You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: sailpoint/beta/docs/Methods/AccessRequestsApi.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -186,8 +186,9 @@ if you submit duplicate access requests in quick succession or submit an access
186
186
It's best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can
187
187
be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also
188
188
use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting
189
-
an access request to ensure that you aren't requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request.
190
-
These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API.
189
+
an access request to ensure that you aren't requesting access that is already granted. If you use this API to request access that an identity already has,
190
+
without changing the account details or end date information from the existing assignment,
191
+
the API will cancel the request as a duplicate.
191
192
192
193
There are two types of access request:
193
194
@@ -196,17 +197,19 @@ __GRANT_ACCESS__
196
197
* Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options.
197
198
* Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others.
198
199
* Roles, access profiles and entitlements can be requested.
200
+
* You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time.
201
+
* If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time.
199
202
* While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request.
200
203
* Now supports an alternate field 'requestedForWithRequestedItems' for users to specify account selections while requesting items where they have more than one account on the source.
201
204
202
205
__REVOKE_ACCESS__
203
206
* Can only be requested for a single identity at a time.
204
207
* You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning.
205
208
* Does not support self request. Only manager can request to revoke access for their directly managed employees.
206
-
* If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements.
209
+
* If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time.
207
210
* Roles, access profiles, and entitlements can be requested for revocation.
208
211
* Revoke requests for entitlements are limited to 1 entitlement per access request currently.
209
-
* You can specify a `removeDate`if the access doesn't already have a sunset date. The `removeDate` must be a future date, in the UTC timezone.
212
+
* You can specify a `removeDate`to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time.
210
213
* Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
211
214
* Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of 'assignmentId' and 'nativeIdentity' fields. These fields should be used within the 'requestedItems' section for the revoke requests.
212
215
* Usage of 'requestedForWithRequestedItems' field is not supported for revoke requests.
Copy file name to clipboardExpand all lines: sailpoint/beta/docs/Models/AccessRequestItem.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ Name | Type | Description | Notes
20
20
**id** | **str** | ID of Role, Access Profile or Entitlement being requested. | [required]
21
21
**comment** | **str** | Comment provided by requester. * Comment is required when the request is of type Revoke Access. | [optional]
22
22
**client_metadata** | **map[string]str** | Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status. | [optional]
23
-
**remove_date** | **datetime** | The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration. | [optional]
23
+
**remove_date** | **datetime** | The date and time the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date-time in the future. * The current SLA for the deprovisioning is 24 hours. * This date-time can be used to change the duration of an existing access item assignment for the specified identity. A GRANT_ACCESS request can extend duration or even remove an expiration date, and either a GRANT_ACCESS or REVOKE_ACCESS request can reduce duration or add an expiration date where one has not previously been present. You can change the expiration date in requests for yourself or others you are authorized to request for. | [optional]
24
24
**assignment_id** | **str** | The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source. | [optional]
25
25
**native_identity** | **str** | The unique identifier for an account on the identity, designated as the account ID attribute in the source's account schema. This is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source. | [optional]
Copy file name to clipboardExpand all lines: sailpoint/beta/docs/Models/RequestedItemDtoRef.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ Name | Type | Description | Notes
20
20
**id** | **str** | ID of Role, Access Profile or Entitlement being requested. | [required]
21
21
**comment** | **str** | Comment provided by requester. * Comment is required when the request is of type Revoke Access. | [optional]
22
22
**client_metadata** | **map[string]str** | Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status. | [optional]
23
-
**remove_date** | **datetime** | The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration. | [optional]
23
+
**remove_date** | **datetime** | The date and time the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date-time in the future. * The current SLA for the deprovisioning is 24 hours. * This date-time can be used to change the duration of an existing access item assignment for the specified identity. A GRANT_ACCESS request can extend duration or even remove an expiration date, and either a GRANT_ACCESS or REVOKE_ACCESS request can reduce duration or add an expiration date where one has not previously been present. You can change the expiration date in requests for yourself or others you are authorized to request for. | [optional]
24
24
**account_selection** | [**[]SourceItemRef**](source-item-ref) | The accounts where the access item will be provisioned to * Includes selections performed by the user in the event of multiple accounts existing on the same source * Also includes details for sources where user only has one account | [optional]
Copy file name to clipboardExpand all lines: sailpoint/beta/models/access_request_item.py
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ class AccessRequestItem(BaseModel):
32
32
id: StrictStr=Field(description="ID of Role, Access Profile or Entitlement being requested.")
33
33
comment: Optional[StrictStr] =Field(default=None, description="Comment provided by requester. * Comment is required when the request is of type Revoke Access. ")
34
34
client_metadata: Optional[Dict[str, StrictStr]] =Field(default=None, description="Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.", alias="clientMetadata")
35
-
remove_date: Optional[datetime] =Field(default=None, description="The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration. ", alias="removeDate")
35
+
remove_date: Optional[datetime] =Field(default=None, description="The date and time the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date-time in the future. * The current SLA for the deprovisioning is 24 hours. * This date-time can be used to change the duration of an existing access item assignment for the specified identity. A GRANT_ACCESS request can extend duration or even remove an expiration date, and either a GRANT_ACCESS or REVOKE_ACCESS request can reduce duration or add an expiration date where one has not previously been present. You can change the expiration date in requests for yourself or others you are authorized to request for. ", alias="removeDate")
36
36
assignment_id: Optional[StrictStr] =Field(default=None, description="The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source. ", alias="assignmentId")
37
37
native_identity: Optional[StrictStr] =Field(default=None, description="The unique identifier for an account on the identity, designated as the account ID attribute in the source's account schema. This is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source. ", alias="nativeIdentity")
Copy file name to clipboardExpand all lines: sailpoint/beta/models/requested_item_dto_ref.py
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ class RequestedItemDtoRef(BaseModel):
33
33
id: StrictStr=Field(description="ID of Role, Access Profile or Entitlement being requested.")
34
34
comment: Optional[StrictStr] =Field(default=None, description="Comment provided by requester. * Comment is required when the request is of type Revoke Access. ")
35
35
client_metadata: Optional[Dict[str, StrictStr]] =Field(default=None, description="Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.", alias="clientMetadata")
36
-
remove_date: Optional[datetime] =Field(default=None, description="The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration. ", alias="removeDate")
36
+
remove_date: Optional[datetime] =Field(default=None, description="The date and time the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date-time in the future. * The current SLA for the deprovisioning is 24 hours. * This date-time can be used to change the duration of an existing access item assignment for the specified identity. A GRANT_ACCESS request can extend duration or even remove an expiration date, and either a GRANT_ACCESS or REVOKE_ACCESS request can reduce duration or add an expiration date where one has not previously been present. You can change the expiration date in requests for yourself or others you are authorized to request for. ", alias="removeDate")
37
37
account_selection: Optional[List[SourceItemRef]] =Field(default=None, description="The accounts where the access item will be provisioned to * Includes selections performed by the user in the event of multiple accounts existing on the same source * Also includes details for sources where user only has one account ", alias="accountSelection")
0 commit comments