Design migration process

To create a profile of a user's access, we will need to:

  • Define the application in OpenIAM
  • Import entitlements

Most organizations have a collection applications which can be integrated through connectors and others which cannot. For the applications which connectors, you can review the connector documentation. However, for those that do not, we cna import them through a CSV file. To simplify this process, out of the box templates have been provided.

Load application list

First load the list of applications into OpenIAM. Use a CSV file with the format described below.

Column nameDescription
MANAGED_SYSTEM_NAMEName as it will defined in OpenIAM
DESCRIPTIONUser friendly description of this application or service
IS_MANUALY - if a connector does not exist. N - if a connector does exist
IS_ACTIVEY - Configuration is available for use. N - configuration disabled and no tasks will be processed for this application.
IS_VISIBLEY - Application is visible in the catalog. N - application is not visible in the catalog.
PARTICIPATE_IN_ACCESSCERTIFICATIONY - Application is available for use in access certification. N - application is not available for use in access certification
CONNECTOR_NAMEName of the OpenIAM connector which will be used with this configuration
URLURL of the application, service or tenant.
PORTPort this application is listening on.
CATEGORY_NAMECategory under which the application should be listed in the service catalog.
PERMISSIONS_LISTPermissions which will be used with this application. Example: READ, WRITE, EXECUTE. These can be unique to this application
APPLICATION_OWNER_TYPEType of application owner: User or Group
APPLICATION_OWNERName of the application owner
APPLICATION_ADMIN_TYPEType of application admin : User or Group
APPLICATION_ADMINName of the application admin
APPROVER1_TYPEType of first approver: Supervisor, application owner, application admin, entitlement owner, specific user or group
APPROVER1Name of the first approver (user name or group name )
APPROVER2_TYPEType of second approver: Supervisor, application owner, application admin, entitlement owner, specific user or group
APPROVER2Name of the second approver (user name or group name )
APPROVER3_TYPEType of third approver: Supervisor, application owner, application admin, entitlement owner, specified user or group
APPROVER3Name of the third approver (user name or group name )

Example:

MANAGED_SYSTEM_NAME,DESCRIPTION,IS_MANUAL,IS_ACTIVE,IS_VISIBLE,PARTICIPATE_IN_ACCESSCERTIFICATION,CONNECTOR_NAME,URL,PORT,CATEGORY_NAME,PERMISSIONS_LIST,APPLICATION_OWNER_TYPE,APPLICATION_OWNER,APPLICATION_ADMIN_TYPE,APPLICATION_ADMIN,APPROVER1_TYPE,APPROVER1,APPROVER2_TYPE,APPROVER2,APPROVER3_TYPE,APPROVER3
Adobe Creative Cloud,,Y,Y,Y,,,,,Enterprise Applications,,,,GROUP,IT_HelpDesk,SUPERVISOR,Reports To,GROUP,Information_Security,,
Salesforce ,,Y,Y,Y,,,,,Sales,,,,GROUP,IT_HelpDesk,SUPERVISOR,Reports To,GROUP,Information_Security,,

Load entitlements

The next steps is to load the entitlements that users have. This step assumes that the user has already be created in OpenIAM and we are simply adding the permissions that a user has in each application.

Column nameDescription
MANAGED_SYSTEM_NAMEName of managed system. This value MUST align exactly with the managed system name from the file above
GROUP_TYPEIf you are defining a group, then enter the group metadata type. This allows us to define types which are specific to an application.
ROLE_TYPEIf you are defining a role, then enter the role metadata type. This allows us to define types which are specific to an application.
ENTITLEMENT_NAMEEnter the group / role name.
IS_ACTIVEFlag indicating if this entitlement is active or not.
ENTITLEMENT_OWNER_TYPEType of entitlement owner: User or Group
ENTITLEMENT_OWNERName of the entitlement owner
ENTITLEMENT_ADMIN_TYPEType of entitlement admin : User or Group
ENTITLEMENT_ADMINName of the entitlement admin
APPROVER1_TYPEType of first approver: Supervisor, application owner, application admin, entitlement owner, specific user or group
APPROVER1Name of the first approver (user name or group name )
APPROVER2_TYPEType of second approver: Supervisor, application owner, application admin, entitlement owner, specific user or group
APPROVER2Name of the second approver (user name or group name )
APPROVER3_TYPEType of third approver: Supervisor, application owner, application admin, entitlement owner, specific user or group
APPROVER3Name of the third approver (user name or group name )

Note, that when we defining the approval flow, OpenIAM supports defining the flow at both the application and entitlement level. In this way, you can define the approval flow at the application level and override it at the entitlement level if needed.

Example:

MANAGED_SYSTEM_NAME,GROUP_TYPE,ROLE_TYPE,ENTITLEMENT_NAME,IS_ACTIVE,ENTITLEMENT_OWNER_TYPE,ENTITLEMENT_OWNER,ENTITLEMENT_ADMIN_TYPE,ENTITLEMENT_ADMIN,APPROVER1_TYPE,APPROVER1,APPROVER2_TYPE,APPROVER2,APPROVER3_TYPE,APPROVER3
MyApp,Application,,Third Party Application Support ServiceNow,Y,,,,,,,,,,
MyApp,Application,,Third Party Application Support MGR ServiceNow,Y,,,,,,,,,,
MyApp,Application,,Third Party DBA Support ServiceNow,Y,,,,,,,,,,
MyApp,Application,,Third Party DBA Support MGR ServiceNow,Y,,,,,,,,,,