or other attributes. To successfully collect accounts and permissions:

  • You must have collected identities from Identity Manager, and

  • All supported driverssupported drivers must be running

    NOTE:For the list of supported drivers, please see the Release Notes.

You can use the account collectors to collect accounts and the permission collectors to collect permissions and their assignments. For example, the permission collector can collect the building access permission (list of buildings) and assignments (who can access the building).

In addition to IDM credentials, the LDAP distinguished name of the entitlement in the IDM driver is also a mandatory field for the entitlement collectors.

Typically, attribute mappings are preconfigured and have built-in fallback options. For example, by default, the collector maps the account or permission name to the IDM display name. If the collection process does not find the display name, the collector automatically maps the account or permission name to other available attributes such as the description. However, you do need to change the default Account-User Mapping value GUID to Object GUID and default Permission-Account or User Mapping value association to Account ID from source.

7.3.6 Understanding and Configuring the Workday Account and Permission Collectors

Security groups control access to data in Workday. Security groups are a collection of users or of objects that are related to users. Micro Focus provides default templates for the Workday account and permission collections. Workday permission collectors support two types of permission collections: User Based Security Group and Role Based Permissions. Role-based permissions are always associated with a specific organization. When using role-based permission collectors, you can also collect permission hierarchy. Collected role based permission in the catalog, includes role name, permission, and organization as the name of the permission and displays permission relationships.

When configuring the Workday Account Collector, configure service parameters as needed, then specify the Account-User Mapping parameter as WorkdayUserName and map it to Object GUID to join accounts to identities.

When configuring the Workday Permission Collector, configure service parameters, then select the permission type.

  • To collect user-based security group permissions, specify Permission-Account or User Mapping parameter value as WorkdayUserName and map it to Account Name to join permissions to the account.

  • To collect role-based permissions, specify the Permission-Account or User Mapping value as WorkforceID and map it to Workforce ID to map permission to identities. Additionally, leave the organization type blank to collect all role-based permissions or specify an organization type to collect permissions associated with an organization.

    When specifying a specific organization, to collect the hierarchy of role-based permissions using organization hierarchy, map the Parent Permission ID to wd-superior_organization. Mapping this will collect and establish the child/parent permission relationship for role-based permissions.

7.3.7 Understanding the SCIM Account and Permission Collectors

The System for Cross-domain Identity Management (SCIM) account and permission collectors are unique collectors that use unique authentication methods. By default, the generic SCIM permission collector collects groups as permission for the resource type. However, you can configure the collector to collect other permissions by setting the Resource Type and mapping the attributes of that resource type. For example, if you want to add printers as permission you can give the endpoint of that resource type and map the required attributes to perform the collection.

7.3.8 Understanding and Configuring the Salesforce Account and Permission Collectors

Using standard Identity Governance Salesforce collector templates, you can collect data from User, UserRole, and Profile objects. The User object is used for Salesforce Identity and Salesforce Account collectors as well as the permission-holder information in the permission collectors.

The generic Salesforce permission collector is configured by default to collect UserRole permissions. However, you can configure the collector to collect other permission types such as UserLicense, PackageLicense, PermissionSetLicense, PermissionSet, PermissionSetGroup, and Profile. For your convenience, Identity Governance also provides Salesforce Role Permission and Salesforce Profile Permission collector templates to collect only UserRole and Profile objects respectively.