A change request to remove role access from a user tries to remove AD group (indirect access from role) which no longer exists as user access causing errors in RSA Identity Governance & Lifecycle
Originally Published: 2019-04-23
Article Number
Applies To
RSA Version/Condition: 7.0.2, 7.1.0, 7.1.1
Issue
Scenario
User accounts belonging to AD groups are later given access to the same AD groups via a role.A termination rule to trigger for terminated users with action to disable and delete the accounts will trigger when the user is terminated.
If you try to remove the access to role, the change request also tries to remove the indirect AD entitlement and the AFX fulfillment fails with an error:
Cause
Resolution
This issue is fixed in 7.0.2 P14, 7.1.0 P07, and 7.1.1 P01.
Related Articles
A change request to remove role access from a user tries to remove AD group (indirect access from role) which no longer ex… 48Number of Views A completed change request to remove Aveksa Application/Directory entitlements from a user does not remove the access from… 189Number of Views How to Synchronize Nested AD Group Users from an RSA SecurID Access Identity Source 141Number of Views The Active Directory Account Collector does not collect the AD Domain Users Group in RSA Identity Governance & Lifecycle 216Number of Views Delete a duplicate user or duplicate group and run a schedule cleanup job when the identity source no longer exists in RSA… 1.62KNumber of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?