US English (US)
FR French
DE German
PL Polish
SE Swedish
FI Finnish

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

English (US)
US English (US)
FR French
DE German
PL Polish
SE Swedish
FI Finnish
  • Log in
  • Home
  • Identity Governance and Administration (IGA)
  • IGA solution library
  • Instructions & guidelines
  • Configure connectors

Connector Workflow activities

EPE workflow

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Service Management
    Matrix42 Professional Solution Matrix42 Core Solution Enterprise Service Management Matrix42 Intelligence
  • Identity Governance and Administration (IGA)
    IGA overview IGA solution library
  • Platform
    ESM ESS2 ESS Efecte Chat for Service Management Integrations Add-ons
  • Release Notes for M42 Professional, IGA, Conversational AI
    2026.1 2025.3 2025.2 2025.1 2024.2 2024.1 2023.4 2023.3 2023.2 2023.1 2022.4 2022.3 Release Information and Policies
  • Other Material
    Terms & Documentation Guidelines Accessibility Statements
  • Services
+ More
    • Service Management

    • Identity Governance and Administration (IGA)

    • Platform

    • Release Notes for M42 Professional, IGA, Conversational AI

    • Other Material

    • Services

Connector Workflow activities

EPE workflow

The Native Connectors provides the possibilities to orchestrate the following activities.

 

Connector type

Activity 

AD Graph API OpenLDAP Jira IBM LDAP Local ESM 389-LDAP CoreProIGA Generic Python Script FreeIPA / SCIM Generic REST API
Activate/Deactivate User

x

x

x

 

 

 

x

 

     
Add User to Group

x

x

x

x

x

 

x

       
Create User

x

x

x

x

x

x

x

       
Create Group

x

x

x

x

x

 

x

       
Delete Group

x

x

x

x

x

 

x

       
Delete User

x

x

x

x

x

x

x

       
Manage ProxyAddresses

x

 

 

 

 

 

 

       
Remove User Attribute

x

 

x

 

x

 

x

       
Remove User from Group

x

x

x

x

x

 

x

       
Reset User Password

x

x

x

 

 

 

x

       
Unlock User

x

 

x

 

 

 

x

       
Update Group

x

x

x

 

x

 

x

 

     
Update User

x

x

x

 

x

x

x

 

     
Update User's Distinguished Name Value

x

 

x

 

x

 

x

 

     
Verify Group

x

x

x

 

x

 

x

       
Verify Group Membership

x

x

x

 

x

 

x

       
 Verify User

x

x

x

 

x

 

x

       
Create Custom Object

x

x

x

 

x

 

x

       
Update Custom Object

x

x

x

 

x

 

x

       
Delete Custom Object

x

x

x

 

x

 

x

       
Read user data

x

x

x

 

x

 

x

       
Run provisioning task

x

x

x

 

x

 

x

 

x

   
Create Jira ticket

 

 

 

x

 

 

 

 

     
Create data cards

 

 

 

 

 

 

 

x

     
Delete data cards

 

 

 

 

 

 

 

x

     
Execute event task                

x

   
Generic REST Call   x                 x

 

Multi activity feature

Following Activities support multi activity feature, starting from version 2025.3.

Multi activity feature means, that you can for example update multiple users with one Orchestration node. Orchestration node with for example Update user activity can now handle person attribute as a multivalue type attribute. This functionality is very useful if you need for example to change costcenter for 10 users.
 

  • Activate / Deactivate user
  • Add user to group
  • Update user
  • Delete user
  • Delete custom object
  • Remove user attribute
  • Remove user from group
  • Reset user password
  • Unlock user
  • Update custom object

If one Update fails, everything stops -setting on Orchestration Node

If one Update fails, everything stops -setting

This setting affects only if you have multiple objects to update/handle with one Orchestration node. If you have for example one user to update, this setting doesn't affect functionality.

 

If this checkbox is ON, it means that Node stops provisioning after firsts failed one. Failure is stored to Provisioning exception and workflow continues to Exception path. If no failure/exception, workflow continues to Completed flow.

If this checkbox is OFF, it means that Node doesn't stop provisioning after firsts failed one. It continues to make provisioning for all objects it is configured to handle. All failures are stored to Provisioning exception and workflow continues to Exception path. If no failures/exceptions, workflow continues to Completed flow. 

 

 

You can find more detailed configuration instructions below.

 

Directory User activities

Configure: EPE Create User

Create user


In the illustration above, the Identity Attribute Mappings are populated from Provisioning tasks. Admins choose the correct Directory “Target” and are able to view the Identity Mappings which are configured for selected directory tasks. In this orchestration view admins are not allowed to change any mappings, those are presented as a visual aid. If any changes to the mappings are needed, those needs must be execute in the Provisioning task configuration view. 

The creating new user orchestration node read attributes from Data Cards in question and execute LDAP command to Active Directory. It is important to be sure, that Identity Mapping, being used in Create User orchestration node, contains at least two additional Active Directory mappings: for “cn” and “sAMAccountName” attributes. If those two mappings are missing on a given configuration, it will not be presented on a dropdown.  

The creating new user orchestration node read attributes from Data Cards in question and execute API call to Azure. It is important to be sure, that Identity Mapping, being used in Create User orchestration node, contains at least three additional Azure AD mappings: for “displayName”, "mailNickname" and “userPrincipalName” attributes. Note: if those three mappings are missing on a given configuration, it will not be presented on a dropdown.

Creating new user activity notes:

  • There are two ways to create the password for a new user for their first login.
    • Define “Default” password in the Provisioning Task -configuration view
      • That password will only be used by users, when they login into the system for the first time 
    • Generating random password in the workflow and select into which attribute on Identity Mapping data-card it was written to
    • In both cases the first time password “pwdLastSet” value is set to zero (0) to force a user to change their password after the first login
    • Possibility to choose if the password must change at the first login or not. Administrators can make the selection for this directly from the workflow User Creation orchestration node.
  • There are different ways to provide password for the first login for the end-user. Depending on customers needs it is possible to use workflow functionalities to send the password directly to the end user via email or sms. Another option is to send the password for first login to the manager, who will provide it for the end-user. EPE’s Orchestration node itself DO NOT provide that functionality, it needs to be defined elsewhere. 
  • The configuration of “Target” is done in the provisioning task configuration view. For creating new users, admins needs to make sure that there exists only one LDAP userbase / LDAP userfilter in order to avoid conflicts on the workflow
  • Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions. 



Configure: EPE Update User

Update User


In the illustration above, the Identity Attribute Mappings are populated from Provisioning tasks. Admins choose the correct Active Directory “Target” and are able to view the Identity Mappings which are configured for selected AD tasks. In this orchestration view admins are not allowed to change any mappings, those are presented only as a visual aid. If any changes to the mappings are needed, those needs must be execute in the Provisioning task configuration view. 

The update user orchestration node read attributes from Data Cards in question and execute LDAP command to Active Directory or execute API call to Azure AD.

User password update is not supported on this orchestration activity.

The configuration of “Target” is done in the provisioning task configuration view. For updating users, admins needs to make sure that there exists only one LDAP userbase / LDAP userfilter in order to avoid conflicts on the workflow.

Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions. 


Configure: EPE Activate / Deactive User

Activate / Deactive User 


In the illustration above admins choose the correct Active Directory “Target” and are able to view the Identity Mappings which are configured for selected AD tasks. In this orchestration view admins are not allowed to change any mappings, those are presented only as a visual aid. If any changes to the mappings are needed, those needs must be execute in the Provisioning task configuration view. Inside this same node, administrators are able to choose the action what they are prefer to use “Activate” or “Deactivate”. 


Delete

UserAccountControl

Active Directory: ‘Activating/Deactivating’ functionality here refers to setting 'useraccountcontrol’ Active Directory attribute to ‘512/514’ value (Enable/Disable) 

Azure Active Directory: ‘Activate/Deactivate’ functionality here refers to setting 'accountEnabled’ true if the account is enabled; otherwise, false.

Delete

Provisioning exception

Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions. 

Configure: EPE Verify User

Verify User

In the illustration above, the Identity Attribute Mappings are populated from the Provisioning tasks. Administrators choose the correct Active Directory from “Target” and are able to view what Identity Mappings are configured for the selected AD task. In this orchestration view you are not allowed to change any mappings, those are presented only as a visual aid. If there are needs to change the attribute mappings, those attributes must be defined in the provisioning task configuration view, in order them to be changed in the orchestration node. 

Within the Identity Mappings admins panel, admins are able to provide “IF” expression, which will form a LDAP query to verify if the user exists. It’s possible to select as many attributes from the Person Data Card as needed to confirm the uniqueness of a user. When an action takes place, those attributes will be read from the Data Card in question and will be compared to the appropriate AD attributes according to the “Target*“ Active Directory configuration. Admins can also choose to use “equal” or “not equal” to corresponding AD attribute by changing the “IF” expression. The “Save result*” field is used to define where the successful LDAP query results are saved, “true” if user was found or “false” otherwise. 

Key point to understand this node's mechanics is - while forming IF expression, admin needs to use Template's attributes, but in fact, values read from them, will be translated (mapped) to proper Active Directory attributes, according to Identity Mapping configuration and will be passed to Active Directory as a search query. 

Administrators has possibility to “check” Include OU subtree -property on this orchestration node to verify if user exists in the defined Organization Unit -subtree. If this administrator doesn’t select this option, orchestration node will only check the specific OU defined in the configuration. 

Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions. 

Configure: EPE read user's data activity

How to read user's data from directory with workflow?

Since 2022.2 Efecte Provisioning Engine (EPE) introduces new workflow activity "Read User's data". Supported directories are Active directory, Azure AD, OpenLDAP and IBM. Info can be updated behind reference for example IGA account data can be updated from Identity storage. 


  1. Create new Event-based provisioning for the workflow activity. Attribute mappings are populated from Provisioning task. Attribute mappings must be unique. 


  2. Create new workflow orchestration node with activity Read User's data. Select just created event-based epetask to be target. Add unique person attribute, its used for updating right account information from directory to ESM. 



Configure: EPE Unlock User

Unlock User

In the illustration above administrators can choose the correct Active Directory “Target”. The unlock user orchestration node read attributes from Data Cards in question and execute LDAP command to Active Directory.

It’s important to take into account in the configurations, that 'Person Attribute' should contain User's distinguishedName name.

Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions. 

Configure EPE Delete User

Delete User


In the illustration above administrators can choose the correct Active Directory “Target”. The delete user orchestration node read attributes from Data Cards in question and execute LDAP command to Active Directory.

For Active Directory-based configurations, 'Person Attribute' should contain User's distinguishedName name.

For Azure Active Directory-based configurations, 'Person Attribute' should contain User's ObjectGUID value.

Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions.

Configure: EPE Remove User Attribute

Remove User Attribute


In the illustration above administrators can choose the correct Active Directory “Target”. The remove user attribute orchestration node read attributes from Data Cards in question and execute LDAP command to Active Directory. In the property “Attribute(s) to remove” administrator can define the attribute, which will be removed from the Active Directory. NAME what you want to remove. On string can contain multi value attributes. like "City, CostCenter, mobile".

Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions. 

Configure: EPE Update User Distinguished Name value

Update User Distinguished Name value

In the illustration above administrators can choose the correct Active Directory “Target”. The Update user Distinguished Name Value orchestration node read attributes from Data Cards in question and execute LDAP command to Active Directory. 

In the field “Current Distinguished Name Value*” admin must select, from which attribute on given template/data-card, ‘old’ name of AD location will be read. Field “New Distinguished Name Value* selects attribute from given template/data-card, which will be used as a name of new AD location.  

With This activity admins are able for example to limit update action to ‘commonname’ attribute, but It’s required to give whole Distinguished value, example: 

Current Distinguished Name Value: CN=DemoAccount,OU=DemoUsers,DC=testad,DC=local 

New Distinguished Name Value: CN= DemoAccount,OU=OldDemoUsers,DC=testad,DC=local

Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions. 

Configure: EPE Reset User Password

Reset User Password


In the illustration above administrators can choose the correct Active Directory “Target”. The Reset user password orchestration node read attributes from Data Cards in question and execute LDAP command to Active Directory. The Person and Password attributes should point to the template where the orchestration node finds the user’s data.  

User password value “pwdLastSet” is set to zero (1), which means that a user doesn’t need to change their password in the first login. From the EPE version 2022.3 forward we have implemented possibility to choose if the password must change at the first login or not. Administrators can make the selection for this directly from the workflow Reset User password orchestration node.

Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions.

 
 

Custom object activities

Configure EPE create custom object

How to create custom objects with EPE?


Since 2022.2 Efecte Provisioning Engine (EPE) introduces new workflow activity "Create custom object". For example devices, contacts and applications can be now created with EPE towards directory (AD,Azure and OpenLDAP). 

Delete

IGA licensed

Custom object creation can be used in IGA installations. 

Step-by-Step Instructions

  1. Create new Event-based provisioning for the custom object (in this example its contact). Attribute mappings are populated from Provisioning task. 

  2. Create new workflow orchestration node with activity Create custom object. Select just created event-based epetask to be target. Custom object class defines what object EPE is creating. In this example EPE is creating contacts. 
Delete

Troubleshooting

[LDAP: error code 16 - 00000057: LdapErr: DSID-0C0910DA, comment: Error in attribute conversion operation, data 0, v4563]

Solution: Wrong custom object class in EPE activity. Should be change to right one or mandatory attributes for the new object when creating are missing.  

Delete


Configure EPE update custom object

How to update custom objects with EPE?

Since 2023.1 Efecte Provisioning Engine (EPE) introduces new workflow activity "Update custom object". For example devices, contacts and applications can be now updated with EPE towards directory (AD and Azure). 

IGA licensed

Custom object creation can be used in IGA installations. 

Step-by-Step Instructions 

  1. Create new Event-based provisioning for the custom object (in this example its contact). Attribute mappings are populated from Provisioning task. 



  2. Create new workflow orchestration node with activity Update custom object. Select just created event-based epetask to be target. Custom object class defines what object EPE is updating. In this example EPE is updating contacts.
     
Delete

Troubleshooting

Delete


Configure EPE delete custom object

How to delete custom objects with EPE?

Since 2023.1 Efecte Provisioning Engine (EPE) introduces new workflow activity "Delete custom object". For example devices, contacts and applications can be now deleted with EPE towards directory (AD and Azure).

IGA licensed

Custom object creation can be used in IGA installations. 


Step-by-Step Instructions

  1. Create new Event-based provisioning for the custom object (in this example its contact). 



  2. Create new workflow orchestration node with activity Delete custom object. Select just created event-based epetask to be target. Object name attribute defines what object EPE is deleting. In this example EPE is deleting contacts. 


     

 

 
 

Directory Group activities

Configure: EPE Add user to Group

Add User to Group

In the illustration above, the Person attribute configuration should point to the template where the orchestration node finds the user’s data (usually IGA account). The Role attribute needs to be configured to define where the orchestration node finds the available roles (directory groups where the user should be removed). There might be single or multiple attribute groups configured in a “Role attribute”. The list of available registered directory Tasks is fetched from the EPE-master. 

It is required to select the directory Task, because the Efecte Provisioning Engine orchestration node will use identity and access rights fields mapping to know, under which attribute code, the user’s and directory group distinguished names are stored. 

Exception handling:

  • The result of a node will be in the “Completed” state only in the case when all user’s group memberships will be updated successfully. In the case when, for example, the user will be successfully removed from 5 out of 6 groups then the result of a node will be in the “Exception” state.
  • Hence the mapping for distinguishedName JSON field, for both Identity and Access Right is required. If mapping won’t be found then the orchestration node will result in an “Exception” state.
  • The attempt to remove a user from a group which they do not belong will end as a failure.
  • The attempt to add a user to a group to which he already belongs will end as a failure.
  • Details about successfully/unsuccessful updated user’s group membership can be found in logs.
  • Provisioning and group membership exceptions are optional properties on this workflow node. Admins can configure this properties in use where exceptions can be written if any exceptions exists during the provisioning actions.

Configure: EPE Read OU from the data-card

How to configure EPE to use OU from data card?


EPE Event-based provisioning task  provides possibility to choose if information of the organization unit (OU-path) for example new user creation is defined in the provisioning task or is it read from the ESM datacard. This feature decrease the amount of the needed event-based provisioning tasks. There are cases, where customers are creating new users to several OU-paths and with this approach we would use one provisioning task and part of the needed information is read from datacard. 

  1. Go ESM Admin side and select IGA tab.

  2. Select Event-based provisionings and the needed task. 

  3. Set LDAP userBase / LDAP userfilter or/and LDAP groupBase / LDAP groupfilter to "Read OU path from the data-card". 


  4. When the provisioning task configuration has been set “Read OU path from the datacard” the orchestration activities show you addition property (LDAP group- /userbase), where its possible to define the attribute from which attribute this information can be read. 


Configure: EPE Create Group

Create Group

In the illustration above, the Access Rights Attribute Mappings are populated from Provisioning tasks. Admins choose the correct Active Directory “Target” and are able to view the Access Rights Mappings which are configured for selected AD tasks. In this orchestration view admins are not allowed to change any mappings, those are presented as a visual aid. If any changes to the mappings are needed, those needs must be execute in the Provisioning task configuration view. 

The creating new user orchestration node read attributes from Data Cards in question and execute LDAP command to Active Directory. 

It is important to be sure, that Access Rights Mapping, being used in Create Group orchestration node, contains:

  • at least four additional Azure AD mappings: for “displayName”, “mailEnabled”, “mailNickname” and “securityEnabled” attributes. 
  • at least two additional Active Directory mappings: for “cn” and “sAMAccountName” attributes. 

Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions.

Configure: EPE Update Group

Update group



In the illustration above, the Access Rights Attribute Mappings are populated from Provisioning tasks. Admins choose the correct Active Directory “Target” and are able to view the Access Rights Mappings which are configured for selected AD tasks. 

In this orchestration view admins are not allowed to change any mappings, those are presented only as a visual aid. If any changes to the mappings are needed, those needs must be execute in the Provisioning task configuration view. 

The update group orchestration node read attributes from Data Cards in question and execute LDAP command to Active Directory or execute API call to Azure. 

The configuration of “Target” is done in the provisioning task configuration view. For updating groups, admins needs to make sure that there exists only one LDAP groupbase / LDAP groupfilter in order to avoid conflicts on the workflow.

Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions.

Configure: EPE Delete Group

Delete Group



In the illustration above administrators can choose the correct Active Directory “Target”. The delete group orchestration node read attributes from Data Cards in question and execute LDAP command to Active Directory. 

For Active Directory-based configurations, 'Role group attribute' should contain group’s distinguishedName name.

For Azure Active Directory-based configurations, 'Role group attribute' should contain group’s ObjectGUID.

Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions.

Configure: EPE Verify Group

Verify Group

In the illustration above, the Access Rights Attribute Mappings are populated from the Provisioning tasks. Administrators choose the correct Active Directory from “Target” and are able to view what Access Rights Mappings are configured for the selected AD task. In this orchestration view you are not allowed to change any mappings, those are presented only as a visual aid. If there are needs to change the attribute mappings, those attributes must be defined in the provisioning task configuration view, in order them to be changed in the orchestration node. 

Within the Access Rights Mappings admins panel, admins are able to provide “IF” expression, which will form a LDAP query to verify if the group exists. It’s possible to select as many attributes from the Data Card as needed to confirm the uniqueness of a group. When an action takes place, those attributes will be read from the Data Card in question and will be compared to the appropriate AD attributes according to the “Target*“ Active Directory configuration. Admins can also choose to use “equal” or “not equal” to corresponding AD attribute by changing the “IF” expression. The “Save result*” field is used to define where the successful LDAP query results are saved, “true” if group was found or “false” otherwise. 

Administrators has possibility to “check” Include OU subtree -property on this orchestration node to verify if group exists in the defined Organization Unit -subtree. If this administrator doesn’t select this option, orchestration node will only check the specific OU defined in the configuration. 

Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions.

Configure: EPE Verify Group Membership

Verify Group Membership


In the illustration above, the Identity Attribute Mappings are populated from the Provisioning tasks. Administrators choose the correct Active Directory from “Target” and are able to view what Identity Mappings are configured for the selected AD task. In this orchestration view you are not allowed to change any mappings, those are presented only as a visual aid. If there are needs to change the attribute mappings, those attributes must be defined in the provisioning task configuration view, in order them to be changed in the orchestration node. 

The “Save result*” field is used to define where the successful LDAP query results are saved, “true” if user was found or “false” otherwise. 

Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions. 

 

Configure: EPE Update Group Distinguished Name

In the illustration above administrators can choose the correct Active Directory “Target”. 

With This Update group activity admins are able for example to limit update action to ‘CommonName’ attribute. When CommonName of the AD group is updated it will also update the DistiguishedName for the group.

Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions. 

 

 
 

ESM Local user activities

Configure: EPE Create Local ESM User

Create Local User (in ESM)


In the illustration above, the Mappings are from the target template, no separate EPE task needed for this. The creating new local user orchestration node read attributes from Data Card in question and executes command to ESM. 

 

Mapping Value
User name Required property. Unique String attribute 

Person attribute    

Required property. Efecte user reference. 

Password attribute    

Required property. String attribute. Note! Must be sync with ESM password requirements. See platform setting: password.rule.regexp. Default is that the new password must be at least 8 characters long and contains at least one uppercase character, and at least one number.

User level    

Required property. I left empty the user level will be normal. Allowed values: "ROOT", "NORMAL", READ ONLY" / "READ-ONLY" / "READ_ONLY" . Works in lowercases too.

Normal – grants rights to view, edit, and delete templates, folders, and data cards as determined by the user role permissions. 
Read-only – grants rights to only read data cards as determined by the user role permissions. 
Root user – grants unlimited rights to ESM data and data maintenance, without any user role restrictions. Use the root user level carefully, as it is exceptionally powerful. 
Roles Required property. Must be multivalue string, and has names of the roles from ESM. If you want to create user without ESM roles, insert value into this attribute which is not ESM role (value is required).
Provisioning exception
Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions.


ESM Security log logs the following events of this node:

  • Successful AND failed changes on User "security settings"
    • User level changes
    • Password
    • Username
  • User permission changes
    • user given a role
  • Creating a user

Configure: EPE Update Local User password

Update Local User Password (from ESM)


In the illustration above, the Mappings are from the target template, no separate EPE task needed for this. The updating local user orchestration node read attributes from Data Card in question and executes command to ESM. ESM Security.log logs events of this node. Note! Root user's password update is not allowed. 


Mapping Value
User name
Required property. Unique String attribute 

Password attribute    

Required property. String attribute. Note! Must be sync with ESM password requirements. See platform setting: password.rule.regexp. Default is that the new password must be at least 8 characters long and contains at least one uppercase character, and at least one number.

User level    

Required property. I left empty the user level will be normal. Allowed values: "ROOT", "NORMAL", READ ONLY" / "READ-ONLY" / "READ_ONLY" . Works in lowercases too.

Normal – grants rights to view, edit, and delete templates, folders, and data cards as determined by the user role permissions. 
Read-only – grants rights to only read data cards as determined by the user role permissions. 
Root user – grants unlimited rights to ESM data and data maintenance, without any user role restrictions. Use the root user level carefully, as it is exceptionally powerful. 

Provisioning exception
Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions.

Configure: EPE Update Local User name

Update Local User name (from ESM)
 


 

In the illustration above, the Mappings are from the target template, no separate EPE task needed for this. The updating local user orchestration node read attributes from Data Card in question and executes command to ESM. ESM Security.log logs events of this node. Note! Root user's username update is not allowed. 
 

Mapping Value
User ID
 
Required property. Unique String attribute containing user's current user name. 
 
New User name Required property. Unique String attribute containing user's upcoming user name. 
 
Provisioning exception
 
Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions.

Configure: EPE Delete Local User 

Delete Local User (from ESM)
 


 

In the illustration above, the Mappings are from the target template, no separate EPE task needed for this. The delete local user orchestration node read attributes from Data Card in question and executes command to ESM. ESM Security.log logs events of this node. Note! Root user cannot be deleted with this node. 
 

Mapping Value
User Name
 
Required property. String attribute containing user's current user name. 
 
Provisioning exception
 
Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions.
 
 

Other activities

Configure: EPE Manage ProxyAddresses

Manage ProxyAddresses

There are three different possibilities: Set, Update and Remove proxyaddresses. 

                   

  • Set: admin selects one attribute in ESM's Workflow UI (can be single or multivalue attribute) - Then Workflow Node, contacts AD, finds user account and set's the value into proxyAddresses (this action is used to set the value to proxyAddresses the first time - previous value in AD is null).

  • Update: admin selects two attributes in ESM's Workflow UI - one for CURRENT value, and the other - the NEW value. Then Workflow Node, contacts AD, finds user account and updates the existing proxyAddresses, finds the CURRENT value in the list, and changes its prefix from: SMTP: to smtp: - and adds NEW value with prefix SMTP: (the other values remain in proxyAddresses).

  • Remove: admin selects one attribute in ESM's Workflow UI (can be single or multivalue attribute) - Then Workflow Node, contacts AD, finds user account and removes the value from proxyAddresses list (the other values remain in proxyAddresses).

Configure: EPE Run provisioning task

Run provisioning task

This activity is used when all information from the directory is immediately needed back. Supported directories are Active directory, Azure AD, OpenLDAP and IBM.  


In the illustration above administrators can choose the correct Directory “Target”. Run provisioning task orchestration node read attributes from Active Directory to IGA Accounts. 

Requirements for the "Target" EPEtask are:

  • Task must be of type "Schedulable task" not event-based
  • Workflow's Template must be the same as Identity mapping Template 
  • Task must be scheduled at some time - it marks a task to be "enabled" then
  • Mappings must be distinct, no duplicated mappings in the task

In this orchestration view you are not allowed to change any mappings, those are presented only as a visual aid. If there are needs to change the attribute mappings, those attributes must be defined in the provisioning task configuration view, in order them to be changed in the orchestration node. 

Provisioning exception is an optional property on this workflow node. Admins can configure this property in use where exceptions can be written if any exceptions exists during the provisioning actions.




 
 

 

 

workflows integration activities connector native connectors multi activity

Was this article helpful?

Yes
No
Give feedback about this article

Table of Contents

Related Articles

  • Microsoft Azure DevOps Connector
  • 389-LDAP Red Hat connector
  • Microsoft Active Directory (AD) Connector

Copyright 2026 – Matrix42 Professional.

Matrix42 homepage


Knowledge Base Software powered by Helpjuice

0
0
Expand