CreateChangeRequest webservice call with <AccountChange> does not fail on SoD Violations for RSA Via Lifecycle & Governance
Originally Published: 2016-07-14
Article Number
Applies To
RSA Version/Condition: 7.0
Issue
Given the SoD rule with the Entitlement Specification as noted below, a user having or requesting both the Role Administrator and System Administrator roles should result in an SoD violation.
Now, if a user named 'jsmith' who already has the Role Administrator role requests the System Administrator role using the request xml below through Webservices, the Change Request gets created successfully instead of showing SoD violation details.
The webservice call is shown here:
<Changes> <AccountChange> <Operation>Add</Operation> <User>jsmith</User> <BusinessSource>Aveksa</BusinessSource> <ApplicationRole>System Administrator</ApplicationRole> </AccountChange> </Changes>
The code below shows the wrong response:
<createChangeRequest>
<Request type="fulfillment">
<Id>51</Id>
<Name>00091</Name>
</Request>
</createChangeRequest>Resolution
The correct webservice request xml is shown here, that should be sent for user 'jsmith' in the above example.
The webservice call is shown here:
<Changes> <UserChange> <Operation>Add</Operation> <User>jsmith</User> <BusinessSource>Aveksa</BusinessSource> <ApplicationRole>System Administrator</ApplicationRole> </UserChange> </Changes>
The correct response is shown here, now with violation details. The EntitledId value refers to the internal database ID of the user.
<Request> <Violations> <Violation> <AccountId/> <ActionName/> <ApplicationId>1</ApplicationId> <ApplicationName>Aveksa</ApplicationName> <CollectorId/> <DetectionDate/> <EntitledId>14</EntitledId> <EntitlementId>358</EntitlementId> <EntitlementName>System Administrator</EntitlementName> <EntitlementType>app-role</EntitlementType> <FirstName>Dan</FirstName> <Id>0</Id> <IsDirect>1</IsDirect> <LastName>Smith</LastName> <Path/> <ResourceName/> <RuleName>SOD Rule</RuleName> <State>CE</State> <UserDisplayName>Smith, John</UserDisplayName> <ViolatingEntId>358</ViolatingEntId> <ViolatingEntName>System Administrator</ViolatingEntName> <ViolatingEntType>app-role</ViolatingEntType> </Violation> </Violations> </Request>
Related Articles
Creating change request using parameter <scope> via webservice call in RSA Identity Governance & Lifecycle 22Number of Views createChangeRequest Delete Account web serivce call not working in RSA Identity Management and Governance 6.9.1 33Number of Views Radius server aborts at call to free() with invalid pointer and produces Core file 6Number of Views IDC unification runs into an error called by by webservice call in RSA Identity Governance & Lifecycle 26Number of Views Unification runs into an error called by webservice call in RSA Identity Governance & Lifecycle 21Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Release Notes for RSA Authentication Manager 8.8 Deploying RSA Authenticator 6.2.2 for Windows Using DISM Downloading RSA Authentication Manager license files or RSA Software token seed records
Don't see what you're looking for?