AD account collector is not collecting the Last Login Date and Expiration Date in RSA Identity Governance and Lifecycle 7.0.2
2 years ago
Originally Published: 2019-02-11
Article Number
000044680
Applies To
RSA Product Set:  RSA Identity Governance and Lifecycle
RSA Product/Service Type: Appliance
RSA Version/Condition: 7.0.x

 
Issue
After upgrade from 7.0.1 to 7.0.2, AD account collector is not collecting last login date.

Before Correct Mapping
Cause
After you migrate from RSA Identity Governance and Lifecycle Version 7.0.1 to 7.0.2 P05 or higher version, you will notice below two attributes are added to be configured on page 'Mapping for account and user account attributes':

AD-ADC-Config

These mapped attributes are actually the column names in accounts table as shown below:

columns-in-accounts-table

While configuring the mappings for above two columns, respective attributes from Active Directory should be used. The correct configuration is shown in Resolution section below.
Resolution
In order to collect the attributes 'Last Login Date' (Associated Column:LAST_LOGIN_DATE) and 'Expiration Date' (Associated Column:EXPIRATION_DATE), please configure the mapping as shown below:

'accountExpires' and 'lastLogOn' AD attributes to map to the respective attributes 'Expiration Date' and 'Last Login Date'. 

correct-mapping

In RSA Identity Governance and Lifecycle 7.0.1 and 7.0.2 P01 to P04 versions, the LAST_LOGIN_DATE attribute collects 'lastLogOn' attribute of accounts from AD and this is internal mapping, these two attributes are not configurable in GUI.
 
However, from RSA Identity Governance and Lifecycle 7.0.2 P05 and onwards, LAST_LOGIN_DATE attribute has been made configurable on collector UI and its mapping can be modified as per requirement.  Also this attribute configuration is optional. 

The default mapping that we provide for this attribute is 'LastLogon' attribute from Active Directory.

LastLogon:
When a user logs on, this attribute is updated on the Domain Controller that provided the authentication ONLY. Because it is only updated on one DC, that means this attribute is not replicated. 

For reference: 
https://social.technet.microsoft.com/wiki/contents/articles/22461.understanding-the-ad-account-attributes-lastlogon-lastlogontimestamp-and-lastlogondate.aspx

After correcting the mapping, both attribute values are collected correctly as shown below:

After-Correct-Mapping
Workaround
There is another attribute named 'LastLogonTimeStamp' which is replicated version of the LastLogon attribute. 

You can use 'LastLogonTimeStamp' by collecting it in a custom attribute of type "Date" and in the ADC , we can map the custom attribute to lastLogontimeStamp and run the collection. In the Raw data collected , you can verify that the attribute is collected properly and shown in Date format.