PingOne Advanced Identity Cloud

Prepare applications for entitlements

Before your end users can work entitlements, tenant or governance administrators must prepare the applications for entitlements.

Key tasks are:

For more details on provisioning applications, learn more in Provision an application.

Load entitlements into Advanced Identity Cloud

When you onboard a target application into Advanced Identity Cloud, it also pulls in the application’s entitlements. Each application’s account schema includes one or more attributes that define the account’s privileges, which the target system assigns to accounts. These attributes depend on other objects in the application, known as non-account objects. Non-account objects represent entities linked to the user entity in the target system. Examples of non-account objects are roles, groups, departments, permissions, and licenses. For example, in a Salesforce application, the group object property is mapped to the GroupIds field in the Advanced Identity Cloud user identity, which serve as the source for the account’s allowed entitlements.

The system later brings in any entitlement changes through reconciliation, the process of comparing and synchronizing identity data between the Identity Governance system and external target systems.

You must run entitlement reconciliations at regular intervals depending upon how frequently new entitlements are added to or deleted from the target application.

Validate the entitlement configuration

After you have pulled in the entitlements into Advanced Identity Cloud, you see that most applications in the application catalog have predefined entitlement configurations. You must first validate the application configuration by:

  • Verifying that the account attribute has been correctly tagged as an entitlement based on your requirements.

  • Verify the account attribute is associated with the correct non-account object.

To validate the entitlement configuration and verify the account attribute:

  1. In the Advanced Identity Cloud admin console, go to Applications > Browse App Catalog.

  2. Select an application and click the Provisioning tab.

  3. On the Details page, make sure you are viewing the User object type.

  4. On the User object page, click Properties.

  5. Select the account attribute containing the entitlements to be assigned to the account.

    For most applications in the application catalog, the star icon identifies the attribute.

    Account attributes identified as an entitlement have a star next to them.
  6. Click more_horiz > Edit to view or edit the property.

  7. Verify that the application object type attribute has the correct non-account object specified and that you selected the entitlement checkbox. For example, the following image displays the servicePlanIds property:

    The Edit Property page displaying the entitlement box.

    There are some applications that require you to manually set the non-account object including:

    • Scripted REST

    • Scripted Groovy

    • Scripted Table

    • PowerShell

    • Multi-file CSV

    • SCIM

  8. Click Data to preview the information, providing a real-time view of the target system data. You can scroll right to view the whole dataset.

    Applications data view.

Configure user-friendly display names

When you onboard entitlements into Advanced Identity Cloud, they can have highly cryptic or technical names that make its purpose difficult to ascertain. To ensure user-friendly names appear when displaying accounts or entitlements, configure the application object types accordingly.

  1. In the Advanced Identity Cloud admin console, go to Applications > Browse App Catalog.

  2. Select an application and click the Provisioning tab.

  3. On the Details page, make sure you are viewing the User object type.

  4. In the Display Name Attribute field, select a single-valued string attribute from the target application.

  5. Click Save.

  6. Repeat steps 1–5 for the other object types.

    The following video shows an example:

Configure the entitlement glossary

Administrators can enhance entitlements by adding meaningful business context, helping users understand their purpose and supporting Identity Governance in decision-making. This context is managed through the entitlement glossary, where administrators can add custom attributes in addition to the default ones.

Load entitlements on-demand

Before running a reconciliation, make sure you have configured it to your requirements.

  1. In the Advanced Identity Cloud admin console, go to Applications > Browse App Catalog.

  2. Select an application and click the Provisioning tab.

  3. On the Details page, make sure you are viewing the User object type.

  4. Click Reconciliation > Reconcile.

  5. Click Reconcile Now if you want to onboard the entitlements immediately.

    The page displays the results of your reconciliation. You can see the successful and unsuccessful matches.

    The application reconciliation page displaying a summary of successful and unsuccessful matches.