This website uses cookies. By clicking OK, you consent to the use of cookies. Click Here to learn more about how we use cookies.
OK
  • RSA.com
  • Products
    • Archer®
      • Archer®
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Archer® Exchange
      • Training
      • Upcoming Events
      • Videos
    • RSA® Fraud & Risk Intelligence Suite
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Web Threat Detection
      • Upcoming Events
      • Videos
    • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Cloud
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Patch Content
      • Videos
    • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication Mobile SDK
      • Advisories
      • Events
      • Ideas
      • Knowledge Base
      • Request Access
      • Training
    • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication for eCommerce
      • RSA® Adaptive Authentication for eCommerce
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® FraudAction Services
      • RSA® FraudAction Services
      • Advisories
      • Discussions
      • Documentation
      • Ideas
      • Videos
    • RSA® Web Threat Detection
      • RSA® Web Threat Detection
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Videos
    • RSA NetWitness® Platform
      • RSA NetWitness® Platform
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA NetWitness® Detect AI
      • RSA NetWitness® Detect AI
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Investigator
      • RSA NetWitness® Investigator
      • Documentation
      • Download the Client
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Orchestrator
      • RSA NetWitness® Orchestrator
      • Overview
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA SecurID® Suite
      • RSA SecurID® Suite
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Knowledge Base
      • Ideas
      • Integrations
      • Training
      • Videos
    • RSA® Identity Governance & Lifecycle
      • RSA® Identity Governance & Lifecycle
      • Advisories
      • Blog
      • Community Exchange
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA SecurID® Access
      • RSA SecurID® Access
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • Other RSA® Products
      • Other RSA® Products
      • RSA® Access Manager
      • RSA® Data Loss Prevention
      • RSA® Digital Certificate Solutions
      • RSA enVision®
      • RSA® Federated Identity Manager
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
  • Resources
    • Advisories
      • Product Advisories on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Hosted
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Product Advisories
    • Blogs
      • Blogs on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Blogs on RSA Link
    • Discussion Forums
      • Discussion Forums
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Discussion Forums on RSA Link
    • Documentation
      • Product Documentation
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Downloads
      • Product Downloads
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Downloads on RSA Link
    • Ideas
      • Idea Exchange
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Knowledge Base
      • Knowledge Base
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Knowledge Base Pages on RSA Link
    • Upcoming Events on RSA Link
      • Upcoming Events
    • Videos
      • Videos on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Videos on RSA Link
  • Support
    • RSA Link Support
      • RSA Link Support
      • News & Announcements
      • Getting Started
      • Support Forum
      • Support Knowledge Base
      • Ideas & Suggestions
    • RSA Product Support
      • RSA Product Support
      • General Security Advisories and Statements
      • Product Life Cycle
      • Support Information
      •  
      •  
      •  
      •  
      •  
  • RSA Ready
  • RSA University
    • Certification Program
      • Certification Program
    • Course Catalogs
      • Course Catalogs
      • Archer®
      • RSA NetWitness® Platform
      • RSA SecurID® Suite
    • On-Demand Subscriptions
      • On-Demand Subscriptions
      • Archer®
      • RSA NetWitness® Platform
      • RSA SecurID® Suite
    • Product Training
      • Product Training
      • Archer®
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Identity Governance & Lifecycle
      • RSA NeWitness® Platform
      • RSA SecurID® Access
    • Student Resources
      • Student Resources
      • Access On-Demand Learning
      • Access Virtual Labs
      • Contact RSA University
      • Enrollments & Transcripts
      • Frequently Asked Questions
      • Getting Started
      • Learning Modalities
      • Payments & Cancellations
      • Private Training
      • Training Center Locations
      • Training Credits
      • YouTube Channel
    • Upcoming Events
      • Upcoming Events
      • Full Calendar
      • Conferences
      • Live Classroom Training
      • Live Virtual Classroom Training
      • Webinars
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

Visit the Known Issues dashboard if you are experiencing issues on RSA Link

View Dashboard

RSA® Identity Governance & Lifecycle Discussions

Discussions about RSA Identity Governance & Lifecycle.
  • RSA Link
  • :
  • Products
  • :
  • RSA SecurID Suite
  • :
  • RSA Identity Governance & Lifecycle
  • :
  • Discussions
  • :
  • Simple workflow request
  • Options
    • Subscribe to RSS Feed
    • Mark Topic as New
    • Mark Topic as Read
    • Float this Topic for Current User
    • Bookmark
    • Subscribe
    • Mute
    • Printer Friendly Page
ShanelleBlake
ShanelleBlake Beginner
Beginner
‎2020-05-14 07:43 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Simple workflow request

Jump to solution

Hi everyone.
Can I ask for "easy" help?
I am studying the workflows within IGL 7.1.
I would like to ask you for a little help as documentation is not so clear for me.

In an authorization workflow of a request, I would like to make a simple external SQL call to verify a value and, based on the result of the query, give OK or KO to the request. I think it is easy but I have never seen how it is done.

For example I would like to put a decision in the middle of the workflow that says:
- query to a db (maybe the same igl db if possible).

  if the user for whom authorization is requested has title=manager then ok, approve otherwise deny the request.


I can't understand how to creta a value with the result of the query and to use it for subsequent processes (ok or deny).
Can you help me with an example?
Thank you very much!!!!

Shanelle

Labels (1)
Labels
  • Labels:
  • Access & Change Requests

  • Tags:
  • Access & Change Requests
  • Community Thread
  • Discussion
  • Forum Thread
  • Identity G&L
  • Identity Governance & Lifecycle
  • IG&L
  • IGL
  • RSA Identity
  • RSA Identity G&L
  • RSA Identity Governance & Lifecycle
  • RSA Identity Governance and Lifecycle
  • RSA IGL
0 Likes
Share
Reply
  • All forum topics
  • Previous Topic
  • Next Topic
1 Solution

Accepted Solutions
CliveMorrish
Moderator CliveMorrish Moderator
Moderator
In response to ShanelleBlake
‎2020-05-14 10:06 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

As mentioned earlier, a simpler way may be to simply restrict who can use the request buttons. As an example, you could restrict the 'Add Access' button to only those users with a certain Title:

 

pastedImage_1.png

 

You'd then know the request was raised by a 'Manager' and wouldn't need to perform calculations within the workflow.

 

However, in response to your question around how to create a value. Firstly, never update the out of the box workflows as these could be change/updated/overwritten when you patch/upgrade. Instead create a new workflow and use the Copy From option.

 

Use the SQL Select node to query the IGL database. As example, the following query checks the Title of the user that the Request has been raised for ('${access_request_cri_meu_title}'), these variables are available by right clicking within the workflow node. Set the Variable Type to Job - there are other types available, details of which can be found on the community.

 

pastedImage_9.png

 

Once you save the workflow, the new ISMANAGER Variable will be available to select.

 

Then, using a Decision Node you can use the 'Workflow Variable' option to determine your transition criteria:

 

pastedImage_10.png

 

You then need to use Transition Nodes to route the request accordingly. You must have a True and a False transition. For the True transition, make sure the 'Evaluated to True' tick box is set

 

pastedImage_11.png

 

To summarize:

 

pastedImage_12.png

 

1. Queries the IGL DB to calculate the variable that will be used to determine how the request is handled

2. Uses the Variable from 1 to route the request accordingly

3. Where the request is for a user with the Title 'Manager' the request will be sent for approval (in this example)

4. Where the request is for a user where the Title is not 'Manager' the request will be cancelled

 

As always, please take backups and first make changes in a non production environment.

 

Additionally, workflows can grow and become unnecessarily complex - it's always worth considering if there's a simpler more out of the box approach before adding to the workflow logic.

View solution in original post

6 Likes
Share
Reply
5 Replies
CliveMorrish
Moderator CliveMorrish Moderator
Moderator
‎2020-05-14 07:55 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Hi Shanelle,

 

Although what you described sounds achievable, it would be interesting to fully understand the use case as there may be a simpler approach.

 

Some questions:

  • Is this required for ALL requests no matter what is being requested?
  • Should only users with the Title 'Manager' be permitted to raise requests?

 

Personally I think it would be better to try and stop the Request even being raised instead of raising and then cancelling.

 

Thanks,

Clive

0 Likes
Share
Reply
ShanelleBlake
ShanelleBlake Beginner
Beginner
‎2020-05-14 09:32 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Hi,

my idea is to configure specific requests flow for each application.

In this case, I would apply the flow of authorization request that start from an user or from his manager.

 

So, let's say a manager starts a request (maybe with a form) to add an entitlement for a person.

This should fire a request workflow with some approval steps.

I would like to start with a simple use-case and so in some part of the workflow a query to a database (maybe the same igl db if possible) will check for the title value of the user: if the value  title=manager then the request is approved, otherwise no.

With the occasion I would understand how to create a value, add the result of the query on it and to use it for subsequent processes (ok or deny).

Thanks

Shanelle

1 Like
Share
Reply
CliveMorrish
Moderator CliveMorrish Moderator
Moderator
In response to ShanelleBlake
‎2020-05-14 10:06 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

As mentioned earlier, a simpler way may be to simply restrict who can use the request buttons. As an example, you could restrict the 'Add Access' button to only those users with a certain Title:

 

pastedImage_1.png

 

You'd then know the request was raised by a 'Manager' and wouldn't need to perform calculations within the workflow.

 

However, in response to your question around how to create a value. Firstly, never update the out of the box workflows as these could be change/updated/overwritten when you patch/upgrade. Instead create a new workflow and use the Copy From option.

 

Use the SQL Select node to query the IGL database. As example, the following query checks the Title of the user that the Request has been raised for ('${access_request_cri_meu_title}'), these variables are available by right clicking within the workflow node. Set the Variable Type to Job - there are other types available, details of which can be found on the community.

 

pastedImage_9.png

 

Once you save the workflow, the new ISMANAGER Variable will be available to select.

 

Then, using a Decision Node you can use the 'Workflow Variable' option to determine your transition criteria:

 

pastedImage_10.png

 

You then need to use Transition Nodes to route the request accordingly. You must have a True and a False transition. For the True transition, make sure the 'Evaluated to True' tick box is set

 

pastedImage_11.png

 

To summarize:

 

pastedImage_12.png

 

1. Queries the IGL DB to calculate the variable that will be used to determine how the request is handled

2. Uses the Variable from 1 to route the request accordingly

3. Where the request is for a user with the Title 'Manager' the request will be sent for approval (in this example)

4. Where the request is for a user where the Title is not 'Manager' the request will be cancelled

 

As always, please take backups and first make changes in a non production environment.

 

Additionally, workflows can grow and become unnecessarily complex - it's always worth considering if there's a simpler more out of the box approach before adding to the workflow logic.

View solution in original post

6 Likes
Share
Reply
ShanelleBlake
ShanelleBlake Beginner
Beginner
‎2020-05-16 12:59 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Thanks!
Thank you very much Clive!!
It was precisely the clarification I was looking for but I couldn't find it anywhere.
I want to congratulate you because you took great care and attention to explain the tasks with the screenshots too.

May I ask just a question about your comments?

When you say:

" ---> Request has been raised for ('${access_request_cri_meu_title}') "

I think the "access_request" prefix is ready on IGL. Last part "_cri_meu_title" is something you created manually later?

About the prefix "access_request", is there a doc that contains all command, prefix and similar we can use in IGL?


Thanks, really thanks.
Really a nice community

Shanelle

6 Likes
Share
Reply
CliveMorrish
Moderator CliveMorrish Moderator
Moderator
In response to ShanelleBlake
‎2020-05-18 05:02 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Thank you for the feedback Shanelle and I'm really glad that my response helped.

 

The ${access_request_cri_meu_title} variable is available to select by Right Clicking within the SQL Select node. This will display a list of out of the box variables and any new ones you've created within the workflow. 

 

See below, Right Click displays a list where you can then choose 'Change Request'. We're then selecting the Title of the User affected by this Change Request.

 

pastedImage_3.png

 

Hopefully that helps...

 

Cheers,

Clive

5 Likes
Share
Reply
Related Topics
Simple Change Request Generation via Workflow
Powered by Khoros
  • Products
  • Resources
  • Solutions
  • RSA University
  • Support
  • RSA Labs
  • RSA Ready
  • About RSA Link
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
© 2020 RSA Security LLC or its affiliates.
All rights reserved.