Skip to main content
Version: On prem: 15.0.1

Assignments

Assignment reasons and states

All calculated resource assignments have at least one reason that indicates why the assignment was created, for example, an assignment has a reason type that indicates whether the assignment was created due to a direct assignment or an assignment policy.

In addition, a reason type belongs to a state which can be either Actual or Desired:

  • Actual state assignments represent the access that an identity currently has in the connected systems.

  • Desired state assignments represent the access that companies or organizations would like an identity to have based on assignment policies and other criteria.

The following table presents an overview of reason types and states:

Actual state

Reason typeDescription
Actual directThe assignment was added due to the existence of a direct resource assignment in ODW.
Actual indirectThe assignment was added due to the existence of an indirect resource assignment, for example, an assignment due to group-in-group in ODW.
Unconfirmed actualThe assignment was assigned because of a provisioning claim based on a Manual or Omada Provisioning Service provisioning task.

Desired state

Reason typeDescription
DirectThe assignment was added due to the existence of a Resource assignment data object.
The resource assignment must have one of the following statuses:
Inactive, Active, Obsolete, Disabled, Locked.
Also, if the Resource assignment has an Active, Inactive, Active, or Obsolete status, it's only considered if the time of calculation was within its validity period (plus post-validity days).
PolicyThe assignment was added due to the existence of an Assignment policy data object.
Child resourceThe assignment was added due to the assignment of an Business role (or Application role) that the resource is a child of.
Auto accountThe account assignment was added due to the identity not having an account for a system, for which the identity has a CPRA (calculated permission resource assignment), and the automatic creation of accounts has been defined for the system or a resource type.
Review OKThe Review OK reason (survey result) is considered as a second-class desired state, as it is taken into consideration in a secondary cycle in RoPE, and will never stand alone as the only reason for an assignment. Therefore, it can be considered more as an attribute or a flag than a proper desired state. It is recommended to always use a direct assignment or an assignment policy as the desired state, and only use the Review OK reason as a temporary desired state.
AdditionalThe assignment was added by a standard or custom extension in RoPE.

No state

Reason typeDescription
Implicit assignmentThe assignment of an Business role or Application role was added because the identity has assignments for all resources that are contained in the role.
Implicit childThe assignment was added due to the implicit assignment of an Business or Application role which the resource is a child of.

Implicit assignments of roles

If an identity is assigned to all resources that are contained in a compound resource, for example, a business role or an application role, RoPE automatically assigns the compound resource itself to the identity with reason type Implicit assignment. It does not do so for resources that are classified as a Permission resource.

The purposes of this are the following:

  • To be able to define SoD policies on the role level and have them enforced even though an identity is not directly assigned to the roles.
  • To enable access reviews where the answering persons are presented with role assignments rather than technical permissions, as the former is easier to understand from a business perspective.

Implicitly assigned compound resources are traversed by RoPE as if they were assigned in any other way. The assignments of the children get the special reason type Implicit child, instead of the Child resource.

info

The calculation of implicit assignments for new environments is disabled by default. The RoPE: Skip implicit assignments and the Skip implicit assignments for technical identities setting is set to True by default.

You can enable this functionality by setting the RoPE: Skip implicit assignments (RoPESkipImplAssns) or Skip implicit assignments for technical identities (RoPESkipImplAssnsForTechIdent) customer settings to False.