11.1:documentation:roles:adm:role_assignment

This agenda contains all requests (wishes) for requested changes of authorized identities. The main idea is that all changes in identities' permission must go through this agenda. Therefore, it is not intended only for end users' requests but for automatic operations (synchronization, automatic roles, etc.) as well.

The standard scenario of a permission change is as follows:

  • A user requests a change in their set of permissions.
  • They presse the "Change permission" button in the "Assigned roles" tab.
  • A new request (in "CONCEPT" state) is created automatically. The detail of this new request is shown to the user.
  • All the assigned roles which the user has are displayed in the table of concepts "Currently assigned roles (including requested changes)". The user can make the changes over this table (see more in Concept table)
  • All the requested changes of permission are displayed in the table "Requested permission changes".
  • The user presses the button "Make a request".
  • If the request is not evaluated as duplicate, its execution is performed (the state is set to "IN_PROGRESS").
  • Subsequently, the event "RoleRequestEventType.EXCECUTE" is called out.
  • Ordinarily, this event is firstly captured by the processor "role-request-approval-processor", which starts the approval workflow (calls the method IdmRoleRequestService.startApprovalProcess). In the default state, the workflow with the definition "approve-identity-change-permissions" is started. The key of the definition which is to be started can be changed in the application configuration by adding the key "idm.sec.core.processor.role-request-approval-processor.wf", (the value will be the key of the requested definition).
  • After a successful approval, the workflow process calls out the event "RoleRequestEventType.EXCECUTE" again (it continues with the event with which it has been started).
  • Ordinarily, the event is then captured by the processor "role-request-realization-processor", which provides the realization of the event itself. The processor calls the method IdmRoleRequestService.executeRequest(requestId), which performs the application of all role concepts which are in the "APPROVED" or "CONCEPT" states (the concept state is realized due to the situation when the realization processor is called out immediately after making the request, i.e. approval is disabled).
  • The user is assigned roles according to the requested changes.
If the user creates a new request but does not submit it, it will be displayed as "Concept" in the table "Unfinished requests for permission change" in the assigned roles tab. Thus they can return to an unfinished concept.

The request can be submitted only when the request is in the "CONCEPT", "DUPLICATED" or "EXCEPTION" states

There are two ways of how to make a change in permissions without approval.

Disabling the approval processor

As mentioned above, after submitting a request, an event is called out which is captured by the "role-request-approval-processor". If we disable this processor, all submitted requests will be realized immediately without any approval.

By disabling the approval processor, all submitted requests will be realized immediately for all users in the system regardless of their permissions.

Request attribute "Execute immediately"

A request for permission change contains attribute "executeImmediately". If this attribute is set to "true", the request will be executed immediately after submitting it. A submission without approval can be executed only by users having permission "ROLEREQUEST_EXECUTEIMMEDIATELY". If an event marked in this way is executed by a user without this permission, an exception will be called out.

During the process of submitting a request, it is verified if there is another duplicate request of the new request (in state "IN_PROGRESS", "APPROVED"). If a duplicate request is found, the executed request is labelled as duplicated (state "DUPLICATED") and its attribute "duplicatedToRequest" is filled with the identifier of the duplicate request (a record is made in the request log). The submission (execution) of the request is thus suspended.

A duplicate request is such a request with equivalent:

  • applicants.
  • individual role concepts (identical role type, identical validity from/to, identical link IdentityRole).
  • a request note (the user can define their request only in this note).
A duplicate request can be submitted (executed) repeatedly. Due to this, duplicate requests are found again.

A request can be removed completely only in "CONCEPT" state. If it is in "EXECUTED" state, every attempt to remove it ends in exception "ROLEREQUESTEXECUTEDCANNOTDELETE". If it is in "APPROVED, IN_PROGRESS, EXCEPTION, DUPLICATED" states, the request is set to "CANCELED" state. If a process is tied to the request, the process is terminated (subsequently a record about this is made in the request log).

A situation when the end user creates a request for permission change from their profile has been described above. For administrators, it is convenient to use the "Role requests" agenda, which provides an overview of all requests in the system. All requests in all states are displayed in this agenda (including those already executed).

The agenda allows a direct request submission from a list of requests. The agenda also allows creating a new request, where the administrator must first choose the user who the request is being created for.

In addition, the request detail in this agenda contains (compared to the end user request detail) a possibility of ticking that the request is not to be approved. The request detail also contains a log. This log contains all crucial information which occur during the life cycle of the request (errors, duplicates, request cancellation due to integrity, executed operations, etc.).

When role or contract (using in the some concept) is deleted and workflow process for that concept is not ended, the must be that process terminated. We cannot use standard 'cancel' of subprocess, because this operation does not triggered the main process.

This cause the main process will be frozen, because from his view cancelled subprocess never ended.

For prevent this situation is concept's subprocess not cancelled, but disapproved ( on delete role or contract).

It means if a current process task contains a decision with ID 'disapprove', then it is used. When a disapproval decision is not found, the standard cancellation of process is called.

If the request-permission-change-without-approval mode is not used, process "approve-identity-change-permissions" will be started. This process ensures the approval of the request as a whole and its base implementation is composed of these parts:

  • Process name generating (the applicant's name will also be stated in the name)
  • Approval by the helpdesk department.
  • Approval by the manager of the applicant.
  • Approval by the user administration department.
  • Execution of subprocesses for each requested role.
  • Approval of role incompatibilities
  • Approval by the security department.
  • Sending the notification.
  • Realization of the request - the realization itself is not carried out by the process, but by the service for managing requests for permission change.

System state

The role request has a status item that identifies whether the request has already been executed. The Executed state in this case means that the request has been approved and the changes have been executed in IdM. This state only reflects the state in IdM.

This status does not cover a situation where some of the assigned roles create an account on a system. In this case, it may be important for the user to know the exact time the account was successfully created. Alternatively, if there is an error on the system, it is good to know this information in the role request itself.

These requirements solve the system state. Which represents how the implementation of the request on systems has ended.

Some of the provisioning operations is not completed.

This is typically a situation where the connector (target system) is waiting to process the operation.

Second situation when could be request in running state is if role assign the virtual system.

If the request assign or changes an account on the virtual system, then the virtual system creates a request by default, pending implementation by the appropriate implementer. Our request to change roles will be in a running state until all possible requests on virtual systems are resolved. The purpose of this wait is to ensure that the final notification of the completion of the request is sent after the real implementation of the requirements on the systems representing the virtual systems.

In this situation has system state RUNNING orange color and show message: Some requests on this vritual systems [Name of vritual systems] are not resloved!.

If the request contains pending virtual system requests, the 'status on the systems' will be set to executed only if all virtual system requests will be resolved. This means that they will either be successfully approved or will be rejected by implementer. If the virtual system request is rejected, the status on the request item will be set to CANCELED.

Some of the provisioning operations failed.

This is typically a situation where the connector throw an exception. If you click on the status, you will see information on which systems have failed.

If the request contains an error, the status on the systems will be set to executed only if all errors are resolved. This means that they will either be successfully executed (for example by retry mechanism) or will be canceled. If the operation is canceled, the status on the request item will also be set to CANCELED.

Detail of failed request

On the detail of a request that has provisioning errors, the roles that connect the system to which the error occurred are marked with a specific error.

If one role assigns more than one system and an error occurs on both, error for only one system will be displayed.

If the entire request contains only one provisioning error, the log of that error is displayed on the request detail (Error log from a systems).

Some of the provisioning operations were blocked.

This is typically a situation where some system has blocked write operations. The behavior in this case is very similar to the case when the provisioning operation is in the error. If you click on the status, you will see information which systems are blocked.

If the request contains a blocked operations, the status on the systems will be set to executed only if all blocked operations will be resolved. This means that they will either be successfully executed or will be canceled. If the operation is canceled, the status on the request item will also be set to CANCELED.

This state is very similar to the case when the provisioning operation is blocked. Occures where system is seta to read only mode.

Role is allowed to be deleted only if it is not assigned to any identity. This requirement is checked during prevalidation process and user is informed about this. Another provided information pertains to the number of role request concepts from which a reference to the deleted role needs to be removed. This additional information is for user useful because deletion of even single role which was previously assigned to many (assume hundreds) identities may take long time. This warning is currently displayed if number of request concepts to modify exceeds 100 items. Images below are only for illustration and don't take this into account.

Results of actions connected with the process of role removal are still possible to see in Audit tab. We can see here that role deletion was accompanied with role removal from 4 role request concepts.

In the provisioning operations agenda, all operations that were created under a given request have a link to that request (key icon).

Similarly in the agenda of virtual system's requests, all requests that were created under a given role request have a link to that request (key icon).

These notifications are sent when the application is fully completed.

Notifications are controlled by same rules (configuration properties) as notifications sending after end of approval process (read more).
Completion is considered a state where the request has the request set "Status in IdM" to "EXECUTED" and the "Status on systems" is "EXECUTED" or empty (the status can be empty if the request does not change any role that would assigned a system).

Two notifications are sent, one to the author of the request and the other to whom the request changes permissions. The notification contains a list of all directly changed roles (ie does not include business roles). Roles are displayed in three tables according to the type of operation they performed with the role (assignment, modification, deletion).

The notification also contains a column "Problems on systems". This column is filled only if there is a problem on the system that assigns the role. Typically, this column may contain a value of "Canceled" to indicate that the provisioning operation has been canceled or the request has been rejected on the virtual system.

The notification includes a link to the detail of the relevant IdM role change request.

Name of email templates:

  • changeIdentityRoleImplementer
  • changeIdentityRole
The same templates (but different topics) are used and sent when the approval process is successfully completed. They contain the same data, the difference is only at the moment of submission (immediately after approval in IdM) and in the column "Problems on systems" is not filled.
Beware, these templates have been redesigned in version 9.7.0 and must be manually updated in all environments after upgrading to this version.

Name of topics:

  • core:roleRequestRealizedApplicant
  • core:roleRequestRealizedImplementer
Beware, these topics are disabled be default! If you want to use this notification, you have to enable these topics first!