arrow-left

All pages
gitbookPowered by GitBook
1 of 37

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Policies and Workflows

Configure automation policies, workflow triggers, notifications, and access reviews in Lifecycle Management

Policies define the rules and actions for managing identities throughout their lifecycle. Workflows within policies execute based on specific conditions, automating processes such as onboarding, role changes, and offboarding.

hashtag
In this section

Topic
Description

Create and configure automation policies for identity sources

Define workflow triggers and provisioning actions

SCIM filter syntax for workflow conditions

Configure email templates and webhooks

Trigger compliance reviews from LCM workflows

hashtag
Key concepts

  • Policies: Top-level configuration for a source of identity that defines which workflows apply

  • Workflows: Sequences of actions that execute when specific conditions are met

  • Trigger Conditions: Boolean expressions using SCIM filter syntax (e.g., is_active eq true)

  • Actions: Tasks like creating accounts, assigning groups, or sending notifications

hashtag
Related topics

  • Access Profiles - Define birthright entitlements for provisioning actions

  • Attribute Transformers - Format attributes when provisioning accounts

Policies

Configure automated workflows for Lifecycle Management actions, including common attribute transformers and event notification settings

hashtag
Overview

Lifecycle Management policies define the workflows that are triggered when a user is added or other events are detected at a specific source of identity. Workflows contained in a policy describe conditional sequences of actions that can be structured based on the specific joiner, mover, leaver (JML) scenarios that you want to automate. This might include hiring a new employee, terminating an existing employee, transferring an existing employee to another department, or other actions triggered by changes in status.

A policy can contain one or more workflows that run under different conditions. For example, one workflow might be applied when employees enter an "Active" state (for Joiner/Rehire scenarios), and another when an employee becomes "Inactive" (for Leaver scenarios). A workflow could also be triggered when an employee's hire date falls within a certain threshold, such as being less than 4 days away, or when it is related to any other employee property within the source of identity.

For most enterprise deployments, Veza recommends:

  • One policy for each source of identity integrated with Lifecycle Management

  • Two workflows within each policy:

    • One for active users to cover Joiner and/or Mover scenarios (including Re-hire)

hashtag
Add a Lifecycle Management Policy

To create a policy for a source of identity:

  1. Go to Policies.

  2. Click Create Policy.

  3. Enter a policy name and description.

hashtag
Simulation Dry Run on Policy

The Dry Run allows you to simulate and preview how a Policy would process an identity, without making actual changes to target systems. This testing tool helps you validate workflow conditions, preview potential changes, and understand what actions would be triggered for specific identities.

hashtag
How Dry Run Works

The Dry Run evaluates workflow logic but does not interact with target integrations. Verify integration health to ensure target systems are accessible before running actual policies. Dry Run takes a policy and an identity to simulate:

  • The workflows triggered

  • All actions that would run

  • What Access Profiles would be assigned

  • Any potential changes to entities and attributes

You can test how policies would respond to identity attribute changes for different scenarios during a Dry Run simulation without impacting the actual identity attribute values.

hashtag
Starting a Dry Run

You can initiate a Dry Run in two ways:

From a Lifecycle Management Policy

When editing a policy, open the Dry Run tool to preview changes for any identity:

  1. Go to Policies.

  2. Click a policy to view its details.

  3. Click Dry Run Policy at the top right.

  4. Choose the identity and policy to test workflows.

From Identity Details

You can start a Dry Run when viewing details for any account on the Identities page:

  1. Go to Identities.

  2. Search for an identity and click to view its details.

  3. Expand the Actions menu at the top right and click Policy Dry Run.

Dry Run Notes:

Result: 0 Changes

When a dry run returns "0 changes", it means:

  • The selected identity does not meet any of the trigger conditions defined in your policy's workflows

  • No actions would be executed for this identity when the policy runs

  • This is not an error - it simply means the identity doesn't qualify for any of the configured workflows

Limitations

Dry Run has several important limitations:

  • Dry Run evaluates whether workflow conditions are met, not whether actions would succeed

  • It does not check whether integrations are functioning properly and whether target systems are accessible

  • It does not validate that changes could be successfully applied

circle-info

Dry Run does not test integration connectivity. Issues like API timeouts, authentication failures, or LDAP attribute mapping errors will not be detected during simulation.

Best Practices

Use Dry Run to validate that policies and their workflows are working as intended before enabling them in a live environment.

  1. Test with Representative Identities: Select identities that represent different scenarios (new hires, role changes, terminations) to validate all workflows in your policy.

  2. Simulate Different Scenarios: Modify identity attributes during Dry Run to test trigger conditions such as:

    • Department changes

  • Handling long names or names with special characters

  • Department and location change at once

  • Same-day rehire after termination

hashtag
Workflow execution behavior

Understanding how workflows execute helps with troubleshooting and policy design.

hashtag
Execution order

When identity source data changes, Veza processes it in this order:

  1. Extraction completes: Data is pulled from the identity source.

  2. Workflow triggers evaluate: Veza begins evaluating trigger conditions within approximately 1 second of extraction completing. Actual evaluation time scales with the number of managed identities. Policies with thousands of identities can take several minutes to process. For policies with multiple identity sources, evaluation waits until all configured sources have completed extraction.

  3. Conditions evaluate: Conditions within a workflow evaluate sequentially, in the order defined.

hashtag
Trigger behavior

"First time only" triggers

Most workflows (except sync workflows) are configured to trigger "only when trigger condition is first met." This means:

  • The workflow triggers the first time an identity matches the condition.

  • If the condition clears (identity no longer matches) and then matches again, the workflow triggers again as if it were the first time.

  • This behavior handles rehire scenarios where a previously terminated employee returns.

Sync workflows

Sync workflows track specific properties for changes. When adding new properties that require syncing:

  • Update the tracked property list in the workflow configuration.

  • Update sync-related common transformers to include the new attributes.

For more information on workflow triggers, see .

hashtag
SCIM condition limitations

Trigger conditions use SCIM filter syntax. When comparing values, only the variable on the right side of the comparison can be transformed. The left side must be an attribute reference without transformation. See for syntax details.

hashtag
Policy Version

Policies can be version-controlled, allowing for a method to refine and test changes in your automation workflows. You can create draft versions to test changes and validate updates before deployment while maintaining a history of previous configurations. Each policy can have only one active version and one draft version at a time, with automatic archival of retired versions.

hashtag
Policy State vs Workflow Versioning State

Policies have a current state that is based on their workflow operations.

The Policy state includes:

  • Initial - Initially created before the first workflow version is published

  • Running - Actively processing with one or more workflows

  • Paused - Temporarily disabled

  • Pending - Waiting for activation

Note: In the Policies page, click on the Action overflow icon (three dots) to Start the policy in the Initial state, and Pause or Unpause at the Running state.

The Workflow Version state includes:

  • Draft - In draft mode for editing and modification

  • Published - Functional and active

  • Retired - No longer active or usable

hashtag
Policy Draft Mode

The Policy Draft Mode is a state where a policy is saved but not yet active. In Policy Draft Mode, you can create, edit, and test policy configurations (such as workflows, actions, or mappings) without affecting real users, identities, or access profiles. Once you are satisfied, you can publish the policy, which moves it from the work-in-progress state to an operational state.

To enable the Policy Draft Mode, perform the following:

  1. On the Lifecycle Management Dashboard page, click Settings in the top menu.

  2. The Lifecycle Management Settings page appears. Click Policy Settings.

  3. Switch ON the Enable Policy Draft Mode button.

Test Policy Workflows using Draft Versioning

You can test and refine your policy workflows to ensure that it is working as expected through a series of draft versions with Dry Run simulations. Once the workflow’s result is satisfactory, publishing the version will change the policy status to ‘active’.

Perform the following steps to test your policy workflow:

  1. Create and save a new policy.

  2. Create a new workflow and Save.

  3. After creating a new workflow, click Publish.

  4. By publishing your workflow, it is ready for activation by going to the

Published Policy

A published policy is activated and deployed with the following characteristics:

  • Enforces the defined rules in your environments, including:

    • Creating, modifying, or removing user access.

    • Synchronizing identity attributes.

hashtag
Migrating policies between environments

For organizations using multiple Veza tenants (such as sandbox and production), policies can be migrated between environments using migration scripts provided by Veza support.

circle-info

Migration script availability: The policy migration script and lookup table files are provided by Veza support. Contact to request the migration toolkit for your deployment.

hashtag
When to use migration scripts

Use the migration script approach for:

  • Large policies with many workflows and complex transformers

  • Repeated migrations between the same environments (sandbox → production)

  • Policies where manual reconstruction would be time-consuming

For simple policies or one-time migrations, manual reconstruction may be faster than setting up the migration toolkit.

hashtag
Environment setup (one-time)

  1. In both sandbox and production tenants, log in as an Integration Manager or Administrator and create API keys (Integrations > API Key).

  2. Store each key in a password manager or secrets vault.

  3. Set environment variables for the migration script:

hashtag
Migration procedure

  1. In the target tenant, create a new draft version of the policy and note the version number.

  2. If any of the following changed since the last migration, update the lookup table CSV (provided by support) with new IDs:

    • Access Profiles

hashtag
Extraction scheduling and policy control

hashtag
Extraction schedules

Extraction schedules for identity sources are configured via the Veza API. To modify extraction frequency or timing, contact for assistance with API configuration.

hashtag
Workflow parallelism

The maximum number of concurrent workflows is configured at the tenant level via API. This setting controls how many workflow jobs can run simultaneously across all policies. Contact to adjust concurrency limits for your deployment.

hashtag
Policy pause behavior

Disabling a policy pauses any running workflows. Re-enabling the policy does not resume paused workflows—they restart on the next extraction cycle.

hashtag
Enabling and Monitoring Lifecycle Management Policies

Use the Policies page for an overview of initial, running, and paused policies. New policies are created in the "Initial" state, enabling a review period before activating the policy. Active ("Running") policies will apply the next time the data source is extracted.

circle-info

A policy can be enabled without any workflows configured. This allows the Identities table to begin populating from the connected identity source immediately, which is useful for validating identity data before building out provisioning workflows.

circle-info

Publishing or updating a policy does not automatically trigger an extraction. To apply policy changes immediately, manually trigger an extraction from the Integrations page.

To manage policies on the main Policies overview:

  1. Go to Lifecycle Management > Policies

  2. Find the policy you want to manage

    • Search for a specific policy by name

hashtag
Add Workflows to Policies

Policies contain one or more workflows. Typically, workflows correspond to Active and Inactive user states, but not always. More specifically, workflows define a sequence of actions to run when a condition is met, based on events and identity changes captured at the source of identity. These workflows apply to scenarios such as new employee hiring, internal employee mobility changes (e.g., promotions, transfers, new managers), or employee departures.

Workflows comprise a tree-like sequence of conditions designed to meet the specific requirements of your joiner, mover, and leaver processes. For example, you may want to grant specific entitlements to users with specific roles, locations, or groups.

hashtag
Example Workflows

The following diagrams illustrate typical joiner and leaver workflow implementations, showing how identity changes in your HR system trigger coordinated provisioning and de-provisioning actions across multiple target applications.

Joiner Workflow

When a new employee is created in Workday, Veza automatically provisions accounts and assigns appropriate access across connected systems based on the employee's role and attributes.

Leaver Workflow

When an employee's status changes to inactive or terminated in Workday, Veza automatically de-provisions accounts and removes access to protect your organization's security posture.

Workflows and Trigger Conditions

Trigger Conditions refer to rules or filters that initiate (or delay) provisioning and deprovisioning workflows based on certain events, criteria within identity data sources, or lifecycle workflows. Trigger conditions use SCIM filter syntax to evaluate whether an identity matches specific criteria.

See for SCIM filter syntax and available operators, or for a comparison with transformer syntax.

  • Trigger conditions are often tied to HR events, such as employee hiring (joiner), role changes (mover), or termination (leaver). For instance, provisioning flows can be triggered when an employee is hired or deprovisioned when terminated.

  • Trigger Conditions can be time-based, such as "create the Active Directory account 15 days prior to a new employee's start date".

  • Advanced implementations also support relationship-based triggers (e.g., launching workflows when a worker is added to a specific department). Note: Trigger conditions can also encompass

hashtag
Create a Workflow

To add a workflow, perform the following:

  1. Select a policy.

  2. Click Create Workflow.

  3. In Details, enter the workflow name and description.

  4. In the

  • Not set

  • Low

  • Normal

  • Medium

The levels dictate the order/priority in which the workflows are run. The higher-priority setting will be processed first. A fairness algorithm is built in to prevent lower-priority workflow tasks from being starved.

  1. In the New Workflow pane, click trigger attribute. The Edit Workflow pane appears.

  2. In the Triggering Condition (Condition String) field, select a conditional string from the dropdown menu to create a logical syntax that automatically starts the workflow. Once a condition has been set, another conditional string can follow, or an action can be taken.

  3. In the Options section, select one of the following:

Note: All workflow errors must be resolved before it can be saved.

Clone or Delete a Workflow

Once an LCM Policy workflow is saved, the clone and delete options appear alongside the workflow name:

  • Click on the copy icon to clone the workflow.

  • Click on the trash bin icon to delete the workflow.

hashtag
Common workflow patterns

Webhook notifications after Sync Identity

For ITSM integrations that need to receive all attributes after a Sync Identity action completes:

  1. Place the webhook action under a condition that follows the Sync Identity action in the workflow tree.

  2. Add a pause action before the webhook if needed to allow time for attribute propagation.

  3. Use clear naming conventions for conditions (for example, "FTE New Hire AD Notification") to indicate their purpose.

hashtag
Create a Transformer

A transformer is a rule or function that takes incoming identity or attribute data and modifies it into the format or value that the target system requires.

They’re used when the data source system and target system represent or store information differently. For example, transformers can:

  • Converting a username from “First.Last” format into all lowercase.

  • Mapping a department value like “HR” in the source to “Human_Resources” in the target.

  • Adding a prefix or suffix to attributes (e.g., appending a domain name to create an email).

Transformers act as data processors inside a policy, ensuring that the right values are sent when provisioning, updating, or deprovisioning identities and entitlements.

To add a transformer, perform the following:

  1. Select a policy.

  2. Click Transformers.

  3. Click Add Transformer.

  4. In the New Transformer

See for available transformation functions.

hashtag
Create a Lookup Table

Lookup tables are CSV files with columns that map values from a source of identity to destination values. Each row represents a mapping entry. The first row must contain the column headers.

This example is a location mapping table, which is a typical format for a Lookup Table:

Once a Lookup Table has been uploaded, it can be processed with the Lookup Transformers. The Lookup transformers convert identity attributes from a source system into appropriate values for target systems based on CSV reference tables. This is particularly useful when mapping values between systems that use different naming conventions, codes, or formats for the same conceptual data.

Use Lookup Table Transformers to:

  • Map source attribute values to different values in target systems

  • Standardized reference data that must be consistent across applications

  • Extract different pieces of information from a single attribute value

  • Have complex mapping requirements that built-in transformers cannot support

See for detailed information.

To add a Lookup Table, perform the following:

  1. Select a policy.

  2. Click Lookup Table.

  3. Click Add Lookup Table.

  4. In the New Lookup Table

hashtag
Create Properties

Properties are the attributes that describe identities, accounts, and entitlements. They serve as the data points a policy can use to determine when and how to take action. Properties can come from:

  • Built-in properties – default attributes that LCM provides out-of-the-box (for example: username, email, status, created_at).

  • Custom properties – attributes defined by your organization to capture unique metadata (for example: cost_center, employee_type, manager_id).

Use Properties to:

  • Properties are referenced in policy conditions (e.g., disable account if status = inactive).

  • Help with transformers and lookup tables, allowing you to map or reformat values.

  • Used in identity overrides when syncing accounts from different providers.

To add Properties, perform the following:

  1. Select a policy.

  2. Click Properties.

  3. The Mover Properties appear. Click Edit Properties.

hashtag
Create Password Complexity Rules

Password Complexity Rules in a policy ensure that generated passwords adhere to standardized criteria according to defined password policies across automated provisioning workflows. You can define reusable password complexity rules to enforce requirements for password length, mandatory character types (uppercase letters, lowercase letters, numbers, and special characters), and restricted characters when generating random passwords. These rules are available for selection in Sync Identities, Deprovision Identity, and Reset Password actions when working with integrations that support complex password requirements.

To add Password Complexity Rules, perform the following:

  1. Select a policy.

  2. Click Password Complexity Rules.

  3. Click Create Password Complexity Rule.

  4. In the

hashtag
Create Transformer Functions

Custom Transformer Functions allow you to programmatically modify or enrich identity attributes as they are synced from identity sources to target systems. These transformations ensure that data formats align across systems and support more dynamic provisioning logic. Such transformers can:

  • Convert dates into required formats or perform date-based calculations (e.g., adding days to a hire date).

  • Normalize or transform string values (e.g., case conversion, trimming, substrings).

  • Apply conditional logic via functions directly within provisioning rules.

To add Transformer Functions, perform the following:

  1. Select a policy.

  2. Click Transformer Functions.

  3. Click Create Custom Transformer Function.

  4. In the

hashtag
Policy Settings

The Policy Settings page provides information about a specific policy and allows for additional configuration, including:

  • Modify the primary identity source

  • Define an additional data source to the primary identity source

  • Configure email notifications or a webhook for action-related events

  • Enable continuous synchronization to ensure identities are up-to-date

circle-info

Making changes in the Policy Settings page will impact all versions (Draft, Published, and Retired) of the policy.

circle-info

**Policy JSON Viewer**: When enabled, a "Show Raw JSON" button appears in policy header actions to export complete policy configurations for debugging and technical support. See [LCM FAQ](lcm-faq.md) for details.

hashtag
Details

The Details view shows the Policy Name and Description fields. These fields are editable for name change or description refinement, if required.

hashtag
Primary Identity Source

The Primary Identity Source pane displays the integration name of the data source. The Integration field displays all available data sources, where you can add or remove, if required.

circle-info

You can add multiple Primary Identity Sources if they are the same type of integration. If a different type of integration is required, use the Additional Identity Source.

A Primary Identity Source is the authoritative system that serves as the source of truth for user identities (e.g., HR system, Active Directory, identity provider like Okta/Entra ID). Typically, one type of source of identity is associated with one integration.

The role of the Primary Identity Source includes:

  • Acts as the authoritative record for user information (emails, roles, statuses).

  • Lifecycle rules such as provisioning, updates, or deprovisioning are typically triggered based on changes detected in this data source.

  • Ensures consistency and accuracy across target systems where access is granted or revoked.

hashtag
Additional Identity Sources

As an option, the Additional Identity Sources pane is typically used to add a different type of integration from the Primary Identity Source, which requires that the additional data source be already configured into Lifecycle Management. You can also correlate primary attributes and additional attributes to be associated with the data source. The added data source will sync for authentication, user updates, or provisioning.

To add an Additional Identity Source, perform the following:

  1. Click Add Source.

  2. In the Select Identity Source field, select a data source. Note: If you enable the 'These types are not related' option, then you cannot correlate any attributes.

  3. In the Correlating Attributes pane, select a Primary Attribute from the dropdown menu.

hashtag
Notifications

When events occur during the execution of a policy’s workflow, notifications can be triggered upon execution of actions in workflows as a means to inform stakeholders or integrate with external systems. These notifications can be optionally configured as their own discrete action in a workflow or as an option when another action is executed. Lifecycle Management supports email- and webhook-based notifications.

For example, an organization might configure its Active Employee policy to send an email to the manager of each new hire after the employee's email address is provisioned. Additionally, a webhook will be sent to the company's learning management system to initiate online onboarding training once each new hire's Okta account is provisioned, following a successful Sync Identity operation.

Use the Notifications to add and manage notifications:

  1. In the Notifications pane, click Add Notification.

  2. Choose the notification type (Email or Webhook).

  3. Choose the event to trigger notifications:

See for customizing email notifications.

hashtag
Advanced Settings

Identity Syncing Option

Identity Syncing at the policy level defines how identities from the authoritative source are synchronized into the target system, including provisioning user accounts or updating existing identities.

The Identity Syncing option controls the behavior of the Sync Identities Actions in a policy workflow, which has Continuous Sync functionality enabled.

Select either:

  • Sync on changes only - to skip identity syncing when no data source changes are detected

  • Always sync - to sync, no matter if changes are detected or not

Safety Limits

Safety Limits prevent unintended mass changes to identities by enforcing configurable thresholds. Two independent mechanisms are available and can be used together for layered protection:

Hard Limit

The Hard Limit (formerly "Safety Limit") is a reactive mechanism that stops processing during execution once the configured number of identity changes has been reached. When the limit is triggered, no further identity changes are processed for the current policy run.

To configure a Hard Limit:

  1. Enable the Hard Limit toggle.

  2. Set the Maximum Number of Affected Identities to define the threshold.

circle-info

Parallel execution and Hard Limits: When a policy processes tasks in parallel, the total number of completed changes may slightly exceed the configured Hard Limit. This is because multiple tasks that are already in progress can complete before the system detects that the threshold has been reached. The amount of overshoot depends on the number of tasks allowed to run at the same time. Once the overshoot is detected, all remaining tasks are blocked for manual review.

To enforce the Hard Limit exactly with no overshoot, set the parallel task count to 1. This ensures each task completes before the next one begins, at the cost of longer processing times.

Predictive Safety Limit

The Predictive Safety Limit is a proactive mechanism that blocks all changes before execution begins if the system predicts the number of workflow runs will exceed configured thresholds. This prevents unintended mass processing of identities when upstream attribute changes in a Source of Identity would trigger unnecessary Joiner, Mover, or Leaver workflows.

To configure a Predictive Safety Limit:

  1. Enable the Predictive Safety Limit toggle.

  2. Set the Maximum Number of Workflow Runs to define the threshold.

Workflow-Level Limits

Safety limits can be configured at both the policy level and individual workflow level for granular control. When configured at the workflow level, each workflow enforces its own thresholds independently, enabling different limits for Joiner, Mover, and Leaver workflows within the same policy.

Blocked Tasks

When a Predictive Safety Limit triggers, no changes are processed. A warning appears on the Blocked Tasks page with options to:

  • Review what would have changed

  • Run the blocked tasks (manually approve execution)

  • Abandon the blocked tasks (discard without executing)

Processing of future extractions is paused until the administrator acknowledges the warning and resumes processing. New activity log event types PREDICTED_SAFETY_LIMIT_EXCEEDED and WORKFLOW_PREDICTED_SAFETY_LIMIT_EXCEEDED are recorded when predictive limits trigger.

REST Auth Credentials

Configure reusable authentication for Send REST Request actions in Lifecycle Management

hashtag
Overview

REST Auth Credentials provide centralized, reusable authentication configurations for Send REST Request actions in Lifecycle Management workflows. Instead of configuring authentication directly in each action, you can create named credential sets that multiple actions can reference.

Benefits:

  • Reuse: Share authentication across multiple Send REST Request actions

  • Security: Sensitive fields (passwords, tokens, secrets) are encrypted at rest

  • Centralized management: Update credentials in one place; all referencing actions use the latest configuration

  • Audit: Track credential usage and creation history

hashtag
Supported Authentication Types

Auth Type
Description
Use Case

Header

Custom authorization header value

API keys, custom token formats

Basic

HTTP Basic authentication (username/password)

Legacy APIs, basic auth endpoints

hashtag
Configuring REST Auth Credentials

hashtag
Using the Veza UI

  1. Navigate to Lifecycle Management > Settings

  2. Select the Rest Credentials tab

  3. Click Create to add a new credential

  4. Enter a Name for the credential

  5. Select the Auth Type and fill in the required fields (see )

  6. Optionally set a default URL and HTTP Method (actions can override these values)

  7. Click Save

circle-info

The URL and HTTP Method fields on credentials are optional defaults. When a Send REST Request action specifies its own Webhook URL or HTTP Method, those values take precedence over the credential defaults.

hashtag
Using the REST API

REST Auth Credentials are managed via the Lifecycle Management API:

Create a credential:

curl -X POST "https://{VEZA_URL}/api/private/lifecycle_management/rest_auth_credentials" \
  -H "Authorization: Bearer {API_KEY}" \
  -H "Content-Type: application/json" \
  --data '{
    "value": {
      "name": "My API Credential",
      "auth_type": "BEARER",
      "bearer_settings": {
        "token": "eyJhbGciOiJIUzI1NiIs..."
      },
      "url": "https://api.example.com/v1",
      "method": "POST"
    }
  }'

List credentials:

curl "https://{VEZA_URL}/api/private/lifecycle_management/rest_auth_credentials" \
  -H "Authorization: Bearer {API_KEY}"

Get a single credential:

curl "https://{VEZA_URL}/api/private/lifecycle_management/rest_auth_credentials/{CREDENTIAL_ID}" \
  -H "Authorization: Bearer {API_KEY}"

Update a credential:

curl -X PATCH "https://{VEZA_URL}/api/private/lifecycle_management/rest_auth_credentials/{CREDENTIAL_ID}" \
  -H "Authorization: Bearer {API_KEY}" \
  -H "Content-Type: application/json" \
  --data '{
    "value": {
      "id": "{CREDENTIAL_ID}",
      "name": "Updated Credential Name",
      "bearer_settings": {
        "token": "new-token-value"
      }
    }
  }'

Delete a credential:

curl -X DELETE "https://{VEZA_URL}/api/private/lifecycle_management/rest_auth_credentials/{CREDENTIAL_ID}" \
  -H "Authorization: Bearer {API_KEY}"
circle-exclamation

Credentials referenced by published policy versions cannot be deleted. Remove the credential reference from all actions in published policies first.

hashtag
Auth Type Configuration

hashtag
Header

Provides a custom authorization header value. Use this for API keys or non-standard token formats.

Field
Required
Description

full_value

Yes

Complete header value (e.g., ApiKey sk-prod-xyz)

The value is sent as the Authorization header on each request.

hashtag
Basic

HTTP Basic authentication with username and password.

Field
Required
Description

user_name

Yes

Authentication username

password

Yes

Authentication password (encrypted at rest)

Veza constructs the Authorization: Basic {base64(username:password)} header automatically.

hashtag
Bearer

Bearer token authentication.

Field
Required
Description

token

Yes

Bearer token value (encrypted at rest)

Veza constructs the Authorization: Bearer {token} header automatically.

hashtag
Login to Bearer

Two-step authentication: perform a login request, then extract a bearer token from the response. Use this for APIs that require an initial authentication step before issuing a session token.

Field
Required
Description

login_url

Yes

URL to send the login POST request

login_payload_json

Yes

JSON body for the login request (encrypted at rest)

How it works:

  1. Veza sends a POST request to login_url with login_payload_json as the body

  2. The JSON response is parsed using bearer_token_attribute to extract the token

  3. The extracted token is used as a Bearer token for the actual REST request

Example:

If the login API returns:

{
  "value": {
    "token": "eyJhbGciOiJIUzI1NiIs...",
    "expires_in": 3600
  }
}

Set bearer_token_attribute to value.token to extract the token.

hashtag
OAuth2

OAuth 2.0 client credentials flow.

Field
Required
Description

client_id

Yes

OAuth2 client ID

client_secret

Yes

OAuth2 client secret (encrypted at rest)

Veza performs the client credentials flow to obtain an access token, then uses it as a Bearer token for the REST request.

circle-info

ca_certificate_base64 only applies to the OAuth2 token endpoint (the auth_url connection). It does not affect TLS verification for the main REST request to your target API. If the target API itself uses an internal CA certificate, you must configure that certificate in the Insight Point's truststore. See Custom Certificate Configuration (OVA) or Using Custom Certificates (install script).

Choosing an authentication method:

  • FORM (default): Sends client_id and client_secret as form-encoded parameters in the POST body alongside grant_type=client_credentials. Use this when the token endpoint expects credentials in the request body.

  • BASIC: Sends credentials in the Authorization: Basic base64(client_id:client_secret) header, with only grant_type=client_credentials in the POST body. Use this when the token endpoint requires HTTP Basic authentication.

Check your target API's OAuth2 documentation to determine which method it supports. Both conform to RFC 6749 §2.3.1arrow-up-right. When in doubt, try FORM first as it is the default and more widely supported.

hashtag
None

No authentication header is added to the request. Use this when the target API is public or when authentication is handled through other means (e.g., network-level security, pre-shared keys in URL parameters).

hashtag
Using Credentials in Actions

When configuring a Send REST Request action in a Lifecycle Management policy:

  1. In the action configuration, select a credential from the REST Auth Credentials dropdown

  2. The credential provides the authentication header and optional default URL/method

  3. The action's Webhook URL and HTTP Method settings override the credential defaults when specified

circle-info

REST Auth Credentials handle how to authenticate requests. To control where requests execute from (control plane vs. Insight Point), configure the Data Source field separately. See Custom Application with Send REST Payload for Insight Point routing.

circle-exclamation

The legacy Authorization Header field on the Send REST Request action is deprecated. Migrate existing configurations to use REST Auth Credentials for centralized management and encrypted storage.

hashtag
Permissions

Operation
Required Role

View credentials

Admin, Operator

Create, Update, Delete

Admin

hashtag
See Also

  • Send REST Request Action: Action configuration and payload options

  • Custom Application with Send REST Payload: Route requests through Insight Points for on-premises targets

  • Transformers: Attribute transformation syntax for dynamic URLs and payloads

Send REST Payload (Insight Point Routing)

Route Send REST Payload actions through Insight Points for custom OAA integrations

hashtag
Overview

Lifecycle Management supports three integration pathways for custom applications. This document covers configuring the OAA Write Framework pathway with Insight Point routing for Send REST Payload actions.

When using the Send REST Request action in Lifecycle Management workflows, requests execute from the Veza control plane by default. For target APIs that are on-premises or behind a firewall, you can configure a Custom Provider (OAA integration) to route requests through an Insight Point agent instead.

This configuration enables:

  • On-premises API access: Call internal APIs that aren't accessible from the public internet

  • Network isolation: Route requests through your own infrastructure for security compliance

  • Hybrid deployments: Mix cloud-based and on-premises targets in the same workflow

hashtag
When to Use This Configuration

You DO NOT need this configuration if:

  • Your target API is publicly accessible

  • You're calling cloud services (SaaS APIs, webhooks)

  • Your Send REST Payload actions work without selecting a data source

You NEED this configuration if:

  • Your target API is on-premises or in a private network

  • The API is only accessible from specific network locations

  • You need requests to originate from an Insight Point agent

hashtag
How It Works

Without Data Source (Default):

spinner

With Data Source (Insight Point Routing):

spinner

When a Custom Provider is configured with external_lifecycle_management_type: SEND_REST_PAYLOAD:

  1. The provider's data source appears in the Send REST Payload action's Data Source dropdown

  2. Selecting it routes the HTTP request through the associated Insight Point

  3. The Insight Point agent executes the request from within your network

hashtag
Configuration

This setting is configured via the Veza REST API. It is not currently available in the Veza UI. The provider configuration only sets up Insight Point routing—the actual request URL, HTTP method, payload, and authentication are configured per-action in the policy editor.

circle-info

Insight Point Required: You must have a deployed Insight Point before configuring this feature. Find your Insight Point ID in the Veza UI at Integrations > Insight Points.

hashtag
Create Custom Provider with Send REST Payload Support

curl -X POST "https://{VEZA_URL}/api/v1/providers/custom" \
  -H "Authorization: Bearer {API_KEY}" \
  -H "Content-Type: application/json" \
  --data '{
    "name": "On-Prem HR System",
    "custom_template": "application",
    "provisioning": true,
    "external_lifecycle_management_type": "SEND_REST_PAYLOAD",
    "data_plane_id": "{INSIGHT_POINT_ID}"
  }'

hashtag
Update Existing Custom Provider

curl -X PATCH "https://{VEZA_URL}/api/v1/providers/custom/{PROVIDER_ID}" \
  -H "Authorization: Bearer {API_KEY}" \
  -H "Content-Type: application/json" \
  --data '{
    "provider": {
      "id": "{PROVIDER_ID}",
      "provisioning": true,
      "external_lifecycle_management_type": "SEND_REST_PAYLOAD"
    },
    "update_mask": {
      "paths": ["provisioning", "external_lifecycle_management_type"]
    }
  }'
circle-exclamation

data_plane_id is set at creation and cannot be changed. To use a different Insight Point, delete and recreate the provider.

hashtag
Required Fields

Field
Required
Description

name

Yes

Display name for the Custom Provider

custom_template

Yes

OAA template type (typically application)

hashtag
Validation Rules

  • Provisioning required: provisioning must be true when setting external_lifecycle_management_type

  • No internal app name: Cannot be used with internal_app_name (these are mutually exclusive)

  • No configuration_json: Unlike , Send REST Payload does not use configuration_json. Including it in the request will cause a validation error. Authentication is configured per-action using the setting or .

  • Cannot change type while in use: external_lifecycle_management_type cannot be changed while the provider is referenced by Lifecycle Management policies. Remove the provider from all policies before changing this field.

hashtag
Using in Lifecycle Management Policies

Once configured, the Custom Provider's data source will appear in the Send REST Payload action configuration:

  1. In the policy editor, add a Send REST Payload action

  2. In the Data Source field, select your configured Custom Provider

  3. Configure the URL, method, headers, and payload as needed

  4. The request will route through the associated Insight Point

circle-info

The Data Source field is optional. If left empty, requests execute directly from Veza's infrastructure. Only select a data source when you need Insight Point routing.

hashtag
Combining with REST Auth Credentials

You can use REST Auth Credentials together with Insight Point routing:

  • REST Auth Credentials: Handle authentication (OAuth2, Bearer tokens, etc.)

  • Data Source selection: Routes the request through an Insight Point

When a Data Source is selected, both the token acquisition request and the subsequent REST request execute through the Insight Point. This means Login to Bearer and OAuth2 credential types work correctly against token endpoints that are not publicly accessible—the entire authentication flow remains within your private network.

hashtag
Troubleshooting

hashtag
Data Source Dropdown is Empty

If no data sources appear in the Send REST Payload action's Data Source dropdown:

  1. No providers configured: Verify you have at least one Custom Provider with external_lifecycle_management_type: SEND_REST_PAYLOAD

  2. Provisioning not enabled: Check that provisioning: true is set on the provider

  3. No data source created: Push an OAA payload to create a data source for the provider

hashtag
Validation Error: "external_lifecycle_management_type requires provisioning to be true"

Include provisioning: true in your API request along with the external_lifecycle_management_type field.

hashtag
Validation Error: "data_plane_id: Cannot be empty"

The data_plane_id is required when creating a provider with external_lifecycle_management_type: SEND_REST_PAYLOAD. Ensure you have a deployed Insight Point and include its ID in your create request.

hashtag
Validation Error: "cannot change external_lifecycle_management_type while provider is in use by LCM"

The provider is referenced by one or more Lifecycle Management policies. Remove the provider from all policies before changing its external_lifecycle_management_type.

hashtag
Request Fails from Insight Point

If requests fail when routed through an Insight Point:

  1. Network connectivity: Verify the Insight Point can reach the target API

  2. Firewall rules: Ensure outbound HTTPS is allowed from the Insight Point to the target

  3. DNS resolution: Confirm the target hostname resolves from the Insight Point's network

  4. TLS certificates: If the target API uses an internal or self-signed CA certificate, the Insight Point will fail with tls: failed to verify certificate: x509: certificate signed by unknown authority. You must add the CA certificate to the Insight Point's trust store:

    • OVA deployment: See

    • Install script deployment: See

circle-info

Testing connectivity: The fastest way to verify an Insight Point can reach your target API is to create a webhook at Integrations > Veza Actions, select your Insight Point, enter the target URL, and click Test. This requires only a URL (credentials are optional and no Lifecycle Management policy is required). Once connectivity is confirmed, configure a Send REST Payload action with your Data Source selected for full LCM use. Note that Veza Actions webhooks support Basic and Token authentication only. For OAuth2 or Login-to-Bearer endpoints, proceed directly to the LCM action configuration.

hashtag
See Also

  • Lifecycle Management Integrations: Overview of integration pathways (Native, SCIM, OAA Write Framework)

  • Send REST Request Action: Action configuration, variable substitution, and response handling

  • REST Auth Credentials: Centralized authentication management for Send REST Request actions

  • : Alternative LCM option using SCIM endpoints (requires configuration_json)

  • : Agent deployment, connectivity requirements, and high availability

  • : Custom integration development

Notifications

Customizing email notifications and Webhook configuration for Lifecycle Management events and Access Requests.

hashtag
Email Templates Overview

Administrators can customize email notifications sent during Lifecycle Management and Access Request workflows. These emails can include instructions, unique branding, and placeholders for metadata specific to the event (such as entity names, action types, or request details). Each notification type (usage) can have its own customized template.

Notification templates support HTML and CSS. They can include links to external images or you can upload small files to Veza. This document includes steps to configure templates in Veza using the notifications API, and a reference for event types, default templates, and supported placeholders.

circle-info

Template Management: Currently, notification templates can only be managed via the Notification Templates API. Template management through the Veza UI is not yet available.

circle-info

Access Reviews Notification Templates: For access review workflow notifications, see Access Reviews Notification Templates.

hashtag
Managing notification templates

hashtag
Custom Email Templates

In addition to event-specific templates, you can create custom email templates that are not tied to specific lifecycle events. These reusable templates allow you to define notification content once and use it across Send Notification actions and action notification settings. Custom email templates are:

  • Reusable: Single template for multiple workflows and actions

  • Event-independent: Not associated with a specific lifecycle event type

  • Flexible: Can be used in both Send Notification actions and action notification settings (on_success/on_failure)

  • Standard placeholder support: Supports all the same placeholders as event-based templates

To create a custom email template:

  1. Navigate to Lifecycle Management > Settings > Notifications

  2. Click Create Template

  3. Select For Custom Email (as opposed to "For Event")

  4. Define your template name, subject, and body using HTML and placeholders

  5. Save the template

To use a custom template, select it when configuring the Send Notification action, or in Action Notification Settings:

  • Send Notification action: Choose from the "Select Email Template" dropdown when configuring the action

  • Action Notification Settings: Select the template for on_success or on_failure email notifications on any action

When you select "Default template" in these dropdowns, the system uses the event-based template appropriate for the event. When you select a custom template, that template is used regardless of the specific event being processed.

circle-info

Custom templates support all standard placeholders documented in the Placeholders section. The available values depend on the context in which the template is used (e.g., action notifications have action-related placeholders, event notifications have event-related placeholders).

hashtag
Default Templates

The system provides built-in templates for all Lifecycle Management and Access Request events. These templates use placeholders that are automatically replaced with actual values when notifications are sent.

Generic Failure Template

When specific event templates aren't available or when events fail, the system uses a generic failure template:

Subject: Lifecycle job {{EVENT_TYPE}} has failed

Body:

<html><body>
<br>
<br> Here is the notification that lifecycle job has failed. <br>
Error message: {{EVENT_ERROR_MESSAGE}}<br>
<br>
For reference:
<br> job_id: {{JOB_ID}}<br>
<br> identity_id: {{EVENT_IDENTITY_ID}}
<br> identity_name: {{EVENT_IDENTITY_NAME}}
<br> entity_type: {{ENTITY_TYPE}}
<br> entity_name: {{ENTITY_NAME}}
</body></html>

See Default Template Content for all default messages.

Lifecycle Management Events

Each template you create is associated with a specific notification event (referred to as usage in the API). The following event types are available for Lifecycle Management workflows, organized by functional area:

chevron-rightIdentity Management Eventshashtag
Event Type
API Usage Value
Description

Create Identity

LIFECYCLE_MANAGEMENT_CREATE_IDENTITY

Sent when a new identity/account is created

chevron-rightRelationship Management Eventshashtag
Event Type
API Usage Value
Description

Add Relationship

LIFECYCLE_MANAGEMENT_ADD_RELATIONSHIP

Sent when a relationship is added

chevron-rightEmail Management Eventshashtag
Event Type
API Usage Value
Description

Create Email

LIFECYCLE_MANAGEMENT_CREATE_EMAIL

Sent when an email is created

chevron-rightPassword Management Eventshashtag
Event Type
API Usage Value
Description

Change Password

LIFECYCLE_MANAGEMENT_CHANGE_PASSWORD

Sent when a password is changed

chevron-rightEntitlement Management Eventshashtag
Event Type
API Usage Value
Description

Create Entitlement

LIFECYCLE_MANAGEMENT_CREATE_ENTITLEMENT

Sent when an entitlement is created

chevron-rightActions and Workflows Eventshashtag
Event Type
API Usage Value
Description

Custom Action

LIFECYCLE_MANAGEMENT_CUSTOM_ACTION

Sent when a custom action is performed

chevron-rightAccess Reviews Eventshashtag
Event Type
API Usage Value
Description

Create Access Review Queued

LIFECYCLE_MANAGEMENT_CREATE_ACCESS_REVIEW_QUEUED

Sent when access review is queued

chevron-rightSafety Eventshashtag
Event Type
API Usage Value
Description

Safety Limit Reached

LIFECYCLE_MANAGEMENT_SAFETY_LIMIT_REACHED

Sent when a hard safety limit is reached during processing

chevron-rightAccess Request Eventshashtag
Event Type
API Usage Value
Description

Access Request Created

LIFECYCLE_MANAGEMENT_ACCESS_REQUEST_CREATED

Sent when an Access Request is created

hashtag
Default Template Content

Veza provides built-in email templates for all event types, organized by functional area below. These templates include standard placeholders and can be customized or replaced with your own templates.

chevron-rightIdentity Management Templateshashtag

CREATE_IDENTITY

  • Subject: New Hire Notification: {{ENTITY_TYPE}} account created

  • Body:

CREATE_GUEST_ACCOUNT

  • Subject: New {{ENTITY_TYPE}} Guest Account Created: {{ENTITY_NAME}}

  • Body:

SYNC_IDENTITY

  • Subject: Sync Identity Notification: {{ENTITY_TYPE}} account synced

  • Body:

DELETE_IDENTITY

  • Subject: Identity Deleted Notification: {{ENTITY_TYPE}} has an account deleted

  • Body:

DISABLE_IDENTITY

  • Subject: Identity Disabled Notification: {{ENTITY_TYPE}} has an account disabled

  • Body:

chevron-rightRelationship Management Templateshashtag

ADD_RELATIONSHIP

  • Subject: New Relationship Added Notification: {{ENTITY_TYPE}} has an account with new relationship to a {{RELATIONSHIP_ENTITY_TYPE}}

  • Body:

REMOVE_RELATIONSHIP

  • Subject: Relationship Removed Notification: {{ENTITY_TYPE}} has an account whose relationship was remove from a {{RELATIONSHIP_ENTITY_TYPE}}

  • Body:

chevron-rightEmail Management Templateshashtag

CREATE_EMAIL

  • Subject: New Email Notification: {{ENTITY_TYPE}} has an account with new email

  • Body:

WRITE_BACK_EMAIL

  • Subject: New Write Back Email Notification: {{ENTITY_TYPE}} has had an email sync to it

  • Body:

chevron-rightPassword Management Templateshashtag

CHANGE_PASSWORD

  • Subject: Password Change Notification: {{ENTITY_TYPE}} has an account with a new password

  • Body:

RESET_PASSWORD

  • Subject: Reset Password Notification: {{ENTITY_TYPE}} has had their password reset

  • Body:

chevron-rightEntitlement Management Templateshashtag

CREATE_ENTITLEMENT

  • Subject: Create entitlement notification: an entry of {{ENTITY_TYPE}} is created

  • Body:

RENAME_ENTITLEMENT

  • Subject: Rename entitlement notification: an entry of {{ENTITY_TYPE}} is renamed

  • Body:

SYNC_ENTITLEMENT

  • Subject: Sync entitlement notification: an entry of {{ENTITY_TYPE}} is renamed

  • Body:

chevron-rightAccess Request Templateshashtag

ACCESS_REQUEST_COMPLETE

  • Subject: Access Request {{ACCESS_REQUEST_TYPE}} for {{ACCESS_REQUEST_ENTITY_NAME}} has {{SUCCEED_OR_FAILED}}

  • Body:

ACCESS_REQUEST_CREATED

  • Subject: {{ACCESS_REQUEST_SOURCE_TYPE}} for {{ACCESS_REQUEST_ENTITY_NAME}} is {{ACCESS_REQUEST_STATE}}

  • Body:

ACCESS_REQUEST_FAILED

  • Subject: {{ACCESS_REQUEST_SOURCE_TYPE}} for {{ACCESS_REQUEST_ENTITY_NAME}} is failed

  • Body:

ACCESS_REQUEST_STATE_CHANGED

  • Subject: {{ACCESS_REQUEST_SOURCE_TYPE}} for {{ACCESS_REQUEST_ENTITY_NAME}} is {{ACCESS_REQUEST_STATE}}

  • Body:

ACCESS_REQUEST_APPROVER_ASSIGNED

  • Subject: {{ACCESS_REQUEST_SOURCE_TYPE}} for {{ACCESS_REQUEST_ENTITY_NAME}} in {{ACCESS_REQUEST_STATE}} as new assigned approvers

  • Body:

chevron-rightError and Failure Templateshashtag

ACTION_FAILED

  • Subject: Action Failed: {{ACTION_NAME}} for identity {{IDENTITY_NAME}}

  • Body:

WORKFLOW_TASK_FAILED

  • Subject: Workflow Failed: {{WORKFLOW_NAME}} for identity {{IDENTITY_NAME}}

  • Body:

EXTRACTION_EVENT_FAILED

  • Subject: Lifecycle Management extraction processing failed for {{DATASOURCE_ID}}

  • Body:

chevron-rightAccess Review Templateshashtag

CREATE_ACCESS_REVIEW_QUEUED

  • Subject: Create Access Review Queued Notification: for identity {{IDENTITY_NAME}}

  • Body:

CREATE_ACCESS_REVIEW

  • Subject: Create Access Review Notification: for identity {{IDENTITY_NAME}}

  • Body:

chevron-rightSafety and Custom Action Templateshashtag

SAFETY_LIMIT_REACHED (Hard Limit)

  • Subject: Safety Limit Reached Notification: Policy {{POLICY_NAME}} has stopped processing identity changes

  • Body:

PREDICTED_SAFETY_LIMIT_EXCEEDED (Predictive Safety Limit)

  • Subject: Predictive Safety Limit Exceeded: Policy {{POLICY_NAME}} has blocked changes before processing

  • Body:

WORKFLOW_PREDICTED_SAFETY_LIMIT_EXCEEDED (Workflow-Level Predictive Safety Limit)

  • Subject: Workflow Predictive Safety Limit Exceeded: A workflow in policy {{POLICY_NAME}} has blocked changes before processing

  • Body:

CUSTOM_ACTION

  • Subject: New Custom Action Notification: {{ENTITY_TYPE}} has performed a custom action

  • Body:

hashtag
Image Attachments

From the Veza UI, you can add images directly through the "Add images" option. These will be automatically encoded and included in your template.

circle-info

Image Requirements: For API-based template management, small images under 64kb can be attached when configuring a template. The image must be base64-encoded and specified in the attachments field of the API request.

To use an attachment you have uploaded in a template, specify it by attachment.name, for example:

<img src="cid:<name_of_attachment>"

To embed high-resolution images in your templates, you should serve the content from a public URL, and use HTML to link and style it.

hashtag
Placeholders

Use placeholders to include dynamic information in templates, such as entity names, action types, timestamps, and other event metadata. Placeholders are automatically replaced with actual values when notifications are sent.

circle-exclamation

Placeholder Case Sensitivity: Placeholders are case-sensitive and must match the exact casing shown in the documentation. For example, {{ENTITY_TYPE}} will work, but {{entity_type}} or {{EntityType}} will not be replaced unless those exact attribute names exist in your data.

hashtag
How placeholders work

Veza notification templates support two types of placeholders:

1. Static Placeholders (Predefined)

These are uppercase constants documented in the tables below (e.g., {{ENTITY_TYPE}}, {{ENTITY_NAME}}). They are replaced first during template processing and work with all notification templates.

Example:

Hello,
New account created for {{ENTITY_NAME}} with type {{ENTITY_TYPE}}.

2. Dynamic Attribute Placeholders

You can also reference any attribute from the entities being processed using two formats:

  • Untyped format: {{attribute_name}} - References an attribute by name alone

  • Typed format: {{EntityType.attribute_name}} - References an attribute from a specific entity type

The attribute name must exactly match the casing used by your integration. For example:

  • If your integration provides an attribute named email, use {{email}}

  • If it provides Email, use {{Email}}

  • If it provides employee_id, use {{employee_id}}

Examples:

<!-- Untyped - uses attribute from any entity -->
User email: {{email}}
Department: {{department}}

<!-- Typed - uses attribute from specific entity type -->
Okta email: {{OktaUser.email}}
AD username: {{ActiveDirectoryUser.sAMAccountName}}
circle-info

When to Use Typed Format: Use {{EntityType.attribute}} format when your workflow processes multiple entity types and you need to reference a specific entity's attributes. For example, if your workflow processes both OktaUser and ActiveDirectoryUser, use {{OktaUser.email}} to specifically reference the Okta user's email address.

hashtag
Predefined placeholders

The following static placeholders are available in all notification templates:

chevron-rightIdentity and Entity Informationhashtag

Placeholder

Description

{{ENTITY_TYPE}}

The type of entity (e.g., "ActiveDirectoryUser", "OktaUser")

{{ENTITY_NAME}}

chevron-rightRelationship Informationhashtag

Placeholder

Description

{{RELATIONSHIP_ENTITY_TYPE}}

Type of the related entity

{{RELATIONSHIP_ENTITY_NAME}}

chevron-rightAction and Job Informationhashtag

Placeholder

Description

{{ACTION_NAME}}

Name of the action being performed; serves as the stable unique identifier for the action

{{ACTION_TYPE}}

chevron-rightAccess Request Informationhashtag

Placeholder

Description

{{ACCESS_REQUEST_TYPE}}

Type of Access Request

{{ACCESS_REQUEST_ENTITY_NAME}}

chevron-rightEvent and Error Informationhashtag

Placeholder

Description

{{EVENT_TYPE}}

Type of lifecycle event

{{JOB_ID}}

chevron-rightPolicy and Workflow Informationhashtag

Placeholder

Description

{{POLICY_NAME}}

Name of the lifecycle policy

{{WORKFLOW_NAME}}

hashtag
Troubleshooting placeholders

Placeholder Not Being Replaced?

If a placeholder appears in your notification email instead of being replaced with a value, check the following:

  1. Verify exact casing: Placeholders are case-sensitive

    • ✅ Correct: {{ENTITY_TYPE}}

    • ❌ Wrong: {{entity_type}}, {{EntityType}}, {{Entity_Type}}

  2. Check placeholder format: Ensure proper syntax with double curly braces

    • ✅ Correct: {{ENTITY_NAME}}

    • ❌ Wrong: {ENTITY_NAME}, {{ENTITY_NAME}, ENTITY_NAME

  3. Verify attribute exists: For dynamic attributes, confirm the attribute is provided by your integration

    • Use the typed format to specify the entity type: {{OktaUser.email}}

    • Check your integration documentation for available attribute names and their casing

  4. Check event context: Some placeholders are only available for specific events

    • For example, {{LOGIN_PASSWORD}} is only available for password-related events

    • {{ACCESS_REQUEST_URL}} is only available for Access Request events

Best Practices:

  • Start with predefined placeholders: Use the documented static placeholders (uppercase) whenever possible

  • Test templates: Send test notifications to verify placeholder replacement before deploying to production

  • Document custom attributes: Keep a reference of the attribute names and casing used by your integrations

  • Use typed format for clarity: When working with multiple entity types, use {{EntityType.attribute}} to avoid ambiguity

hashtag
Webhook Configuration Overview

Webhook notifications are triggered upon execution of actions during the LCM Policy workflow process. Webhooks inform stakeholders or integrate with external systems of events that are processed within the workflow. Webhook notifications can be optionally configured as their own discrete action in a workflow or as an option when another action is executed.

For example, a webhook is sent to the company's learning management system to initiate online onboarding training once each new hire's Active Directory account is provisioned, following a successful Sync Identity operation.

hashtag
Create a Webhook

To create and manage a webhook, perform the following:

  1. Go to Policies and select a policy.

  2. Click Edit Policy.

  3. Click Policy Settings.

  4. Scroll down to Notifications and click Add Notification.

  5. Choose the Webhook notification type.

  6. Choose an event to trigger notifications:

    • Create Identity

    • Sync Identity

    • Add Relationship

  7. Choose the status to trigger notifications (when an event is Successful, or On Failure).

  8. Select an Existing Veza Action.

    A Veza Action is an integration with functionality for sending data to external systems, enabling downstream processes around Veza alerts, and access to reviewer actions. Use a Veza Action to configure generic webhooks or enable email notifications.

    See Veza Actions on how to create and deploy a webhook.

  9. To customize the Webhook setting, perform the following:

    • In the Webhook URL field, enter the endpoint configured to receive the webhook payload.

    • In the Webhook Auth Header field, enter the Auth Header if the webhook listener requires authentication.

    When configured, webhook requests include an Authorization header containing the credentials specified in the Webhook Auth Header

  10. Click Save.

LCM-Triggered Access Reviews

Integrate Access Reviews with Lifecycle Management workflows

This guide explains how to create Access Reviews from Lifecycle Management workflows and troubleshoot common issues.

Lifecycle Management (LCM) policies can trigger Access Reviews automatically using the CREATE_ACCESS_REVIEW action. When a workflow runs and conditions match, Veza queues and creates an access review campaign based on the configured certification plan.

hashtag
Overview

Use LCM-triggered access reviews to:

  • Automatically certify access when employees change roles (movers)

  • Review permissions before offboarding (leavers)

  • Validate access grants after onboarding (joiners)

  • Enforce periodic re-certification based on identity attribute changes

The sections below cover configuration options and troubleshooting for reviews created by LCM workflows.

hashtag
Troubleshoot missing reviews

Common scenarios:

  • All results filtered: Veza created the review but then deleted it because all rows already appeared in recent in-progress reviews

  • Entity type mismatch: The policy identity type does not match the access review query, and no identity graph relationship exists to resolve it. Veza displays this error: "No matching node type found for identity type {type}"

  • Missing workflow configuration: The Access Review workflow is not configured or not linked to the policy

LCM-triggered reviews always run when a workflow executes, but Veza deletes the review if it has no results after filtering.

Veza compares each row against the last five in-progress reviews (by default) for the same workflow. The system excludes rows that appeared in any of those reviews. If all rows are excluded, Veza deletes the review rather than completing it with zero results. Veza does not send notifications for deleted reviews.

To verify a review was created and deleted:

  • Check Veza Events for the review creation and deletion

  • Review Lifecycle Management event logs for the workflow execution

  • Note: Deleted LCM-triggered reviews do not appear in the Reviews list (unlike manually-created empty reviews, which do appear)

circle-info

This behavior prevents duplicate review efforts and focuses reviewer attention on changed or new access. The comparison count (default: 5) is configurable by Veza support using the CertificationCountToExcludeUnchanged setting.

hashtag
Understand unchanged result filtering

LCM and Rule-triggered Access Reviews automatically exclude unchanged results. Veza enables this setting by default, and you cannot disable it for these review types.

When Veza creates a review, it compares each row against the last five in-progress reviews for the same workflow (sorted by start time, newest first). The system excludes rows that appeared in any of those reviews, leaving only new or changed access to review.

This behavior:

  • Applies automatically to all LCM_TRIGGERED and RULE_TRIGGERED reviews

  • Compares against the last five in-progress reviews by default (configurable by Veza support)

  • Cannot be changed through the UI or API

  • Does not apply to manually-created or scheduled reviews

If filtering excludes all rows, Veza deletes the review rather than completing it with zero results. Veza does not send notifications for deleted reviews, but the deletion appears in Veza Events.

circle-exclamation

The first LCM-triggered review for a workflow includes all results since there are no earlier reviews to compare against. Subsequent reviews only show changes.

hashtag
Resolve entity type mismatches

LCM-triggered access reviews require the policy identity entity type to match the entity type defined in the access review query. Veza resolves this match in the following order:

  1. Direct match in source node types: The policy identity type matches directly

  2. Direct match in destination node types: The policy identity type matches the destination

  3. Linked nodes through the identity graph: Veza follows graph relationships to find a connection (for example, WorkdayWorker → ActiveDirectoryUser)

If none of these resolve, the review creation fails with the error: "No matching node type found for identity type {type}".

Example: If your policy tracks WorkdayWorker identities and your review expects ActiveDirectoryUser entities, Veza still creates the review successfully if there is a defined relationship (for example, WorkdayWorker → ActiveDirectoryUser) in the identity graph. If no such mapping exists, the review creation fails.

hashtag
Fix missing enriched identity columns

Access Reviews can include enriched columns that display additional identity attributes (such as department or manager from an HRIS system). However, Veza skips enrichment when the identity mapping is ambiguous.

When Veza skips enrichment:

If a single account or entity maps to multiple identity nodes in the graph (for example, one Active Directory account maps to two different WorkdayWorker records), Veza intentionally skips enrichment rather than arbitrarily choosing one.

Result:

  • Veza still creates the review successfully

  • Enriched columns appear but remain empty for affected rows

  • Veza logs a trace-level warning: "Skipping enriching nodes due to finding multiple linked nodes"

Resolution:

Review your identity mappings to ensure each account maps to a single identity. Ambiguous mappings often indicate data quality issues in source systems (such as duplicate employee records).

hashtag
Customize review names

When creating access reviews through LCM workflows, you can configure a custom review name using attribute transformers. This is useful when a workflow creates multiple reviews and you need to differentiate them.

Common use case (Movers): When employees change roles, a single workflow run can trigger multiple access reviews. Custom names help reviewers identify which review corresponds to which change.

Transformer syntax:

Use curly braces to reference identity attributes:

  • Review for {name} → "Review for John Smith"

  • {department} Access Review - {name} → "Engineering Access Review - John Smith"

  • {job_title} Certification → "Senior Engineer Certification"

See Attribute Transformers for the complete transformer syntax reference.

Dry Run verification:

Custom review names appear in Dry Run results, allowing you to verify the name format before the workflow runs in production. This helps catch transformer syntax errors or missing attributes early.

hashtag
Related topics

  • Access Reviews: Complete guide to configuring and managing access certification campaigns

  • Access Reviews configuration: Creating and configuring certification plans

  • CREATE_ACCESS_REVIEW action: Configuring the workflow action settings

  • : Customizing review names with dynamic attributes

Attribute Transformers

Configure how user attributes from a source of identity are transformed for target user accounts

When creating workflows in Lifecycle Management policies to create, sync, or deprovision identities, you will use attribute transformers to specify how user attributes for target accounts should be structured.

circle-info

Terminology: For definitions of transformer, formatter, pipeline function, and condition, see Understanding Conditions and Transformers.

An attribute transformer is the complete configuration for mapping a source attribute to a destination attribute. It consists of:

Component
Description
Example

Destination attribute

The target attribute to set

email, username, distinguished_name

Formatter

The template that constructs the value

See

Continuous sync

The target attributes to create or update are typically mapped and, optionally, transformed from user metadata in the source of identity, such as an identity provider, HR system, or CSV upload. Attributes can be synchronized once or kept continuously in sync as changes occur throughout the user's employment lifecycle.

circle-info

Attribute transformers are also available when mapping columns in CSV Upload integrations. This enables you to combine columns, reformat dates, standardize case, and apply other transformations during CSV import—without requiring Lifecycle Management workflows.

For example, attribute mapping and transformation can be used across Joiner, Mover, and Leaver scenarios:

  • Joiner: Set new Azure AD User Principal Name to {source username}@your-email-domain.com. This is an example of mapping multiple attributes and performing a transformation. More specifically, you use the attribute transformer to generate an email address for new joiners. Use the source username (user_principal_name) from the source of identity (Azure AD UPN) for the first part (user attribute), while your-email-domain.com is used for the last part (target attribute).

  • Mover: Always update a user’s “Manager” and “Department” attributes in Okta to match the user’s manager and department in Workday, a source of identity, whenever a department change or other employee mobility event occurs. This is an example of attribute mapping with continuous synchronization.

  • Leaver: Move a user’s Active Directory account to an Organizational Unit (OU) reserved for terminated accounts.

When synchronizing a user’s attributes, Veza may apply many transformations to convert the source attribute values into a more suitable format intended for the target application as a user account attribute.

For example, a transformer might remove the domain from an email address, replace special characters, or convert a string with uppercase letters to lowercase letters.

See Attribute Synchronization for detailed information.

hashtag
Key Terminology

Term
Description
Examples

Source of Identity (SOI)

The system holding authoritative user data—the "source of truth"

HR systems (Workday, BambooHR), identity providers (Azure AD, Okta), CSV uploads

Target Application

The system where user accounts are created or updated using SOI data

Active Directory, Okta, Google Workspace, SaaS applications

hashtag
Adding transformers

Common transformers define one or more rules to apply when synchronizing the attributes of a target identity. Use them at the Policy level where you want to create or update attributes using the same conventions across multiple sync or deprovision actions. When you need to configure a one-time individual action in a workflow, such as a specific attribute, then you use the transformer at the Action level.

At the Policy level, you configure a transformer with basic details, including how to source the value of each attribute:

  1. Assign a name and description to the transformer, and specify the data source to which it applies.

  2. Entity Type: Choose the target entity type in the destination system.

  3. Click Add Attribute. The Destination Attribute dropdown will list available attributes for the chosen entity type.

    • Destination Attribute: Choose the attribute that Veza will create or update for the target entity.

    • Formatter: Choose how the destination attribute should be formatted. Specify the value, a {source_attribute}, or apply .

    • Then Apply: Chains transformation functions together using the pipe (|) character. Each function runs in sequence, with the output of one becoming the input of the next.

    See for more examples.

    • Continuous Sync: Enabling this option ensures that the attribute is always synced, while applying any defined transformations. By default, attributes will not be synced if the target identity already exists.

After creating a common transformer, you can select it when editing a workflow action. You can edit or delete common transformers on the Edit Policy > Common Transformers tab. Remember that "Sync Identity" and "De-Provision Identity" actions can have action-level transformers override common transformers. If the same destination attribute is defined in both, the action-level transformer will take precedence.

hashtag
Best practices

hashtag
When to use common transformers

Create common transformers when the same transformation logic appears in two or more places within the policy. Common transformers reduce duplication and ensure consistent formatting across actions.

hashtag
When to use transformer functions

Create transformer functions when the same transformation applies to multiple properties. Functions let you reuse logic without duplicating configuration.

hashtag
Formatter syntax

The Formatter field in a transformer specifies how to construct the attribute value. It can be set to a specific value, synchronized with a source attribute, transformed using a function, or a combination of these.

circle-info

Some formatters should enable continuous synchronization for the attribute, while others should not. For example, the value of "Created By" should be immutable once a user account is provisioned. Other attributes that represent a state or status should be synchronized throughout the user's or account's lifecycle.

hashtag
Simple Value Setting

To create a destination attribute with a fixed value, enter the desired value when configuring the formatter. For setting the creator attribute:

Destination Attribute
Formatter
Continuous Sync

created_by

“Veza”

Disabled

For activating a re-hired employee:

Destination Attribute
Formatter
Continuous Sync

isActive

true

Enabled

hashtag
Empty Values

To clear an attribute value, leave the formatter field empty. The behavior at the destination depends on system type:

  • SQL-based destinations (Oracle, MySQL, MSSQL): an empty formatter sends NULL to the database column.

  • SCIM destinations: an empty formatter sends an empty string to the provider.

For deactivating a user or clearing a manager reference:

Destination Attribute
Formatter
Continuous Sync

manager_id

(empty)

Enabled

isActive

false

Enabled

circle-info

Attributes marked as required or configured as unique identifiers cannot have an empty formatter — the policy will not save until a value is provided for those fields.

circle-exclamation

Do not use a space character to represent an empty value. The formatter field trims leading and trailing whitespace on input, so a space is equivalent to leaving the field blank.

hashtag
Attribute references

Target attributes can be updated based on attributes belonging to the source of identity. To reference the value of a source entity attribute in your formatter, use the format {<source_attribute_name>}.

Examples:

Destination Attribute
Formatter Example
Continuous Sync

first_name

{first_name}

Enabled

last_name

{last_name}

Enabled

hashtag
Alias Definitions

circle-info

Early Access: Alias Definitions is currently in early access. Contact your Veza representative to enable this feature for your tenant.

hashtag
When to use aliases

By default, when you reference an attribute such as {department} in a formatter, the system searches through your configured identity sources in order (primary first, then secondary sources). This works well for simple policies with a single source of identity.

Aliases become useful when:

  • Multiple integrations share the same entity type (e.g., two Active Directory instances, or when your source of identity and sync target use the same entity type)

  • A policy involves multiple integrations that have attributes with the same name

  • You need to explicitly control which system's attribute value is used

  • You want to compare values between source and target systems while defining LCM Workflow Conditions

  • You need to detect movers based on changes in a specific system

circle-info

Alias Naming: The system automatically adds a $ prefix to all alias names. For example, if you create an alias named workday in the UI, it becomes $workday when used in formatters and conditions.

Example: HR System to Directory Sync

A policy syncs identities from an HR system (Workday) to a directory (Active Directory). Both have a department attribute. Without aliases, {department} resolves from whichever system appears first in the search order. With configured aliases hr and directory (which become $hr and $directory), you can explicitly reference {$hr.department} to ensure you're using the authoritative HR value.

Aliases can be used in:

  • Attribute formatters

  • Workflow trigger conditions

  • Action conditions

  • Mover property definitions

  • Test formatters (for validation before deployment)

hashtag
Configuring aliases

Aliases provide shorthand references to specific integrations and entity types, making transformers and conditions more readable in complex policies.

To configure aliases, open a Lifecycle Management policy, click Edit, and navigate to the Alias Definitions tab. Each alias requires:

  • Alias Name: Must start with $ followed by at least one lowercase letter, number, or underscore. Additional $ characters can appear after the first character. The $ prefix is added automatically if omitted. Valid examples: $workday, $hr_system, $ad$corp. Invalid examples: $, $AD (uppercase), $$double (multiple leading $).

  • Integration: The data source containing the entity type.

  • Entity Type: The entity type to reference (e.g., WorkdayWorker, OktaUser).

circle-exclamation

Validation Rules: Alias names allow only lowercase alphanumeric characters, underscores, and $. They must start with exactly one $ (not zero, not multiple), and cannot be $target (reserved for action-level attribute references).

circle-check

Testing and Validation: Aliases work in test formatters, allowing you to validate your formatter expressions before deployment. Additionally, alias-resolved attribute values appear in dry run results, so you can preview exactly which values will be synced.

hashtag
Input and output resolution

Aliases can resolve attributes from two contexts:

  • Input: Values from the source system before any sync action runs (the authoritative data)

  • Output: Values currently in the target system (what's already provisioned)

By default, the system checks output first, then falls back to input. Use suffixes to explicitly control resolution:

Suffix
Resolves From
Example
Use Case

(none)

Output, then input

{$workday.department}

General attribute access

$in

Source only

circle-info

When to Use Suffixes: Use $in when you need the authoritative value from the source system (e.g., HR system). Use $out when you need to compare against what's currently provisioned in the target. Without a suffix, the system checks the target first—useful when you want the most recent value regardless of source.

hashtag
Comparison operators

Use these operators in IF conditions to compare attribute values:

Operator
Meaning
Supported Types

eq

Equals

Boolean, string, number, timestamp

ne

Not equals

Boolean, string, number, timestamp

Combine conditions with and, or, or negate with not.

circle-info

String List Attributes: For multi-value attributes (string lists), only the co (contains) operator is supported. Use it to check if the list includes a specific value, for example: IF $workday.roles co "Manager".

hashtag
Examples

In attribute formatters:

{$workday.first_name | LOWER}.{$workday.last_name | LOWER}@company.com

In LCM Workflow Conditions (comparing source and target values):

IF $workday$in.department ne $ad$out.department
  {$workday$in.department}
ELSE
  {$ad$out.department}

Multiple integrations with the same entity type:

For organizations with multiple Active Directory domains (e.g., corporate employees and contractors), you can create distinct aliases to control which AD integration is used:

  • Configure alias corp_ad → Integration: AD_Corporate, Entity Type: ActiveDirectoryUser

  • Configure alias contractor_ad → Integration: AD_Contractors, Entity Type: ActiveDirectoryUser

Then explicitly reference the correct domain in your formatters:

{$corp_ad.department}

This ensures you're using the department attribute from the corporate AD integration rather than the contractor AD integration, even though both use the same ActiveDirectoryUser entity type.

hashtag
Transformation functions

Based on the user metadata available from your source of identity (SOI), you may need to convert a full email address to a valid username, standardize a date, or generate a unique identifier for users provisioned by Veza. Suppose an attribute value needs to be altered to be compatible with the target system. In that case, you can transform the value of a source attribute or apply a range of other functions to generate the target value.

Formatter expressions use the following syntax: {<source_attribute_name> | <FUNCTION_NAME>,<param1>,<param2>}

For example:

Destination Attribute
Formatter
Description
Example

username

`{email | REMOVE_DOMAIN}`

Removes the domain from the email to create username

"jsmith" is the output derived from [email protected]

user_id

`f{id | UPPER}`

hashtag
Transformation function categories

Refer to the Transformer Reference page for complete documentation of all supported functions, parameters, and usage examples. The reference includes:

Category
Functions
Use Cases

String case

UPPER, LOWER, TITLE_CASE, SENTENCE_CASE, LOWER_CAMEL_CASE, UPPER_CAMEL_CASE, LOWER_SNAKE_CASE, UPPER_SNAKE_CASE

Standardize naming conventions

String manipulation

TRIM, TRIM_CHARS, REMOVE_CHARS, REMOVE_WHITESPACE, REPLACE_ALL, APPEND, PREPEND

Clean and format string data

circle-info

Contact Veza if you require additional transformations for your use case.

hashtag
Then Apply {#then-apply}

You can pipeline multiple transformation functions together, separated by a vertical bar (|). Each will apply in sequence, allowing for complex attribute formatters that use the output of one function as the input of another.

hashtag
Example Then Apply

  • {name | UPPER}

    • If name = Smith, the result is SMITH.

  • {first_name | SUB_STRING,0,1 | LOWER}.{last_name | LOWER}

    • If first_name = John and last_name = Smith, the result is j.smith.

  • {email | REMOVE_DOMAIN}

    • If email = [email protected], the result is john.smith.

  • {email | REPLACE_ALL, " ", "."}

    • If email = john [email protected], the result is [email protected].

  • {location | LOOKUP locationTable, location_code, city}

    • If location = IL001, the result is Chicago (using a lookup table named locationTable).

  • {start_date | DATE_FORMAT, "01/02/2006" | UPPER}

    • If start_date = 2023-03-15, the result is 03/15/2023 (DATE_FORMAT doesn't typically need UPPER, but shows pipeline capability).

  • {hire_date | DATE_FORMAT, "Jan 2, 2006" | REPLACE_ALL, " ", "_"}

    • If hire_date = 2023-03-15, the result is Mar_15,_2023.

  • {office_code | TRIM_CHARS_LEFT, ".0" | TRIM_CHARS_RIGHT, ".USCA"}

    • If office_code = 000.8675309.USCA, the result is 8675309.

  • {username | REMOVE_CHARS, ".-_" | TRIM | UPPER}

    • If username = "–john.doe_–", the result is JOHNDOE.

  • {employee_id | REMOVE_CHARS, "#" | TRIM_CHARS, "0" | LEFT_PAD, 6, "0"}

    • If employee_id = "##001234##", the result is 001234.

  • {department | REMOVE_WHITESPACE | LOWER | REPLACE_ALL, "&", "and"}

    • If department = "Sales & Marketing", the result is salesandmarketing.

  • TEST{| RANDOM_INTEGER, 1000, 9999}

    • Generates test IDs like TEST4827, TEST8391 (see for details).

hashtag
Testing Transformers Inline

Before deploying transformers in production policies, you can validate formatter expressions directly in the Veza UI. This allows you to verify that your transformation logic produces the expected output without affecting live data.

hashtag
Using the Test Interface

When adding or editing a transformer in a policy, look for the Test Formatter button next to the transformer field. Clicking it opens a test dialog:

  1. Enter your transformer expression in the Attribute Transformer field

  2. Click the Test Formatter button to open the test dialog

  3. The dialog shows input fields for each attribute referenced in your expression (e.g., {first_name}, {email})

  4. Enter sample values for each attribute

  5. Click Test Formatter in the dialog to evaluate the expression

  6. View the result to verify the transformation produces expected output

  7. Click Save to close the dialog, or Cancel to discard changes

The test dialog is available wherever transformers are configured, including:

  • Action synced attributes

  • Unique identifiers

  • Common transformers

  • Date formatters

hashtag
Testing Examples

Expression
Test Input
Expected Output

UPPER

john.doe

JOHN.DOE

{email | SPLIT("@") | INDEX(0)}

[email protected]

john.doe

hashtag
Testing Then Apply

For complex pipelines, test incrementally:

  1. Test the first function alone to verify it handles the input correctly

  2. Add each subsequent pipe and verify intermediate results

  3. Validate the complete pipeline produces the final expected value

This step-by-step approach helps isolate issues when a transformation doesn't produce the expected output.

circle-exclamation

The test interface uses sample data you provide. Ensure your test values accurately represent the source attribute data types and formats you'll encounter in production.

hashtag
When to Use Inline Testing vs. Dry Run

Scenario
Use

Validating a single transformer expression

Inline Testing

Testing how transformers work with real entity data

Verifying complete policy workflow execution

Use inline testing during transformer development, then validate the complete policy with a dry run before deploying to production.

hashtag
Common Transformers

As part of implementing Lifecycle Management (LCM) processes with Veza, you should create sets of common transformers to define how values such as username, login, or ID are sourced for each LCM Policy. These transformers can then be reused across all identity sync and deprovision policy workflows.

circle-info

Create common transformers to consistently form attributes for specific entity types, and reuse them to avoid errors and save time when creating actions for that entity type. The order of common transformers matters when multiple transformers set the same destination attribute. Drag-and-drop to reorder common transformers and control precedence.

For example, defining a common synced attribute to describe how to format Azure AD account names {username}@evergreentrucks.com enables reuse across multiple workflow actions. You can also define synced attributes at the action level when they are used only once within a policy, such as setting the primary group DN and OU of de-provisioned identities to a group reserved for terminated accounts.

Common Transformer Examples:

Transformer & Entity Type
Attribute
Value Format
Continuous Sync
Description

ADAccountTransformer ActiveDirectoryUser

account_name

{display_full_name}

No

Basic account name

hashtag
$target Attribute Transformer Function

The $target attribute transformer function is used when a value consists of one or more attributes that require an operation(s), making it too complex to transform, but it needs to be reused.

circle-exclamation

Important: The $target function can only be used within the same Action.

For example, an email address consists of [email protected]. However, you must use the format [email protected]envelope. By using the $target function, you reuse only one attribute, username, while not changing the other two attributes (firstname_lastname).

Example:

Destination Attribute

username

Formatter

`{firstname}{lastname}`

Formatter

`{$target.username}@sample.com`

hashtag
Using Transformed Attributes as Lookup Keys

You can reference an attribute set by an earlier transformer as the lookup key in a subsequent transformer. This enables multi-stage transformation pipelines where one transformer computes a normalized value, and a later transformer uses that value for table lookups or other operations.

Example: Compute a padded employee ID in one transformer, then use it to look up a cost center in a later transformer:

Transformer 1 — set padded_id:

{employee_id | LEFT_PAD, 8, "0"}

Transformer 2 — use padded_id as the lookup key:

{$target.padded_id | LOOKUP costCenterTable, padded_id, cost_center}

The $target.padded_id reference resolves to the value set by Transformer 1, and passes it as the key into the LOOKUP function.

circle-info

Order matters: Transformers run in the order they are defined. Place the transformer that sets the source attribute before any transformer that references it via $target.

hashtag
Custom Attribute Transformer Function

The Custom Attribute Transformer function allows you to define a custom transformer that acts as an alias for applying one or more transformer functions.

For example, you can define a custom function named $CLEAN, which is used as {first_name | $CLEAN}. This function can consist of a series of transformer functions such as | ASCII | LOWER | REMOVE_CHAR |.

To define a custom attribute transformer, use the following guidelines:

Policy Version Definitions

  • Custom functions must be defined as part of the policy version.

  • These definitions are structured similarly to hard-coded definitions and are returned in the same format, allowing the Veza UI to handle them without modification.

  • The API for updating and retrieving a policy version must also support these custom function definitions.

circle-info

Naming Convention: Custom functions must be in ALL CAPS and prefixed with a $ to avoid conflicts with built-in functions.

Custom Attribute Transformer Limitations

The following custom definitions are not supported:

  • Transformer functions with included transformer parameters

  • Nested transformer functions

  • Transformer functions with parameters

hashtag
Appending Multi-Value Attribute (Active Directory only)

As part of the Identity Sync action, you can append values to multi-value Active Directory attributes without replacing existing values. This ensures that existing attribute values are preserved when adding new ones.

circle-info

This feature is specific to Active Directory and is not available for other integrations.

Supported Multi-Value Attributes:

Active Directory supports appending for the following multi-value attributes:

  • organizationalStatus, departmentNumber, employeeType

  • servicePrincipalName, proxyAddresses

  • member, memberOf, roleOccupant

  • url, wWWHomePage

  • otherTelephone, otherMobile, otherIpPhone, otherFacsimileTelephoneNumber, otherHomePhone, otherPager, otherMailbox

  • And additional multi-value attributes including: objectClass, postalAddress, postOfficeBox, seeAlso, userCertificate, userSMIMECertificate, userPKCS12, securityIdentifierHistory, altSecurityIdentities, businessCategory

Syntax:

Use the >> prefix before the array to append values:

>>[value1, value2, value3]

Appending syntax supports two array formats:

  • With quotes (JSON format): >>[``"Active", "Permanent"]

  • Without quotes (simple format): >>[Active, Permanent]

When you use this syntax:

  1. New values are added to the end of the existing attribute values

  2. Duplicate values are automatically removed

  3. The order of existing values is preserved

  4. New values appear after existing values in the order specified

For example, ff an Active Directory user has:

organizationalStatus: ["Active", "Employee"]

And you apply the transformer:

>>[Employee, Contractor, Temporary]

The resulting value is:

organizationalStatus: ["Active", "Employee", "Contractor", "Temporary"]

Note that "Employee" was already present and not duplicated.

Setting vs. Appending:

  • To Replace existing values: Use [value1, value2] (without >>)

  • To Append to existing values: Use >>[value1, value2] (with >>)

Additional Notes:

  • The append prefix (>>) only works for multi-value attributes. It is ignored for single-value attributes

  • If the attribute has no existing values, the values are simply set (no difference from non-append behavior)

  • Both the appending syntax and the standard array syntax support arrays with or without quotes around values

Custom Application with SCIM (OAA)

Enable SCIM-based provisioning for custom applications with Open Authorization API

hashtag
Overview

Veza can automate user provisioning and de-provisioning for any application that uses the Open Authorization API (OAA) for data gathering and authorization modeling, and exposes SCIM-compliant endpoints for user and group management.

This enables organizations to:

  • Use your application's existing SCIM endpoints for automated provisioning operations

  • Model complex authorization structures using OAA's flexible templates (applications, resources, permissions, custom properties) for Access Graph visibility, Access Reviews, and other Veza features.

  • Gather authorization metadata using a variety of methods (custom connectors, APIs, manual JSON payloads, CSV files)

hashtag
Supported Actions

Action Type
Supported
Description

Sync Identities

✅

Create new users or update existing user attributes in the target application

Manage Relationships

✅

Add or remove users from groups

See Supported Actions for details on each action type.

hashtag
Enabling Lifecycle Management for Custom Applications (OAA SCIM)

hashtag
Prerequisites

  1. Administrative access in Veza to configure the integration

  2. An existing OAA custom application integration in Veza with at least one successful extraction

  3. Your custom application must expose SCIM 2.0-compliant endpoints; see Required SCIM 2.0 Endpoints below

  4. SCIM connection details for the custom application (URL, authentication credentials)

hashtag
Configuration Steps

To enable the integration:

  1. In Veza, go to the Integrations overview

  2. Search for your custom OAA application integration

  3. Check the box to Enable usage for Lifecycle Management

To verify the configuration:

  1. Open Lifecycle Management > Integrations

  2. Search for the integration and click to view details

  3. In the Properties panel, verify Lifecycle Management Enabled is active

hashtag
Lifecycle Management and Access Requests with Open Authorization API

There are several potential ways to integrate a custom application for automated lifecycle management and access requests:

  1. External SCIM for Open Authorization API: You may build your OAA integration using the custom application template and leverage dedicated SCIM endpoints for user and group management. This is useful when you need full control over how authorization metadata is represented in the Veza Access Graph:

    • Your application supports SCIM, and you want to model a wider range of authorization entities and metadata (e.g., credentials, resources) than the Veza SCIM integration supports.

    • You already have a custom OAA integration and want to add provisioning capabilities using SCIM.

  2. Full SCIM Connector: Use the built-in SCIM connector for both basic data gathering and lifecycle management. This will provide visibility into supported SCIM entities and relationships with schedulable extractions, but not for the full range of entities and metadata that might be modeled using the Application Template such as roles and resources.

  3. Custom REST API Actions: Actions in Veza may directly call any external API and capture the response in audit trails. This can enable Lifecycle Management and Access Requests for any target system, provided it has appropriate endpoints for managing users and access controls.

Aspect
External OAA with SCIM Write-Back
Built-In SCIM Connector

Extraction Method

You build the OAA push payload directly

Auto-discovery via SCIM endpoints

Authorization Modeling

Full OAA Application support (roles, permissions, resources)

Users and groups only

This document describes how to enable External SCIM for an Open Authorization API integration, and supported actions.

hashtag
How It Works

Data Gathering (OAA):

You will need to design and build a custom integration to publish information about the application to the Veza Access Graph:

  • The payload can include local users, groups, permissions, resources, and complex authorization relationships

  • Data can be gathered from any source: APIs, databases, configuration files, etc.

See the rest of the Open Authorization API documentation for examples and best practices when designing and deploying custom integrations.

Lifecycle Management (SCIM):

You can enable the SCIM connection at the custom provider level:

  • Setting provisioning: true and external_lifecycle_management_type: SCIM for the custom provider enables Veza to use your application's SCIM endpoints for provisioning

  • Provide SCIM connection information and credentials (configuration_json)

  • Veza maps lifecycle actions to SCIM operations (POST /Users, PATCH /Users/{id}, etc.)

Important: When configuring a custom application for SCIM integration, the OAA payload structure (Application template) and SCIM configuration serve different purposes:

  • The OAA Payload (push_application() or API push) defines local users, groups, permissions, and resources used for visibility and authorization modeling in Veza, and can be updated independently.

  • The SCIM Configuration (configuration_json) for the custom provider defines how to connect to SCIM endpoints (including authentication, URL, and endpoint paths), and is used only for lifecycle management and access request operations.

Both must be consistent (describe and contain the same users and groups), but are configured separately.

hashtag
Required SCIM 2.0 Endpoints

Your application must expose SCIM 2.0 compliant endpoints with the following operations:

User Management:

  • GET /Users - List and filter users

  • GET /Users?filter=userName eq "{username}" - Query users by userName

  • POST /Users - Create new users

  • GET /Users/{id} - Retrieve specific user by ID

  • PATCH /Users/{id} - Update user attributes

  • DELETE /Users/{id} - Delete user (required if using Delete Identity action)

Group Management:

  • GET /Groups - List groups

  • GET /Groups/{id} - Retrieve specific group by ID

  • POST /Groups - Create new groups

  • PATCH /Groups/{id} - Update group membership

  • DELETE /Groups/{id} - Delete group (optional)

Note: If the Users and Groups APIs are not at the standard /Users and /Groups paths, you can specify alternate endpoint paths in the configuration.

hashtag
Authentication

Your SCIM API must support one of the following authentication methods:

  • Bearer Token: API token passed in Authorization: Bearer {token} header

  • Basic HTTP Authentication: Username and password passed in Authorization: Basic {credentials} header

The authentication credentials must have both read and write permissions to the SCIM endpoints.

hashtag
Optional: Extension Attributes

To synchronize custom attributes beyond the standard SCIM user schema:

  • Expose a GET /Schemas endpoint that returns SCIM schema definitions

  • Enable schema fetching in your configuration (see Configuration section)

hashtag
Configuration

External SCIM for Lifecycle Management is configured via the Veza REST API.

hashtag
Create Custom Provider with External SCIM

Create a Custom Provider that uses external SCIM endpoints specifically for lifecycle management:

curl -X POST "https://{VEZA_URL}/api/v1/providers/custom" \
  -H "authorization: Bearer {API_KEY}" \
  -H "Content-Type: application/json" \
  --data '{
    "name": "MyCustomApp",
    "custom_template": "application",
    "provisioning": true,
    "external_lifecycle_management_type": "SCIM",
    "configuration_json": "{\"scim_url\":\"https://api.myapp.com/scim/v2\",\"scim_token\":\"your-bearer-token\"}"
  }'

Required Fields

Field
Required
Description

name

Yes

Display name for the Custom Provider in Veza

custom_template

Yes

OAA template type ("application")

Configuration JSON Parameters

The configuration_json field contains SCIM endpoint connection details used only for provisioning operations. It does not affect your OAA payload structure.

Configuration Key
Required
Description
Example Value

scim_url

Yes

Base URL for SCIM API (without /Users or /Groups path)

""

scim_token

No*

* One of scim_token or the username/password pair is required for authentication.

Example Configuration with Bearer Token:

{
  "scim_url": "https://api.customerportal.internal.com/scim/v2",
  "scim_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...",
  "scim_extension_schemas": true
}

Example Configuration with Basic Authentication:

{
  "scim_url": "https://legacy.mycompany.com/api/scim",
  "username": "scim-service-account",
  "password": "secure-password-here"
}

hashtag
Push OAA Payload

Push the OAA Application Payload as normal. See the Getting Started Guide for details.

hashtag
Entity Types and Identity Mapping

Veza creates entities in Access Graph based on the OAA payload, which can be targeted in lifecycle management operations:

  • local_users in your Application template → Users to provision via SCIM

  • local_groups in your Application template → Groups to manage via SCIM

Entity types are named according to the following pattern:

  • User Entity Type: OAA.{application_type}.User

  • Group Entity Type: OAA.{application_type}.Group

Where {application_type} is the value you specify in your OAA Application template when building the payload. For example, if the application is defined:

custom_app = CustomApplication(
    name="CustomerPortal",           # Display name
    application_type="CustomerPortal" # This determines entity types!
)

The resulting entity types are:

  • OAA.CustomerPortal.User

  • OAA.CustomerPortal.Group

hashtag
Attribute Synchronization

hashtag
Mapping OAA to SCIM

When Veza provisions users via SCIM, transformers can map attributes from your policy source of identity to SCIM properties:

Veza Attribute (in Policy)
SCIM Property
Type
Required
Description

user_name

userName

String

Yes

Unique username

hashtag
Extension Attributes

If the SCIM service exposes a /Schemas endpoint and you enable scim_extension_schemas: true, Veza can synchronize custom extension attributes beyond the standard SCIM user schema. Extension attributes are mapped using the schema URN as defined by your SCIM implementation.

hashtag
Provisioning Operations

The following SCIM operations are performed when Lifecycle Management actions execute:

hashtag
Sync Identities (Create User)

Create a new user in the target application.

SCIM Operation:

POST /Users
Content-Type: application/scim+json
{
  "schemas": ["urn:ietf:params:scim:schemas:core:2.0:User"],
  "userName": "jane.doe",
  "name": {
    "givenName": "Jane",
    "familyName": "Doe",
    "formatted": "Jane Doe"
  },
  "emails": [
    {"value": "[email protected]", "primary": true}
  ],
  "active": true
}

The SCIM endpoint creates the user and returns the user object with an assigned id.

hashtag
Sync Identities (Update User)

Updates an existing user's attributes (one-time or continuously).

SCIM Operations:

  1. Query for existing user:

    GET /Users?filter=userName eq "jane.doe"
  2. Update the user:

    PATCH /Users/{id}
    Content-Type: application/scim+json
    {
      "schemas": ["urn:ietf:params:scim:api:messages:2.0:PatchOp"],
      "Operations": [
        {"op": "replace", "path": "displayName", "value": "Jane Smith"}
      ]
    }

hashtag
De-provision Identity

Remove access when a user leaves the organization or changes roles. The user account is deactivated, but data is preserved.

SCIM Operation:

PATCH /Users/{id}
Content-Type: application/scim+json
{
  "schemas": ["urn:ietf:params:scim:api:messages:2.0:PatchOp"],
  "Operations": [
    {"op": "replace", "path": "active", "value": false}
  ]
}

Deprovision sets active=false, which disables login but preserves the user record.

hashtag
Delete Identity

Permanently remove a user account.

SCIM Operation:

DELETE /Users/{id}

hashtag
Manage Relationships (Add User to Group)

Grant a user access via group membership.

SCIM Operations:

  1. Retrieve group details:

    GET /Groups/{groupId}
  2. Add user to group:

    PATCH /Groups/{groupId}
    Content-Type: application/scim+json
    {
      "schemas": ["urn:ietf:params:scim:api:messages:2.0:PatchOp"],
      "Operations": [
        {
          "op": "add",
          "path": "members",
          "value": [{"value": "{userId}"}]
        }
      ]
    }

hashtag
Manage Relationships (Remove User from Group)

Revoke a user's access by removing group membership.

SCIM Operation:

PATCH /Groups/{groupId}
Content-Type: application/scim+json
{
  "schemas": ["urn:ietf:params:scim:api:messages:2.0:PatchOp"],
  "Operations": [
    {
      "op": "remove",
      "path": "members",
      "value": [{"value": "{userId}"}]
    }
  ]
}

hashtag
Create Entitlement (Create Group)

Creates a new group so that it can be granted as an entitlement.

SCIM Operation:

POST /Groups
Content-Type: application/scim+json
{
  "schemas": ["urn:ietf:params:scim:schemas:core:2.0:Group"],
  "displayName": "Engineering Team"
}

How-to Guides

Step-by-step guides for common Lifecycle Management tasks and configurations

These guides provide step-by-step instructions for common Lifecycle Management tasks and configurations.

hashtag
In this section

Guide
Description

End-to-end example using Workday as source, with Okta and AD as targets

Automatically assign Microsoft 365 licenses during onboarding

Validate policy behavior before enabling production execution

Pause or stop automation without deleting configurations

hashtag
Additional resources

  • Lifecycle Management FAQ - Common questions and troubleshooting

  • Implementation and Core Concepts - Architecture overview

  • Dashboard - Monitor workflow execution and policy status

Test Policies with Dry Run

Safely preview policy changes and validate workflow logic before enabling policies in production

hashtag
Overview

This guide explains how to use dry run simulations to test Lifecycle Management policies before enabling them in production. Dry run evaluates workflow logic and shows what actions would occur without making actual changes to target systems.

Use dry run testing to:

  • Validate that workflow trigger conditions match the intended identities

  • Preview what provisioning or deprovisioning actions would occur

  • Test policy changes safely before deployment

  • Troubleshoot when workflows are not triggering as expected

hashtag
Before you start

Before testing with dry run:

  • Create or edit a Lifecycle Management policy with at least one workflow

  • Ensure your source of identity contains test identities or representative data

hashtag
Run a dry run for a single identity

Use single-identity dry run to test how a specific identity would be processed by a policy.

hashtag
From a policy

  1. Go to Lifecycle Management > Policies.

  2. Select a policy to view its details.

  3. Click Perform Dry Run.

hashtag
From an identity

  1. Go to Lifecycle Management > Identities.

  2. Search for an identity and click to view its details.

  3. Click the Actions menu and select Policy Dry Run.

hashtag
Run a bulk dry run

Use bulk dry run to test a policy against multiple identities at once. You can test against all identities or filter to a specific subset.

  1. Go to Lifecycle Management > Policies.

  2. Select a policy and click Perform Dry Run Bulk.

  3. Choose your identity selection method:

circle-info

Bulk dry runs may take 8-9 hours to complete for large populations. Focus review on joiner and leaver counts. Investigate unusually high counts (especially leavers) before publishing—this may indicate a misconfigured trigger condition.

hashtag
Review dry run results

Dry run results show what would happen if the policy ran against the selected identities.

hashtag
Matched workflows

The Workflows Run section shows which workflows triggered for the identity and why. If no workflows matched, verify that the identity's attributes meet the workflow trigger conditions.

hashtag
Planned actions

The Potential Changes section lists all actions that would run, including:

  • User accounts that would be created or updated

  • Attributes that would be synced

  • Access profiles that would be assigned or removed

  • Relationships (group memberships) that would be added or removed

Click View Details on any action to see its full configuration, including sync attributes, relationship mappings, REST payload contents, and password complexity rules.

hashtag
Result: 0 changes

When a dry run returns "0 changes", the selected identity does not meet any trigger conditions in the policy's workflows. This is not an error; it means the identity would not be processed by this policy.

hashtag
Filter bulk dry run results by attribute changes

When running a bulk dry run, you can filter results to focus on identities where the policy would actually change attribute values. This helps you identify accounts that are out of sync with your policy's desired state, without manually reviewing every identity.

In the bulk dry run results table, use the Has Attribute Changes filter dropdown in the filter bar above the results to show only identities where one or more attributes would be modified. The results table shows which attributes would change for each identity. When multiple attributes would change, they appear as tags and collapse to Attribute Changes (N) when there are many.

For each attribute that would change, the dry run captures three values:

  • Current Value: The attribute value that Veza last synced to the target system

  • Current Graph Value: The value currently observed in the target system (which may have drifted from the last sync)

  • New Value: The value the policy would write on the next run

Reviewing these three values together helps you understand whether a difference is due to configuration drift, a manual change in the target system, or a policy update — and whether the proposed change is expected.

hashtag
View dry run history

Bulk dry run results are preserved in a history table, so you can review previous tests and compare results across multiple runs.

  1. Go to Lifecycle Management > Policies.

  2. Select a policy.

  3. Click See Dry Run Bulk History.

The history shows each dry run task with its filter criteria, identity counts, workflow matches, and timestamps.

hashtag
Test disabled workflows

Disabled workflows are evaluated by default during dry run simulations. This means you can test workflow logic before enabling it in production. The dry run results show what actions would run if the workflow were enabled.

To learn how to disable workflows, see .

hashtag
Limitations

Dry run has several important limitations:

hashtag
What dry run does not evaluate

Dry runs validate trigger and condition matching but do not evaluate:

  • "First time only" workflow flags (the flag that prevents re-triggering)

  • Property change detection (for sync workflows)

  • Scheduled triggers

  • "Skip if action has already been run" action flags

These behaviors only execute in live policy runs. Test these scenarios with individual identities in a controlled environment before full deployment.

hashtag
Integration and action validation

  • No integration testing: Dry run does not check whether integrations are functioning properly or whether target systems are accessible. A broken integration might cause workflow-defined changes not to be applied when the policy runs.

  • No action validation: Dry run evaluates whether workflow conditions are met, not whether actions would succeed. It does not validate that changes could be successfully applied.

  • Simulation only: Dry run identifies actions that would execute but does not perform them.

circle-info

Dry run does not test integration connectivity. Issues like API timeouts, authentication failures, or attribute mapping errors are not detected during simulation.

hashtag
Best practices

  • Test with representative identities: Select identities that represent different scenarios (new hires, role changes, terminations) to validate all workflows in your policy.

  • Simulate attribute changes: Modify identity attributes during dry run to test trigger conditions such as department changes, employment status updates, or location transfers.

  • Test edge cases: Use dry run to test unusual scenarios that might not occur frequently, such as same-day rehire after termination or simultaneous department and location changes.

hashtag
Pre-publish checklist

Before publishing a policy version:

hashtag
See also

Bearer

Bearer token authentication

JWT tokens, API tokens

Login to Bearer

Two-step: login request, then extract token from response

APIs requiring session-based auth

OAuth2

OAuth 2.0 client credentials flow

Modern APIs with OAuth2 support

None

No authentication header added

Public APIs, pre-authenticated endpoints

bearer_token_attribute

Yes

Dot-notation path to the token in the login response (e.g., value.token)

authentication_method

Yes

How to send credentials: FORM or BASIC (see below)

auth_url

No

Token endpoint URL. Defaults to {credential_url}/oauth2/token if not specified

ca_certificate_base64

No

Base64-encoded CA certificate for the OAuth2 token endpoint, if it uses a self-signed or internal CA

Auth Type Configuration

provisioning

Yes

Must be true to enable Lifecycle Management

external_lifecycle_management_type

Yes

Set to SEND_REST_PAYLOAD to enable routing

data_plane_id

Yes

Insight Point ID (UUID) to execute requests (create only). Find at Integrations > Insight Points in the UI.

SCIM configuration
Authorization Header
REST Auth Credentials
Custom Certificate Configuration
Using Custom Certificates
SCIM for Custom Applications
Insight Point
Open Authorization API
Attribute Transformers
Select an identity to test.
  • Optionally, modify identity attributes to simulate changes (such as a department transfer or status change).

  • Click Show Results.

  • Select a policy and optionally customize attributes.
  • Click Show Results.

  • Select All: Test against every identity in the policy
  • Select Identities individually: Choose specific identities from a searchable list

  • Select Identities based on properties: Enter a SCIM filter expression to target identities by attribute values (for example, department eq "Engineering" or is_active eq true)

  • Click Run Dry Run.

  • Disable workflows and actions
    Lifecycle Management policies
    Disable workflows and actions
    Run Dry Run on Identity API
    Policies
    Conditions and Actions
    Trigger Conditions Reference
    Notifications
    LCM-Triggered Access Reviews
    ,
    carLicense
    ,
    homePostalAddress

    Whether to update on existing users

    Enabled/Disabled

    Fallback formatters

    Alternative templates if the primary causes conflicts

    {first_name}.{last_name}[email protected]

    email

    {first_name}.{last_name}@domain.com {first_name}_{last_name}@domain.com {last_name}@domain.com {firstname_initial}{last_name}@domain.com {firstname_initial}-{last_name}@domain.com {firstname_initial}{middlename_initial}{last_name}@domain.com {last_name}-{firstname_initial}@domain.com

    -

    {$workday$in.department}

    Get the authoritative source value

    $out

    Target only

    {$workday$out.department}

    Get the current target value

    co

    Contains

    String, string list

    sw

    Starts with

    String

    ew

    Ends with

    String

    lt

    Less than

    Number, timestamp

    le

    Less than or equals

    Number, timestamp

    gt

    Greater than

    Number, timestamp

    ge

    Greater than or equals

    Number, timestamp

    Converts ID to uppercase

    JSMITH" is the output derived from the userid, "jsmith"

    Substring

    FIRST_N, LAST_N, SUB_STRING, SPLIT

    Extract portions of values

    Padding

    LEFT_PAD, RIGHT_PAD, ZERO_PAD

    Create fixed-width identifiers

    Date/time

    DATE_FORMAT, DATE_ADJUST, DATE_ADJUST_DAY, ASSUME_TIME_ZONE, UTC_TO_TIME_ZONE, NOW

    Convert and manipulate dates

    Character encoding

    ASCII, REMOVE_DIACRITICS

    Handle international characters

    Lookup

    LOOKUP, FROM_ENTITY_ATTRIBUTE, FROM_MANY_ENTITIES_ATTRIBUTE

    Cross-reference data from tables or entities

    Generation

    NEXT_NUMBER, UUID_GENERATOR, RANDOM_INTEGER, RANDOM_STRING_GENERATOR, RANDOM_ALPHANUMERIC_GENERATOR, RANDOM_NUMBER_GENERATOR

    Create unique values

    Domain

    REMOVE_DOMAIN

    Extract usernames from email addresses

    Formatting

    COUNTRY_CODE_ISO3166, LANGUAGE_RFC5646, PHONE_NUMBER_E164

    Standardize to international formats

    {start_date | DATE_FORMAT("2006-01-02")}

    2025-01-15T10:30:00Z

    2025-01-15

    {name | LOWER | REPLACE_ALL(" ", ".")}

    John Smith

    john.smith

    distinguished_name

    CN={first_name} {last_name},OU={department},OU={location},DC=company,DC=local

    Yes

    Full AD path

    user_principal_name

    `{first_name

    SUB_STRING,0,1

    LOWER}.{last_name

    email

    {first_name}{last_name}@company.com

    Yes

    Email address

    OktaAccountTransformer OktaUser

    login

    `{first_name

    SUB_STRING,0,1

    LOWER}.{last_name

    email

    {first_name}{last_name}@company.com

    Yes

    Email address

    username_prefix

    `{first_name

    SUB_STRING,0,1

    LOWER}.{last_name

    AzureADTransformer AzureADUser

    principal_name

    {first_name}{last_name}

    No

    Primary identifier

    mail_nickname

    `{first_name

    SUB_STRING,0,1

    LOWER}{last_name

    display_name

    {first_name} {last_name}

    Yes

    Display name

    GoogleAccountTransformer GoogleWorkspaceUser

    email

    {first_name}{last_name}@company.com

    No

    Primary email

    email_addresses

    {username}@company.com

    No

    Email list

    recovery_email

    {personal_email}

    Yes

    Backup email

    ContractorTransformer ActiveDirectoryUser

    account_name

    c-{username}

    No

    Contractor prefix

    distinguished_name

    CN={first_name} {last_name},OU=Contractors,OU={department},DC=company,DC=local

    Yes

    Contractor OU

    description

    Contractor - {vendor_company} - Start Date: {start_date}

    Yes

    Metadata

    RegionalEmailTransformer ExchangeUser

    email_address

    {username}@{region}.company.com

    No

    Regional email

    alias

    {first_name}.{last_name}@{region}.company.com

    Yes

    Regional alias

    Transformation Functions
    Then Apply
    RANDOM_INTEGER
    Terminology
    Dry Run
    Dry Run
    Workday, Okta, and Active Directory
    Assign O365 Licenses with Workday and Azure AD
    Test Policies with Dry Run
    Disable Workflows and Actions

    De-provision Identity

    ✅

    Deactivate user accounts (sets active=false in SCIM)

    Delete Identity

    ✅

    Permanently delete user accounts from the target application

    Create Entitlement

    ✅

    Create new groups in the target application

    Lifecycle Management

    Via SCIM endpoints

    Via SCIM endpoints

    Use Case

    Complex custom applications where visibility or access reviews are needed.

    Standard SaaS with SCIM support

    provisioning

    Yes

    Must be set to true to enable Lifecycle Management

    external_lifecycle_management_type

    Yes

    Lifecycle management mode (use "SCIM" to enable SCIM-based provisioning)

    configuration_json

    Yes

    JSON-encoded string containing SCIM connection details (see structure below)

    Bearer token for authentication

    "eyJhbGci..."

    username

    No*

    Username for basic authentication

    "scim-admin"

    password

    No*

    Password for basic authentication

    "secure-password"

    users_endpoint

    No

    Users endpoint path (defaults to Users if not specified)

    "Users"

    groups_endpoint

    No

    Groups endpoint path (defaults to Groups if not specified)

    "Groups"

    scim_extension_schemas

    No

    Fetch SCIM schemas for extension attribute support (default: false)

    true

    ca_certificate

    No

    Custom CA certificate for SSL verification (PEM format)

    "-----BEGIN CERTIFICATE-----..."

    emails

    emails

    Array

    No

    Email addresses

    display_name

    displayName

    String

    No

    User's display name

    title

    title

    String

    No

    Job title

    nick_name

    nickName

    String

    No

    Casual name

    external_id

    externalId

    String

    No

    External system identifier

    phone_numbers

    phoneNumbers

    Array

    No

    Phone numbers (JSON array)

    addresses

    addresses

    Array

    No

    Physical addresses (JSON array)

    ims

    ims

    Array

    No

    Instant messaging addresses (JSON array)

    photos

    photos

    Array

    No

    Photo URLs (JSON array)

    locale

    locale

    String

    No

    User's locale

    preferred_language

    preferredLanguage

    String

    No

    Preferred language

    profile_url

    profileUrl

    String

    No

    Profile page URL

    timezone

    timezone

    String

    No

    User's timezone

    user_type

    userType

    String

    No

    User classification

    formatted_name

    name.formatted

    String

    No

    Full formatted name

    family_name

    name.familyName

    String

    No

    Last name

    given_name

    name.givenName

    String

    No

    First name

    middle_name

    name.middleName

    String

    No

    Middle name

    https://api.myapp.com/scim/v2arrow-up-right

    Remove Relationship

  • Create Email

  • Change Password

  • Delete Identity

  • Disable Identity

  • Manage Relationships

  • Write Back Email

  • Access Request Complete

  • Custom Action

  • Action Failed

  • Workflow Task Failed

  • Extraction Event Failed

  • Create Entitlement

  • Create Guest Account

  • Rename Entitlement

  • Create Access Review

  • Reset Password

  • Create Access Review Queued

  • Safety Limit Reached

  • Predictive Safety Limit Exceeded

  • Workflow Predictive Safety Limit Exceeded

  • Sync Entitlement

  • field. This allows the receiving endpoint to authenticate the request using Bearer tokens, API keys, or other authentication schemes.

    Create Identity Failed

    LIFECYCLE_MANAGEMENT_CREATE_IDENTITY_FAILED

    Sent when identity creation fails

    Sync Identity

    LIFECYCLE_MANAGEMENT_SYNC_IDENTITY

    Sent when an identity is synchronized

    Sync Identity Failed

    LIFECYCLE_MANAGEMENT_SYNC_IDENTITY_FAILED

    Sent when identity sync fails

    Delete Identity

    LIFECYCLE_MANAGEMENT_DELETE_IDENTITY

    Sent when an identity is deleted

    Delete Identity Failed

    LIFECYCLE_MANAGEMENT_DELETE_IDENTITY_FAILED

    Sent when identity deletion fails

    Disable Identity

    LIFECYCLE_MANAGEMENT_DISABLE_IDENTITY

    Sent when an identity is disabled

    Disable Identity Failed

    LIFECYCLE_MANAGEMENT_DISABLE_IDENTITY_FAILED

    Sent when identity disabling fails

    Create Guest Account

    LIFECYCLE_MANAGEMENT_CREATE_GUEST_ACCOUNT

    Sent when a guest account is created

    Create Guest Account Failed

    LIFECYCLE_MANAGEMENT_CREATE_GUEST_ACCOUNT_FAILED

    Sent when guest account creation fails

    Add Relationship Failed

    LIFECYCLE_MANAGEMENT_ADD_RELATIONSHIP_FAILED

    Sent when adding relationship fails

    Remove Relationship

    LIFECYCLE_MANAGEMENT_REMOVE_RELATIONSHIP

    Sent when a relationship is removed

    Remove Relationship Failed

    LIFECYCLE_MANAGEMENT_REMOVE_RELATIONSHIP_FAILED

    Sent when removing relationship fails

    Create Email Failed

    LIFECYCLE_MANAGEMENT_CREATE_EMAIL_FAILED

    Sent when email creation fails

    Write Back Email

    LIFECYCLE_MANAGEMENT_WRITE_BACK_EMAIL

    Sent when email is synced back

    Write Back Email Failed

    LIFECYCLE_MANAGEMENT_WRITE_BACK_EMAIL_FAILED

    Sent when email sync back fails

    Change Password Failed

    LIFECYCLE_MANAGEMENT_CHANGE_PASSWORD_FAILED

    Sent when password change fails

    Reset Password

    LIFECYCLE_MANAGEMENT_RESET_PASSWORD

    Sent when a password is reset

    Reset Password Failed

    LIFECYCLE_MANAGEMENT_RESET_PASSWORD_FAILED

    Sent when password reset fails

    Create Entitlement Failed

    LIFECYCLE_MANAGEMENT_CREATE_ENTITLEMENT_FAILED

    Sent when entitlement creation fails

    Rename Entitlement

    LIFECYCLE_MANAGEMENT_RENAME_ENTITLEMENT

    Sent when an entitlement is renamed

    Rename Entitlement Failed

    LIFECYCLE_MANAGEMENT_RENAME_ENTITLEMENT_FAILED

    Sent when entitlement renaming fails

    Sync Entitlement

    LIFECYCLE_MANAGEMENT_SYNC_ENTITLEMENT

    Sent when an entitlement is synced

    Sync Entitlement Failed

    LIFECYCLE_MANAGEMENT_SYNC_ENTITLEMENT_FAILED

    Sent when entitlement sync fails

    Custom Action Failed

    LIFECYCLE_MANAGEMENT_CUSTOM_ACTION_FAILED

    Sent when custom action fails

    Action Succeed

    LIFECYCLE_MANAGEMENT_ACTION_SUCCEED

    Sent when an action succeeds

    Action Failed

    LIFECYCLE_MANAGEMENT_ACTION_FAILED

    Sent when an action fails

    Workflow Task Failed

    LIFECYCLE_MANAGEMENT_WORKFLOW_TASK_FAILED

    Sent when a workflow task fails

    Extraction Event Failed

    LIFECYCLE_MANAGEMENT_EXTRACTION_EVENT_FAILED

    Sent when extraction processing fails

    Create Access Review

    LIFECYCLE_MANAGEMENT_CREATE_ACCESS_REVIEW

    Sent when access review is created

    Predictive Safety Limit Exceeded

    LIFECYCLE_MANAGEMENT_PREDICTED_SAFETY_LIMIT_EXCEEDED

    Sent when a predictive safety limit blocks changes before processing

    Workflow Predictive Safety Limit Exceeded

    LIFECYCLE_MANAGEMENT_WORKFLOW_PREDICTED_SAFETY_LIMIT_EXCEEDED

    Sent when a workflow-level predictive safety limit blocks changes

    Access Request Action Run

    LIFECYCLE_MANAGEMENT_ACCESS_REQUEST_ACTION_RUN

    Sent when Access Request actions start running

    Access Request State Changed

    LIFECYCLE_MANAGEMENT_ACCESS_REQUEST_STATE_CHANGED

    Sent when Access Request state changes

    Access Request Approver Assigned

    LIFECYCLE_MANAGEMENT_ACCESS_REQUEST_APPROVER_ASSIGNED

    Sent when new approvers are assigned

    Access Request Succeed

    LIFECYCLE_MANAGEMENT_ACCESS_REQUEST_SUCCEED

    Sent when Access Request succeeds

    Access Request Failed

    LIFECYCLE_MANAGEMENT_ACCESS_REQUEST_FAILED

    Sent when Access Request fails

    The name of the entity/identity

    {{LOGIN_NAME}}

    The login/username for the account

    {{LOGIN_PASSWORD}}

    The password (for password-related notifications)

    {{EMAIL}}

    Email address associated with the identity

    Name of the related entity

    Type of action

    {{ACTION_JOB_ID}}

    Unique identifier for the action job

    {{SUCCEED_OR_FAILED}}

    Status indicator ("succeeded" or "failed")

    {{SENT_INVITE}}

    Whether an invite was sent (for guest accounts)

    Name of the entity requesting access

    {{ACCESS_REQUEST_ENTITY_TYPE}}

    Type of the requesting entity

    {{ACCESS_REQUEST_TARGET_TYPE}}

    Type of the target resource

    {{ACCESS_REQUEST_TARGET_NAME}}

    Name of the target resource

    {{ACCESS_REQUEST_URL}}

    URL to view the Access Request details

    {{ACCESS_REQUEST_STATE}}

    Current state of the Access Request

    {{ACCESS_REQUEST_SOURCE_TYPE}}

    Source type of the Access Request

    Job identifier

    {{EVENT_ERROR_MESSAGE}}

    Error message for failed events

    {{EVENT_IDENTITY_ID}}

    Identity ID associated with the event

    {{EVENT_IDENTITY_NAME}}

    Identity name associated with the event

    Name of the workflow; serves as the stable unique identifier for the workflow

    {{DATASOURCE_ID}}

    Datasource identifier

    Webhooks
    Another for inactive users to cover Leaver scenarios
    The policy name is used to identify it on the Policies list and event logs
  • The name should indicate the source of identity that the policy applies to

  • Select a Primary Identity Source using the arrows to display a list of available data source integrations.

    • The selected identity source will trigger workflows in the policy

    • For the identity source to appear in the menu list, the integration must have Lifecycle Management enabled and be available as a source of identity (SOI).

    See Integrations for a list of supported providers and the steps to enable a Lifecycle Management data source.

    Note: A Lifecycle Management data source can only be used to trigger workflows in one policy at a time. However, you can assign multiple Lifecycle Management data sources to a single policy as Primary Identity Sources. For example, Company A merges with Company B using Active Directory as its Primary Identity Source. The Primary Identity Source can be comprised of two integrations: Company A AD (from a CSV Upload integration) and Company B Employee Directory (from an OAA integration).

    circle-exclamation

    OAA template restriction for Source of Identity: When using an OAA custom provider as a Source of Identity, only providers configured with the HRIS or Identity Provider (IdP) template type are eligible. Providers using the Application or Principal template types can serve as provisioning targets but cannot be used as identity sources. No additional provider needs to be created if an existing HRIS or IdP OAA provider is already configured.

  • (Optional) Use the Additional Identity Source to add more data sources and correlating attributes.

    • Click Add Source.

    • Use the arrows to search for an Identity Source.

    • In Primary Attributes, select a primary attribute from the dropdown menu.

    • In Additional Attributes, select another attribute from the dropdown menu.

    • Click Add to add more Primary Attributes and/or Additional Attributes.

    • The Only enrich identity if existing in Primary Identity Source option controls identity creation:

      • Enabled: Only adds data to existing identities from the Primary Identity Source. Does not create new LCM identities.

      • Disabled: Creates new LCM identities when users exist in the Additional Identity Source but not in the Primary Identity Source.

    • The Skip Workflow Runs on Extraction option controls whether workflows are triggered when this identity source is extracted:

      • Enabled: Updates identity attributes from this source without running workflows. Use this when you want to enrich identities with supplementary data but don't need provisioning or deprovisioning actions to run.

      • Disabled (default): Workflows run normally when extractions occur from this source.

  • Click Save. The policy is automatically set to the Initial state.

  • Select one or more attributes to sync. You can modify attributes to simulate potential changes.

  • Click Show Results.

  • Review the results:

    • Check the Workflows Run section to see which workflows were triggered.

    • Check the Potential Changes section to see all job requests that would be generated (e.g., edits to user attributes, adding/removing access profiles).

  • Select a policy, customize entity attributes, and click Show Results.
    A broken integration might cause workflow-defined changes not to be applied to an identity
    Employment status updates
  • Location transfers

  • Role modifications

  • Test Edge Cases: Use Dry Run to test unusual scenarios or edge cases that might not occur frequently in your environment.

    A Dry Run executes the workflow logic end-to-end, making no external changes. It evaluates conditions, decides which actions would run, and logs the decisions and payloads. That makes it ideal for probing unusual or risky situations without touching real accounts or entitlements. Here are some edge case examples:

  • Actions execute: Actions within a condition execute in order. If an action fails, the remaining conditions in the workflow are skipped and the workflow is marked as errored — unless the failing action has Continue on Error enabled, or the parent condition has Continue Actions if Any Error enabled.

    Dry Run - In test mode

    Actions
    menu (three dots icon) and clicking
    Start
    . The
    Create Draft
    button is enabled.
  • Click the overflow menu (three dots) and select Perform Dry Run to test your workflow.

  • If you are not satisfied with the results of the Dry Run simulation, then click Create Draft. Your workflow will be labeled with a new version number.

  • Click Edit Workflow to make changes to your workflow.

  • Continue to modify your workflow using the previous steps until your workflow displays the expected results. Click Publish.

  • You can view the history of your workflow versions and rollback any draft version for use.

  • Triggering workflows or notifications.
  • Becomes visible in reporting, monitoring, and compliance views.

  • It can still be updated by moving it back into Policy Draft Mode first.

  • VEZA_TOKEN for production
  • VEZA_TOKEN_2 for sandbox

  • Set up a Python virtual environment for running migration scripts.

  • Obtain the migration script and lookup table files from Veza support.

  • Email Templates
  • Webhook notifications

  • Update the migration script configuration with source and target version numbers.

  • Run the migration script.

  • Review the migrated policy and apply any manual corrections needed.

  • Run a bulk dry run (allow 8-9 hours for completion).

  • Review joiner and leaver counts—high counts may indicate configuration issues.

  • Publish the policy and wait for the next extraction to verify correct execution.

  • Review the Activity Log approximately 30 minutes after extraction completes.

  • Filter to show all providers by their current state
  • Click the three dots icon ⋮ in the rightmost column to expand the Actions menu

    • View Details - Displays the date (or timeframe) the policy was last updated and its integrations. Use this view to create a workflow, transformer, property, password complexity rules, or transformer functions.

    • Pause - Pause the Running state of the policy.

    • Delete - Deletes the policy.

  • transformer functions embedded in SCIM filter conditions
    , which enable more complex or refined triggering logic within workflows (e.g., matching specific attribute filters to drive provisioning).
    Priority
    field, use the dropdown menu to select:

    High

  • Critical

  • Run only when trigger condition is first met -

    • If Enabled: The workflow executes only when the trigger condition is initially met, and on every subsequent transition from "not met" to "met."

    • If Disabled: The workflow runs on every check where the condition is true, regardless of its previous status.

  • Run only if specific properties change - This workflow is conditionally triggered for an identity when a change is detected in one or more of its specified properties. When enabled, the Properties field appears. For more precise control (such as triggering only when two specific properties change together) use sys_attr_changed__<property> attributes directly in the trigger condition string instead. See System Attributes.

  • In the Properties field, select a property attribute from the dropdown menu. As the defining attributes of identities, accounts, and entitlements, properties furnish the data points upon which a policy can base its action-oriented logic.

  • In the Date Formatters, click Add Date Formatter.

  • Click the Formatter field to display a dropdown menu of operator functions, the conditional expression function, and attributes.

  • Click the Then Apply field to display a dropdown menu of operator functions. The Then Apply field combines a series of attribute formatters with the pipe (|) character to run the value of an attribute in sequence. The output of one formatter becomes the input of the following formatter.

  • In the Minimum Delay Before Running field, set the delay in hours, minutes, and seconds. This option prevents actions from executing immediately when a trigger condition is met. The purpose of such a delay is usually to allow for propagation or to prevent repeated rapid changes that trigger unintended cycles.

  • Click Save Workflow.

  • window, enter a transformer name and description.
  • Click the Integration field to display a dropdown menu of integrations of a target system.

  • Click the Entity Type field to display target entity types based on the integration that was previously selected.

  • In Attributes, click Add Attribute.

  • In Unique Identifier, click the Destination Attribute field to display a list of attributes.

  • Click the Formatter field to display a dropdown menu of operator functions, the Conditional Express function, and attributes.

  • Click the Then Apply field to display a dropdown menu of operator functions. The Then Apply field combines a series of attribute formatters with the pipe (|) character, which runs the value of an attribute in sequential order. The output of one formatter becomes the input of the following formatter.

  • Optionally, click Add Attribute to add more attributes and repeat the attribute steps.

  • The Fallback Formatters option appears. Click this option to provide an alternative formatter when a conflict occurs if the primary formatter generates a value that is already in use.

  • Optionally, enable the Continuous Sync function to keep the target entity up-to-date with values from the source of truth.

  • Click Save.

  • window, enter a name and description for the Lookup table.
  • Drag and drop a CSV file or navigate to a CSV file to upload. The CSV file must be 10MB or less.

  • After uploading the file, you can preview it.

  • Click Save.

  • In the Properties window, click the Edit Properties field to display a dropdown menu of attributes.
  • Select one or more attributes for your property.

  • Click Save.

  • New Password Complexity Rule
    window, enter a name and the length of the password (default is 6).
  • Enable the buttons for:

    • Allow lowercase characters

    • Allow uppercase characters

    • Allow numeric characters

    • Allow special characters

    Note: At least numbers, lowercase, or uppercase characters must be allowed.

  • In the Disallow Character field, enter one or more characters that are not allowed in the password.

  • Select one or more attributes for your property.

  • Click Save.

  • Chain multiple transformations into pipelines for complex workflows.
  • Be tailored per integration or scenario using custom configurations.

  • New Custom Transformer Function
    window, enter a name and description of the transformer.
    Note:
    The
    name
    of the transformer must start with the dollar sign symbol, $, with snake case and no spaces. For example, $CLEAN_TEXT.
  • Click the Function Express field to display a dropdown menu of operator functions.

  • Click Save.

  • Set a number of actions for a policy to prevent unexpected issues

  • Select an Additional Attribute from the dropdown menu. Note: The Only enrich identity if existing in Primary Identity Source option:

    • Enabled: Only enriches existing identities from the Primary Identity Source. Does not create new identities.

    • Disabled: Creates new LCM identities for users found in the Additional Identity Source but not in the Primary Identity Source.

  • (Optional) Enable Skip Workflow Runs on Extraction to update identity attributes from this source without triggering workflows. This is useful when you want to enrich identities with supplementary data (such as manager information from a departmental system) but don't need provisioning or deprovisioning actions to run each time this source is extracted.

  • Create Identity

  • Sync Identity

  • Add Relationship

  • Remove Relationship

  • Create Email

  • Change Password

  • Delete Identity

  • Disable Identity

  • Manage Relationships

  • Write Back Email

  • Access Request Complete

  • Custom Action

  • Action Failed

  • Workflow Task Failed

  • Extraction Event Failed

  • Create Entitlement

  • Create Guest Account

  • Rename Entitlement

  • Create Access Review

  • Reset Password

  • Create Access Review Queued

  • Safety Limit Reached

  • Sync Entitlement

  • Choose the status to trigger notifications (when an event is Successful, or On Failure).

  • Select an Existing Veza Action. A Veza Action is an integration with functionality for sending data to external systems, enabling downstream processes around Veza alerts, and access to reviewer actions. Use a Veza Action to configure generic webhooks or enable email notifications.

    See Veza Actions on how to create and deploy a Veza Action.

  • To customize the Webhook setting, perform the following:

    • In the Webhook URL field, enter the endpoint configured to receive the webhook payload.

    • In the Webhook Auth Header field, enter the authorization header if the webhook endpoint requires authentication (e.g., Bearer token123 or API-Key abc456).

  • To customize the Email setting, perform the following:

    • In the Recipients field, add a recipient name. Use a comma when adding additional names.

    • In the Recipients From User’s Attributes field, use the arrows to display a list of user attributes. Select one or more attributes that contain email addresses for the email notification.

  • Click Save.

  • Trigger Conditions Reference
    Trigger Conditions Reference
    support.veza.comarrow-up-right
    Veza Supportarrow-up-right
    Veza Supportarrow-up-right
    Trigger Conditions Reference
    Attribute Mapping
    Transformer Reference
    Lookup Table Transformers
    Notifications Templates
    Lifecycle Management joiner workflow showing user creation, attribute sync, and account provisioning steps
    Lifecycle Management leaver workflow showing user deactivation, account disabling, and access removal steps
    <html><body>
    Hello,<br>
    <br>
    Here is the information for your new-hire: {{ENTITY_NAME}} <br>
    <br>
    Account Type: {{ENTITY_TYPE}} <br>
    Login Name: {{LOGIN_NAME}} <br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    New {{ENTITY_TYPE}} Guest Account Created <br>
    <br>
    Account Type: {{ENTITY_TYPE}} <br>
    Name: {{ENTITY_NAME}} <br>
    Login Name: {{LOGIN_NAME}} <br>
    Invite Sent: {{SENT_INVITE}} <br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    {{ENTITY_NAME}} attributes have been synced <br>
    <br>
    Account Type: {{ENTITY_TYPE}} <br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    {{ENTITY_NAME}} has been deleted <br>
    <br>
    Account Type: {{ENTITY_TYPE}} <br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    {{ENTITY_NAME}} has been disabled <br>
    <br>
    Account Type: {{ENTITY_TYPE}} <br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    {{ENTITY_NAME}} has a new relationship to {{RELATIONSHIP_ENTITY_NAME}} <br>
    <br>
    Account Type: {{ENTITY_TYPE}} <br>
    Relationship Type: {{RELATIONSHIP_ENTITY_TYPE}} <br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    {{ENTITY_NAME}} has a relationship removed from {{RELATIONSHIP_ENTITY_NAME}} <br>
    <br>
    Account Type: {{ENTITY_TYPE}} <br>
    Relationship Type: {{RELATIONSHIP_ENTITY_TYPE}} <br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    {{ENTITY_NAME}} has a new email address <br>
    <br>
    Account Type: {{ENTITY_TYPE}} <br>
    Email: {{EMAIL}} <br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    {{ENTITY_NAME}} has the newly created email synced back to it <br>
    <br>
    Account Type: {{ENTITY_TYPE}} <br>
    Email: {{EMAIL}} <br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    {{ENTITY_NAME}} has a password <br>
    <br>
    Account Type: {{ENTITY_TYPE}} <br>
    Login Name: {{LOGIN_NAME}} <br>
    New Password: {{LOGIN_PASSWORD}} <br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    {{ENTITY_NAME}} has had their password reset <br>
    <br>
    Account Type: {{ENTITY_TYPE}} <br>
    Login Name: {{LOGIN_NAME}} <br>
    Temporary Password: {{LOGIN_PASSWORD}} <br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    An entry of {{ENTITY_TYPE}} is created: {{ENTITY_NAME}} <br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    An entry of {{ENTITY_TYPE}} is renamed with new name: {{ENTITY_NAME}} <br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    An entry of {{ENTITY_TYPE}} has been re-synced with the target system: {{ENTITY_NAME}} <br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    {{ACCESS_REQUEST_ENTITY_NAME}} has been {{ACCESS_REQUEST_TYPE}} with: {{ACCESS_REQUEST_TARGET_NAME}}.<br>
    <br>
    User Type: {{ACCESS_REQUEST_ENTITY_TYPE}} <br>
    Target Type: {{ACCESS_REQUEST_TARGET_TYPE}} <br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    The request is currently in {{ACCESS_REQUEST_STATE}} state.
    <br>
    For details: {{ACCESS_REQUEST_URL}}
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    The request is failed, with an error message: {{EVENT_ERROR_MESSAGE}}
    <br>
    For details: {{ACCESS_REQUEST_URL}}
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    The request is currently in {{ACCESS_REQUEST_STATE}} state.
    <br>
    For details: {{ACCESS_REQUEST_URL}}
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    The request currently in {{ACCESS_REQUEST_STATE}} state has new been assigned new approvers.
    <br>
    For details: {{ACCESS_REQUEST_URL}}
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    Action has failed.<br>
    <br>
    Identity: {{IDENTITY_NAME}}<br>
    Action Name: {{ACTION_NAME}}<br>
    Action Type: {{ACTION_TYPE}}<br>
    Workflow Name: {{WORKFLOW_NAME}}<br>
    Error Message: {{EVENT_ERROR_MESSAGE}}<br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    Workflow has failed.<br>
    <br>
    Identity: {{IDENTITY_NAME}}<br>
    Workflow Name: {{WORKFLOW_NAME}}<br>
    Error Message: {{EVENT_ERROR_MESSAGE}}<br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    Extraction processing has failed.<br>
    <br>
    Datasource: {{DATASOURCE_ID}}<br>
    Error Message: {{EVENT_ERROR_MESSAGE}}<br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    An access review has been queued for {{IDENTITY_NAME}} <br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    An access review has been created for {{IDENTITY_NAME}} <br>
    <br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    The hard safety limit for policy {{POLICY_NAME}} has been reached. No further identity changes were processed.<br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    The predictive safety limit for policy {{POLICY_NAME}} has been exceeded. The predicted number of workflow runs exceeds the configured threshold. All changes have been blocked before processing. Review the blocked tasks and take action to proceed.<br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    A workflow-level predictive safety limit in policy {{POLICY_NAME}} has been exceeded. The predicted number of workflow runs for the workflow exceeds its configured threshold. Review the blocked tasks and take action to proceed.<br>
    </body></html>
    <html><body>
    Hello,<br>
    <br>
    {{ENTITY_NAME}} has performed a custom action <br>
    <br>
    Account Type: {{ENTITY_TYPE}} <br>
    Message: {{EVENT_ERROR_MESSAGE}} <br>
    <br>
    </body></html>
    location_code,state_code,state,city
    MN001,MN,Minnesota,Minneapolis
    CA001,CA,California,Los Angeles
    TX001,TX,Texas,Houston
    TX002,TX,Texas,Austin

    Identities

    Managing identities and identity override attributes in Veza Lifecycle Management

    Identities are the core entities in Lifecycle Management. They represent the people in your organization, sourced from HR systems, identity providers, ITSM platforms, payroll systems, custom OAA applications, or flat files. See Integrations for the full list of supported identity sources.

    hashtag
    In this section

    Topic
    Description

    hashtag
    Key concepts

    • Source of Identity: The authoritative system (such as Workday or Okta) that provides identity data

    • Identity Attributes: Properties like first name, last name, email, department, and manager

    • Override Attributes: Custom attributes that can supplement or override source-provided values

    hashtag
    Related topics

    • - How source attributes map to Veza

    • - Computed attributes for advanced logic

    Attribute Synchronization

    Configure how user attributes from a source of identity are synchronized for target user accounts

    Attribute synchronization ensures that identity attributes in target systems remain up to date with the corresponding attributes in the source of truth. Veza Lifecycle Management provides configuration at two levels to control how and when attributes are synchronized.

    hashtag
    Action Level

    At the action level, there are two distinct options to govern provisioning and user update processes:

    • Create new users - When enabled, the action will create new user accounts that don't exist in the target system

    • Update active users - When enabled, the action can update existing user accounts with attribute changes from the source of truth

    hashtag
    Attribute Level

    At the attribute level, there are two explicit choices that define how and when attribute values are applied to user accounts:

    • Set for new users only - The attribute value is set only when creating new user accounts

    • Set for new and existing users - The attribute value is set for new accounts and updated for existing accounts when changes are detected

      circle-exclamation

      You may not want to enable "Set for new and existing users" for attributes like user principal name, which may change due to marital status or legal name corrections but shouldn't be automatically updated in all systems.

    Both levels must be properly configured for an attribute to be continuously synchronized. For example, to keep an employee's department updated:

    1. Enable Update active users on the Sync Identity action

    2. Select Set for new and existing users for the department attribute

    hashtag
    Recommended Settings

    Set for new and existing users (continuously sync attributes that change during employment):

    • First Name, Surname

    • Department

    • Title

    • Manager

    Set for new users only (preserve stable identifiers):

    • Active Directory sAMAccountName

    • Email Addresses (for Email Write-Back action)

    This configuration ensures that dynamic attributes remain up to date while preserving stable identifiers.

    Disable Workflows and Actions

    Temporarily pause specific workflows or actions in a policy without removing configuration

    hashtag
    Overview

    This guide explains how to disable individual workflows or actions within a Lifecycle Management policy. Disabling allows you to temporarily pause specific parts of a policy without deleting or modifying the underlying configuration.

    Use this option when developing workflows to support:

    Getting Started

    Introduction to Lifecycle Management implementation, dashboard, and activity monitoring in Veza

    Start here to understand Lifecycle Management fundamentals, monitor your LCM environment, and track workflow execution.

    hashtag
    In this section

    Topic
    Description

    Cost Center

  • AD Distinguished Name (DN)

  • AD User Principal Name (UPN)

  • AD Email

  • Managing gradual rollouts: Enable actions one at a time to verify each step before activating the next
  • Troubleshooting issues: Isolate problematic actions without removing configuration

  • Implementing seasonal policies: Temporarily disable workflows that only apply during certain periods

  • Workflow Testing: Disable production actions while testing new workflow logic

  • hashtag
    Disable a workflow

    Disabling a workflow prevents it from running during policy execution. All conditions and actions within the workflow are also skipped.

    1. Go to Lifecycle Management > Policies.

    2. Select a policy and click Edit Workflow.

    3. Toggle the workflow's Enabled control to disabled.

    4. Click Save.

    The policy editor displays disabled workflows and actions with a "Disabled" tag.

    hashtag
    Disable an action

    You can also disable specific actions within a workflow without disabling the entire workflow. When you disable an action, any nested conditions and actions under the disabled action are also skipped, but other actions in the workflow continue to run normally.

    1. Open the workflow editor.

    2. Select the action you want to disable.

    3. Toggle the Enabled control in the action settings.

    4. Click Save.

    hashtag
    Test disabled workflows with dry run

    Disabled workflows are evaluated by default during dry run simulations. This allows you to preview what would happen if you re-enabled a disabled workflow and validate trigger conditions and action configurations before making them active.

    When you run a dry run simulation, the results show what actions would run if the workflow were enabled.

    hashtag
    Re-enable a workflow or action

    To re-enable a disabled workflow or action, toggle the Enabled control back to enabled and save.

    hashtag
    See also

    • Lifecycle Management policies

    • Conditions and actions

    • Dry run testing

    Managing Identities

    View, search, and manage identities from configured sources

    Identity Override Attributes

    Customize identity attributes to override values from the source of identity

    Attribute Mapping
    System Attributes

    Architecture overview and foundational concepts for deploying Lifecycle Management

    Monitor policy status, workflow execution, and identity health at a glance

    Track and audit all LCM actions, errors, and events

    hashtag
    Where to go next

    After reviewing the getting started materials:

    1. Configure Integrations: Enable your identity sources and target applications for LCM. See Integrations.

    2. Set Up Identities: View and manage identities from your configured sources. See Identities.

    3. Create Access Profiles: Define birthright entitlements for user segments. See Access Profiles.

    4. Build Policies: Automate JML workflows with conditions and actions. See .

    For an end-to-end walkthrough using Workday, Okta, and Active Directory, see How-to: Workday, Okta, and Active Directory.

    Manage Access Profile Creation Permissions

    How to delegate Access Profile creation to specific Operators and Groups.

    hashtag
    Overview

    By default, only Administrators can create Access Profiles in Lifecycle Management. With Access Controls enabled, Administrators can grant Creator permissions to specific Operators and Groups, allowing them to create new profiles. Users who create a profile automatically become its Owner and can edit that profile, but cannot modify profiles created by others. Administrators always retain full access to all profiles.

    Users must have the Operator role to use Creator permissions — non-Operator roles (Access Reviewer, Watcher, etc.) cannot create Access Profiles even with explicit permission grants.

    Policies
    Implementation and Core Concepts
    Lifecycle Management Dashboard
    Activity Log
    circle-info

    Early Access Feature: This feature requires enablement by Veza support. Contact your Veza support team to enable Access Controls for your tenant.

    hashtag
    Before you start

    • You have the Administrator role on the root team

    • Access Controls are enabled on your tenant (contact Veza support)

    • The users receiving permissions have the Operator role assigned

    hashtag
    Grant Access Profile creation permissions

    To assign Access Profile creation permissions to users or groups:

    1. Navigate to Lifecycle Management in the navigation sidebar.

    2. Click Settings in the Lifecycle Management sidebar.

    3. On the Settings page, locate the Access Profile Types section.

    4. Click Manage Access Profile Creation Permissions.

      The Manage Permissions modal opens, showing currently assigned users and groups.

    5. Select the Type of principal to add:

      • User: Assign permissions to individual Veza users

      • Group: Assign permissions to a Veza Group (all members receive permissions)

    6. Select the user or group from the dropdown menu.

      The dropdown shows only users or groups that don't already have permissions assigned. The permission is assigned automatically when you make a selection.

    7. Repeat steps 5-6 to assign permissions to additional users or groups.

    8. When finished, click outside the modal or press ESC to close.

    Result: Users and groups with Creator permissions can now create new Access Profiles from the Lifecycle Management > Access Profiles page.

    hashtag
    Verify permissions

    To confirm that permissions were assigned correctly:

    1. In the Manage Permissions modal, review the list of assigned users and groups.

      Each row shows:

      • Principal name (user or group)

      • Principal type (User or Group)

      • Permission set name ("creator")

    2. Assigned users should now see the Create Access Profile button on the Access Profiles page.

    3. Users without permissions will not see the Create Access Profile button.

    hashtag
    Remove Access Profile creation permissions

    To revoke Access Profile creation permissions:

    1. Navigate to Lifecycle Management > Settings.

    2. Click Manage Access Profile Creation Permissions.

    3. In the permissions table, locate the user or group to remove.

    4. Click the delete (trash can) icon next to the user or group.

    5. Confirm the deletion when prompted.

    Result: The user or group can no longer create new Access Profiles. They retain read-only access to view existing profiles.

    circle-exclamation

    Important: Removing a user's Creator permissions prevents them from creating new Access Profiles. However, they retain Owner permissions on profiles they previously created, allowing them to continue editing those specific profiles.

    To fully revoke a user's access to Access Profiles, you must remove both:

    1. Their Creator permission (prevents creating new profiles)

    2. Their individual Owner permissions on specific profiles (revokes editing rights for those profiles)

    Only Administrators can manage these permission assignments.

    hashtag
    See also

    • Permission Sets for Configurations and Integrations - Overview of the permission sets system

    • Access Profiles - Understanding Access Profiles and their role in Lifecycle Management

    • User Roles and Permissions - Veza role definitions and capabilities

    • - Creating and managing user groups for permission assignment

    Lifecycle Management

    Introduction to Lifecycle Management with Veza

    Veza's Lifecycle Management (LCM) solution empowers organizations to automate and streamline the management of user identities and access rights throughout the employee lifecycle. From onboarding to role changes and offboarding, automated LCM workflows ensure that the right people have the correct access at the right time.

    hashtag
    Key features

    • Automated Provisioning and De-provisioning: Streamline granting and revoking entitlements as employees join, move within, or leave the organization

    • Environment-wide Synchronization: Keep user attributes and access rights consistent across applications and platforms

    • Customizable Workflows: Design tailored processes for different lifecycle events and user segments

    • Compliance and Audit Support: Maintain detailed records of access changes to support compliance and audit efforts

    • Integration with Identity Providers: Integrate with identity providers and HR systems, import HR data from CSV, or use a custom OAA template

    hashtag
    In this section

    Topic
    Description

    Reference documentation:

    • - Conceptual guide to the different evaluation systems

    • - SCIM filter syntax for workflow conditions

    • - Complete list of transformation functions

    hashtag
    Core concepts

    hashtag
    Policies

    Policies define the rules and actions for managing identities throughout their lifecycle. They specify what actions should occur when there are changes in a source of identity, such as when a user is created or their attributes change.

    After configuring a policy for a source of identity in your organization, Veza Lifecycle Management tracks the source for changes. When employee records are added or changed, actions will trigger based on the workflows and actions specified in the policy. Learn more about .

    hashtag
    Workflows

    Workflows are sequences of actions within a policy that execute based on specific conditions. They enable automation of lifecycle management processes such as onboarding, role changes, and offboarding.

    Workflows only execute actions on users that meet specific conditions, and Policies can contain more than one Workflow. This enables you to create a single policy for your source of identity that contains multiple workflows, with one applying to new hires, another applying to terminated employees, and so on for the different JML scenarios you want to automate. Learn more about .

    hashtag
    Access Profiles

    Access Profiles define sets of entitlements (such as group memberships or role assignments within a target application) that should be granted to users based on their role within the organization (or another distinguishing attribute). You can use Access Profiles to define both Business Roles – segments of employees, and Profiles – collections of entitlements in a target application.

    Assigning Business Roles to the Profiles they should inherit enables you to define the birthright entitlements for different types of employees in your organization. You can then assign those Business Roles when configuring workflows that add or remove access to an application. Learn more about .

    hashtag
    Actions

    Lifecycle Management Actions are tasks performed within a workflow, such as creating a user account, assigning group memberships, or disabling an account. Actions can be combined to trigger in sequence when there are changes in the source of identity. Actions can run for any identity that meets the workflow conditions, or only apply when action-level conditions are met. Learn more about available .

    hashtag
    Attribute transformers

    Transformers allow you to modify and format user attributes when synchronizing data between systems, ensuring consistency and compatibility when creating users across applications.

    Lifecycle Management will provision new users with these attributes and can keep their accounts up-to-date when there are changes in the source of identity. Target entity attributes can be set to specific values or use metadata from the source of identity, and support a range of transformation functions. Learn about .

    hashtag
    Conditions and transformers

    Lifecycle Management uses several systems that evaluate identity attributes, each serving a distinct purpose:

    • Workflow Conditions: SCIM filter expressions that determine whether workflows and actions execute (e.g., is_active eq true). Output is boolean.

    • Attribute Transformers: Formatter expressions that determine what value an attribute should have (e.g., {first_name | UPPER}). Output is a string.

    These systems can work together. For example, workflow conditions can embed transformer syntax for dynamic date comparisons. For a guide to when and how to use each, see .

    hashtag
    Notifications

    Customize email notifications sent during Lifecycle Management events and Access Request workflows. You can personalize messaging, add branding, and include event-specific information through placeholders. Learn more about .

    hashtag
    Getting started

    1. Enable Integrations: Configure your data sources and enable them for Lifecycle Management.

    2. Define Access Profiles: Create profiles that map your organizational structure to application-specific entitlements.

    3. Create Policies: Add policies to automate identity management processes.

    For an overview of Lifecycle Management configuration using Okta, Workday, and Active Directory, see .

    For API documentation, see .

    Fallback Formatters

    Configure fallback formatters for uniquely identifying attributes during identity synchronization

    hashtag
    Overview

    Fallback formatters can help resolve conflicts when provisioning identities with unique attributes. This is particularly useful when automated provisioning requires unique identifiers, but the standard generated values are already in use.

    circle-info

    Terminology: A formatter is the template string within an attribute transformer that defines how to construct a value. A fallback formatter is an alternative template used when the primary formatter produces a value that conflicts with an existing record. See for more on these terms.

    hashtag
    Understanding Fallback Formatters

    When provisioning new identities through Lifecycle Management, unique attributes like usernames, login IDs, or email addresses must not conflict with existing values. Fallback formatters provide an automated way to generate alternative values when conflicts arise, ensuring provisioning can proceed without manual intervention.

    You can configure fallback formatters when configuring a to ensure new users can be onboarded efficiently, regardless of naming conflicts.

    hashtag
    Use Case: Username Conflicts

    The most common use case for fallback formatters is handling username conflicts. For example:

    Your organization uses a standard username format of first initial + last name (e.g., jsmith for John Smith).

    When multiple employees have similar names, this can lead to conflicts:

    • John Smith already has jsmith

    • Jane Smith already has jsmith1

    • James Smith already has jsmith2

    When Jennifer Smith joins, the fallback formatter automatically assigns jsmith3, maintaining your naming convention while ensuring uniqueness.

    hashtag
    Configuring Fallback Formatters

    Fallback formatters can be configured as part of the "Sync Identities" action within a Lifecycle Management workflow:

    1. Edit or create a Lifecycle Management policy

    2. Edit the workflow containing the Sync Identities action

    3. In the Sync Identities action configuration, click Add Fallback

    4. Configure the

    hashtag
    Transformer Options for Fallback Formatters

    Several transformers can be used for implementing fallback formatters depending on your specific use case.

    hashtag
    Using the NEXT_NUMBER Transformer

    A typical approach is to use the NEXT_NUMBER transformer, which is specifically designed to generate sequential numerical alternatives when naming conflicts occur.

    The NEXT_NUMBER transformer:

    • Generates a set of sequential integers as strings

    • Takes two parameters: BeginInteger (starting number) and Length (how many numbers to generate)

    • Is unique among transformers in that it returns multiple values, making it ideal for fallback scenarios

    hashtag
    Other Useful Transformers for Fallbacks

    In addition to NEXT_NUMBER, other transformers can be valuable for creating fallback formatters:

    Using Random Alphanumeric for Unique Usernames:

    This could generate usernames like jsmith8f3d instead of sequential jsmith1, jsmith2, etc.

    Using UUID for Guaranteed Uniqueness:

    This would append the first 8 characters of a UUID, creating identifiers like jsmith-a7f3e9c2.

    hashtag
    Implementation Example

    When configuring a fallback formatter with the NEXT_NUMBER transformer:

    1. Select the attribute that requires uniqueness (e.g., username, email)

    2. Configure the primary pattern (e.g., {first_initial}{last_name})

    3. Add a fallback using the NEXT_NUMBER transformer to generate sequential alternatives:

    This will generate up to 10 alternatives: jsmith1, jsmith2, ... jsmith10

    hashtag
    Common Fallback Patterns

    Here are some commonly used fallback patterns:

    Primary Format
    Fallback Pattern
    Examples

    hashtag
    How Fallback Resolution Works

    When Lifecycle Management attempts to provision a new identity with a unique attribute value that already exists:

    1. The system first tries the primary format (e.g., jsmith)

    2. If a conflict is detected, it automatically tries the first alternative using the NEXT_NUMBER transformer (e.g., jsmith1)

    3. If that value also exists, it tries the next alternative (e.g., jsmith2

    This automated conflict resolution ensures provisioning can proceed without manual intervention, even when your standard naming conventions result in conflicts.

    Veza Groups
    to use as a fallback pattern for the unique attribute that might experience conflicts
  • Close the action sidebar and save your changes to the policy.

  • {username}{NEXT_NUMBER(1, 10)}@domain.com

    [email protected], [email protected]

    {first_name}{last_initial}

    {first_name}{last_initial}{NEXT_NUMBER(1, 10)}

    johns, johns1, johns2

    )
  • This process continues until either:

    • A unique value is found

    • All alternatives from the NEXT_NUMBER range are exhausted (in which case an error would be reported)

  • {first_initial}{last_name}

    {first_initial}{last_name}{NEXT_NUMBER(1, 10)}

    jsmith, jsmith1, jsmith2, etc.

    {first_name}.{last_name}

    {first_name}.{last_name}{NEXT_NUMBER(1, 10)}

    john.smith, john.smith1, john.smith2

    Transformers
    Sync Identities Action

    {username}@domain.com

    Transformer
    {first_initial}{last_name}{RANDOM_ALPHANUMERIC_GENERATOR(4)}
    {first_initial}{last_name}-{UUID_GENERATOR() | SUB_STRING,0,8}
    {first_initial}{last_name}{NEXT_NUMBER(1, 10)}

    Define workflow triggers and provisioning actions

    Manage birthright entitlements and business roles

    Format and transform identity attributes

    Configure email templates and webhooks

    Trigger compliance reviews from LCM workflows

    Supported identity sources and targets

    Common questions and troubleshooting

    Dynamic Access Profiles - Formatter-based profile assignment
  • Attribute Mapping - How source attributes map to Veza

  • System Attributes - Computed attributes for advanced logic

  • Dynamic Access Profiles: Formatter expressions that resolve to Access Profile names at runtime (e.g., dept-{department | LOWER}).

    Configure Workflows: Design workflows within policies to handle specific lifecycle events. Configuring Workflows

    Dashboard

    Monitor LCM activity and policy status

    Identities

    View and manage identities from your sources

    Policies

    Create and configure automation policies

    Understanding Conditions and Transformers
    Trigger Conditions Reference
    Transformer Reference
    Policies
    Workflows
    Access Profiles
    Actions
    Transformers
    Understanding Conditions and Transformers
    Notification Templates
    Lifecycle Management Integrations
    Creating Access Profiles
    Building Lifecycle Management Policies
    Workday, Okta, and Active Directory
    Lifecycle Management APIs

    Access Profile Types

    Understanding and configuring different types of Access Profiles for Lifecycle Management and Access Requests

    hashtag
    Overview

    Access Profile Types determine the behavior of Access Profiles for Veza Lifecycle Management and Veza Access Requests. They define common characteristics such as:

    • Whether the profile can inherit entitlements from other profiles

    • If the profile can grant entitlements in one or more target applications

    • The maximum number of entitlements the profile can grant

    • The specific integrations where entitlements can be granted

    Veza provides built-in profile types, such as Profiles and Business Roles, for hierarchical management of birthright entitlements by employee population. You can also create new profile types to meet your organization's Access Requests and Lifecycle Management needs.

    hashtag
    Common Access Profile Type Categories

    Access Profiles define collections of entitlements within one or more target applications that can be assigned to an identity. Depending on the profile type, an access profile can include certain groups or roles, or inherit entitlements from another profile.

    For example, you can create different types to organize profiles by:

    • Applications: Granting access to an application without specific entitlements, such as access to Zoom, a video conference platform

    • Single Entitlements: Defining a single entitlement within a single application, such as a user being added to the DNS Admin group in Active Directory or the Domain Name Administrator role in Entra ID

    • Application Entitlements: Defining multiple entitlements within a single application, such as access to several Okta Groups

    hashtag
    Managing Access Profile Types

    Use Access Profile Types to set rules for all profiles using that type. You can create new profile types to implement Lifecycle Management and Access Requests based on the access you grant to employees and the conditions under which it is granted.

    hashtag
    Creating a New Profile Type

    1. Open Lifecycle Management > Settings.

    2. In the Profile Types section, click New Profile Type.

    3. In the sidebar, configure the new type:

    After saving a profile type, you can edit or delete it on the Lifecycle Management Settings > Profile Types tab.

    • To manage the users or groups allowed to create profiles of that type, click Actions > Manage Permissions.

    • To view profiles with a specific type, choose a profile type and click Show Access Profiles.

    hashtag
    Managing Profile Type Permissions

    The Manage Permissions option controls who is eligible to be designated as owners of Access Profiles of a specific type. When you assign the Creator permission set to a user or group for a profile type:

    • They become eligible to be designated as owners of Access Profiles of that specific type

    • Once they become an owner of any profile, they automatically receive global Creator permission to create Access Profiles of any type

    • If a group receives Creator permissions, all group members inherit these capabilities (see for details on group management)

    circle-info

    Permission Scoping: The Creator permission at the Profile Type level controls ownership eligibility, not the ability to create profiles. The ability to create Access Profiles is controlled by a global table-level permission that is automatically granted when a user or group becomes the owner of an Access Profile.

    This permission configuration is required to assign Access Profile ownership. See for details on designating owners for individual profiles.

    hashtag
    Best Practices for Access Profile Types

    When working with Access Profile Types, consider the following best practices:

    • Consistent Naming: Use clear, descriptive names for profile types that indicate their purpose and scope

    • Appropriate Granularity: Create profile types with the right level of granularity for your organization's needs

    • Documentation: Add thorough descriptions and instructions to help others understand when to use each profile type

    Dynamic Approvers

    Automatically determine who should approve an access request based on runtime context, access profile metadata, and lookup tables.

    Dynamic Approvers is an Access Requests feature that lets Veza automatically determine who should approve an access request based on runtime context, access profile metadata, and external data.

    Instead of assigning static approvers in a policy, you will configure a transformer pipeline that processes request attributes, access profile properties, and lookup tables to compute approver email addresses when the request is submitted.

    Use Dynamic Approvers when approval routing will depend on metadata that can vary per request. For example, this can enable workflows in which Access Profiles assigned a specific cost center are routed to the appropriate approver group, or to assign managers based on department code.

    hashtag
    How it works

    When an access request is submitted, Veza evaluates any policy steps configured with a Dynamic Approver:

    1. Veza considers the name of the Access Profile or Catalog Definition being requested, and any custom properties set on that profile.

    2. Each transformer step in the Dynamic Approver pipeline runs in sequence, processing the available attributes to produce an intermediate or final output.

    3. The final transformer step must output one or more approver email addresses.

    hashtag
    Available attributes

    The following attributes are available as inputs to transformer expressions:

    Attribute
    Type
    Description

    Custom property attributes (access_profile_properties.* and catalog_definition_properties.*) are populated from the custom attribute definitions configured in . The attribute names available in the transformer editor reflect the definitions currently configured in your tenant.

    hashtag
    Transformer expressions

    Transformer expressions use the same syntax as Lifecycle Management : {attribute} for a direct reference, or {attribute | FUNCTION, arguments} to apply a function.

    The most common function for Dynamic Approvers is LOOKUP, which resolves a value by looking it up in a . Lookup tables are CSV-based reference tables that map values between systems — for example, mapping department codes to approver email addresses. They are uploaded and managed within Lifecycle Management policy configurations.

    The LOOKUP syntax is: {value | LOOKUP, "table_name", "match_column", "return_column"}

    For example:

    This takes the department custom property value from the Access Profile, looks it up in the dept_approvers lookup table by matching the dept_code column, and returns the corresponding approver_email value. See for details on creating and managing lookup tables.

    You can chain multiple transformer steps. Use {last_output} in a subsequent step to reference the output of the previous step.

    hashtag
    Creating a Dynamic Approver

    1. Go to Lifecycle Management > Settings.

    2. Select the Access Request Settings tab.

    3. Scroll to the Dynamic Approvers section and click Create Approver.

    circle-info

    The final transformer step determines the approver emails. Intermediate steps can use String List output to return multiple values, which are then accessible via {last_output} in the next step.

    hashtag
    Example: Two-step pipeline

    This example resolves a department code to approver usernames via a lookup table, then appends a domain to produce email addresses.

    Step 1 — Look up approver usernames from department code

    Output Type: String List

    Step 2 — Convert usernames to email addresses

    Output Type: String

    hashtag
    Testing a Dynamic Approver

    Before linking a Dynamic Approver to a policy, use the built-in test configuration to verify it resolves to the expected approver emails.

    1. In the Create or Edit Dynamic Approver dialog, scroll to Test Configuration.

    2. Under Test Source, select Access Profile or Catalog Definition, then choose a specific record to test with.

    3. Optionally, add Policy Properties — key-value pairs that simulate additional request context during testing.

    If the test returns no results or an unexpected value, check that the referenced lookup table is populated, the custom property values are set on the selected profile, and the attribute names match your definitions.

    hashtag
    Using a Dynamic Approver in a policy

    Once a Dynamic Approver is configured, link it to an approval step in an Access Request Policy:

    1. Go to Lifecycle Management > Settings > Access Request Policies.

    2. Create or edit a policy.

    3. Under Approver Settings, add or edit an approval step.

    When an access request matches this policy, Veza runs the selected Dynamic Approver pipeline at request time to determine the approver(s) for that step.

    hashtag
    See Also

    Lifecycle Management Dashboard

    Managing and monitoring Lifecycle Management from a central dashboard

    The Lifecycle Management Dashboard provides a centralized interface for monitoring automatic provisioning and deprovisioning of user access - both birthright access granted by Veza Lifecycle Management and just-in-time access granted by Veza Access Reviews. This dashboard gives you an at-a-glance view of your configuration, status, and recent activity.

    The dashboard is the primary landing page for Lifecycle Management and Access Requests and can help with routine monitoring, error resolution, policy validation, activity review, and integration health checks.

    hashtag
    Dashboard Overview

    The dashboard is organized into several key sections:

    • Policies: Displays your most recently updated Lifecycle Management and their status

    • Access Profiles: Shows configured and usage metrics

    • Identities: Provides a visualization of managed identities

    To navigate to more detailed information, click on any section heading to open the related overview. Click on specific items (such as a policy or integration) to view or edit configuration details.

    hashtag
    Dashboard Actions

    From the dashboard, you can perform common tasks including:

    • Create a new policy: Click the "Create Policy" button in the Policies section

    • Configure Access Profiles: Click the "Create Access Profile" button in the Access Profiles section

    • Set up a new integration: Click the "Set up Integration" button in the Integrations section

    hashtag
    Policies

    The Policies section displays all configured Lifecycle Management policies with their current status. Each policy shows its name, associated identity source, number of identities managed, and current status (Running/Stopped).

    You can view all policies at a glance, create new ones with the "Create Policy" button, see which policies are actively running, access detailed configuration by clicking on a specific policy, and verify that policies in "Running" status should be active. Learn more about .

    hashtag
    Access Profiles

    The Access Profiles section shows the total number of configured access profiles and provides a visual representation of profile activity. Access profiles define sets of entitlements granted to users based on their roles.

    You can see the total number of configured profiles, create new ones using the "Create Access Profile" button, view profile activity and utilization, and access detailed configuration by clicking into the section. Learn more about .

    hashtag
    Identities

    The Identities section provides a visual representation of all identities managed through Lifecycle Management and Access Requests. The chart displays the distribution of identities by type or status, giving you an immediate understanding of your identity landscape.

    This visualization helps you understand the overall composition of your managed identities, identify distribution patterns across different categories, and track changes in identity distribution over time.

    hashtag
    Integrations

    The Integrations section lists all systems connected to Lifecycle Management and Access Requests, displaying the total number of integrations, error status and counts, recently created integrations, and last update timestamps. For each integration, you can see its name and type, current status (including error indicators), and last update timestamp. You can set up new integrations using the "Set up Integration" button, identify and troubleshoot integration errors, and view all integrations by clicking "View all." Review this section regularly to identify any integrations with error states. See for more information.

    hashtag
    Access Requests

    The Access Requests section tracks pending access requests, recently completed requests, and request status (Pending, Completed, Rejected, Cancelled). This section provides visibility into the access request process, allowing you to monitor request volume and status, track completion rates, and identify potential bottlenecks in the access request workflow.

    hashtag
    Errors

    The Errors section displays any Lifecycle Management and Access Requests errors that require attention. When functioning normally with no issues, this section will display "No issues found." If errors occur, this section will list the specific errors, provide context about when and where they occurred, and offer guidance on troubleshooting and resolution. Check this section regularly for any reported issues.

    hashtag
    Recent Activity

    The Recent Activity section shows a chronological log of Lifecycle Management and Access Requests events, including event type, timestamp, affected identity, and entity name. Examine this section to identify any unusual patterns or failed operations. This activity log helps you track recent actions, verify that expected changes have occurred, identify patterns or issues in lifecycle events, and monitor the overall health of your Lifecycle Management or Access Requests implementation.

    hashtag
    Next Steps

    After familiarizing yourself with the dashboard:

    System Attributes

    Computed properties for advanced workflow triggering and conditional transformations in Lifecycle Management

    hashtag
    Overview

    System attributes are computed properties that Lifecycle Management automatically generates during identity processing. These attributes enable advanced automation scenarios by providing runtime information about identity changes and transformation results.

    System attributes use two prefix conventions: sys_attr__ for computed boolean flags evaluated each extraction cycle (such as sys_attr__is_mover) and sys_attr_changed__

    Integrations: Top Integrations enabled for Lifecycle Management and Access Requests along with any error statuses
  • Access Requests: Tracks pending and completed access requests

  • Errors: Displays recent Lifecycle Management and Access Requests errors requiring attention (past day, week, or month)

  • Recent Activity: Shows the most recent Lifecycle Management and Access Requests Events

  • Monitor system health: Review the Errors section for any issues
  • Track recent changes: Review the Recent Activity section for a log of recent events

  • Filter activity by time period: Use the time period dropdown (e.g., "Past day") to adjust the view

  • Policies
    Access Profiles
    creating and managing policies
    Configuring Access Profiles
    Lifecycle Management integrations
    Learn about creating Lifecycle Management policies
    Configure access profiles for your organization
    Set up integrations with identity sources
    Understand available Lifecycle Management actions
    Conditions and Actions
    Access Profiles
    Attribute Transformers
    Notifications
    Access Reviews
    Integrations
    FAQ
    Veza assigns those email addresses as approvers for that policy step.

    String

    Output from the previous transformer step

    access_profile_properties.<name>

    String

    Custom property value set on the Access Profile

    catalog_definition_properties.<name>

    String

    Custom property value set on the Catalog Definition

    Enter a Name and optional Description.
  • Under Transformer Steps, click Add Transformer Step to add one or more steps:

    • Enter a formatter expression using the available attributes.

    • Set the Output Type:

      • String — the step produces a single value (e.g., one email address or an intermediate string).

      • String List — the step produces a comma-separated list of values (e.g., multiple email addresses from a LOOKUP that returns multiple rows).

  • Click Create to save.

  • Click Test Configuration. The Resolved Approvers section shows the email addresses that would be assigned as approvers.

    Set the step category to Dynamic.
  • Under Dynamic Approver Settings, select the Dynamic Approver pipeline to use.

  • Optionally, configure any users or groups that should always be assigned alongside the dynamic approver.

  • Save the policy.

  • access_profile_name

    String

    Name of the Access Profile being requested

    catalog_definition_name

    String

    Name of the Catalog Definition being requested

    Access Profiles Settings
    attribute transformers
    Lookup Table
    Lookup Tables
    Access Profiles — Custom Properties
    Lookup Tables
    Transformers
    Access Request Policies

    last_output

    {access_profile_properties.department | LOOKUP, "dept_approvers", "dept_code", "approver_email"}
    {access_profile_properties.department | LOOKUP, "dept_approvers", "dept_code", "approver_usernames"}
    {last_output}@company.com

    Multi-Application Entitlements: Defining multiple entitlements across different applications, such as for site reliability engineers who need access to GitHub, AWS, Jira, and Snowflake, along with one or more roles and group memberships within each of those applications

  • Business Roles: Inheriting combinations of other profile types to model sophisticated access privileges, such as all US Call Center employees inheriting US Employee access

  • Basic Information shown when creating Access Profiles:
    • Name: Display name for the profile type, shown when creating new Access Profiles.

    • Description: Extended description to document the purpose of the profile type.

    • Instructions: Optional custom instructions for using the profile type, shown when creating new profiles. This is useful if allowing self-service Access Profile creation.

  • On Create Behavior: Set the default policy state for Access Profiles created with this profile type:

    • Default: Uses Veza's default behavior (currently sets the profile to Initial state, but this may change in future releases).

    • Initial: The Access Profile is created but remains inactive/non-functional until a user explicitly starts it to move it to the Running state.

    • Running: The Access Profile starts in an active state and is immediately functional with no additional action required.

    • Initial Start By Admin: The Access Profile starts in the Initial state, but requires an administrator (not a regular user) to explicitly start it to move it to the Running state.

  • Relationship Options:

    • Allow Inheritance from Other Access Profiles: When enabled, profiles with this type can use another access profile to specify the exact entitlements.

    • Allow Direct Relationships: When enabled, you will specify the exact entitlements when creating a profile with this type. When disabled, profiles with this type can only inherit entitlements from another profile.

  • Access Request Policy: Choose the default Access Request Policy to apply access duration controls and approval workflow.

    • Allow overwrite of Access Request Policy: Enable selection of an alternative policy when Access Profile creators and owners create Access Profiles of this type.

  • Integrations: Choose if the Access Profile of this type supports multiple integrations, integrations of a single type, or a single instance of a single integration:

    • Allow multiple integration types: Profiles can have specific entitlements in more than one target integration type (such as one or more entitlements from any Active Directory or Okta integration).

    • Limit to a single integration type: Entitlements must be within integrations of a specific type (such as one or more entitlements from any Okta integration).

    • Limit to a single integration: Profiles are limited to a single integration (such as one or more entitlements from a specific Okta integration).

    • Create a local user account only (if limited to a single integration): Create a local user account without specific entitlements.

  • Entitlements: Set the maximum number of entitlements that can be added to profiles with this type (0 for unlimited entitlements).

    • Access Profile creators and owners can choose specific entitlements when editing the profile.

    • Create New Entitlement if None Exists: Configure the CREATE_ENTITLEMENT action to run when the policy is applied, including:

      • The target integration and entity type to create.

      • Any member conditions (ANY to apply to all identities, or restricted by a condition string).

      • Attributes for the created entities using the specified .

      • Enabling Continuous Sync to periodically recreate and reapply entitlements if removed within the target system.

  • Click Create Profile Type to save the changes.

  • The Creator permission at the Profile Type level is scoped to access_profile_types.{type-id} and serves as a gating mechanism for ownership assignment
    Inheritance Planning: Carefully plan which profile types should inherit from others to create a logical hierarchy
  • Regular Review: Periodically review profile types to ensure they continue to meet your organization's needs

  • Good Hygiene: Eliminate profile types that are no longer in use (when the count of Access Profiles with that type equals zero)

  • Veza Groups
    Access Profile Ownership
    for per-property change detection attributes that are also re-evaluated each cycle. Neither can be manually set or modified.

    hashtag
    Available System Attributes

    hashtag
    sys_attr__is_mover

    A boolean attribute that indicates whether an identity has undergone changes to monitored properties during the most recent extraction.

    Type: Boolean Persistence: Transient (re-evaluated each extraction cycle) Available in: Workflow trigger conditions

    Configuration: Define monitored properties in the policy configuration:

    Workflow Trigger Example:

    Combined Condition Example:

    The attribute is re-evaluated on every extraction cycle. It is set to true when any property in mover_properties changes, and cleared otherwise. For identities that are unchanged in an extraction, it is explicitly removed from the stored identity record. It is excluded from change detection to prevent recursive updates.

    System attribute names are case-sensitive and must be lowercase in all expressions.

    hashtag
    sys_attr__is_new_identity

    A persistent boolean attribute that indicates whether an identity is new in Veza — either appearing for the first time, or returning after being removed from its source system.

    Type: Boolean Persistence: Stored with identity record; cleared after the first extraction cycle where the identity appears Available in: Workflow trigger conditions

    When this attribute is set:

    • The identity has no prior record in Veza and appears for the first time in an extraction.

    • The identity was previously removed from its source system (for example, a terminated employee) and has returned in a new extraction cycle. Veza treats this as a new identity so that joiner workflows fire for re-hires.

    When this attribute is not set:

    • The identity already has an existing active record in Veza from a prior extraction cycle, regardless of any attribute changes.

    • The identity changed one or more properties but has a continuous record in Veza. Identities with attribute changes are indicated by sys_attr__is_mover or sys_attr_changed__<property>, not sys_attr__is_new_identity.

    Trigger condition examples:

    hashtag
    sys_attr__would_be_value

    A transient attribute that provides a preview of the transformation result during conditional evaluation.

    Type: String Persistence: Transient (exists only during IF statement evaluation) Available in: Conditional transformers only

    Usage Example - Conditional Domain Addition:

    The above transformer will check if the transformed email already contains "@", preserve existing email addresses, and add domain only when needed.

    hashtag
    sys_attr__would_be_value_len

    A transient attribute that provides the character length of the transformation result during conditional evaluation.

    Type: Number Persistence: Transient (exists only during IF statement evaluation) Available in: Conditional transformers only

    Usage Example - Progressive Username Truncation:

    For "Leonevenkataramanathan Foster":

    • First check (≤30 chars): leonevenkataramanathan.foster (30 chars - passes first condition)

    • If >30 chars, second check (≤20 chars): leonevenkataramana.foster (25 chars - fails second condition)

    • If >20 chars, fallback: l.f (3 chars - always succeeds)

    • Alternatives with NEXT_NUMBER: l.f2, l.f3, l.f4

    hashtag
    Integration with NEXT_NUMBER

    Preview attributes work with the NEXT_NUMBER transformer for generating unique alternatives:

    This evaluates the base value length before applying numbering, ensuring the final result (including numbers) meets constraints.

    Only one NEXT_NUMBER transformer is allowed per conditional branch.

    hashtag
    sys_attr_changed__<property>

    A family of dynamic boolean attributes that indicate which specific properties changed on an identity during the most recent extraction.

    Type: Boolean Persistence: Transient (reset each extraction cycle) Available in: Workflow trigger conditions

    How it works: When Veza processes an extraction event and detects that a property has changed since the previous extraction, it sets sys_attr_changed__<property_name> eq true on that identity's node. All sys_attr_changed__ attributes are cleared at the start of each extraction cycle, so they reflect only the changes in that extraction.

    When this attribute is not present: If a property did not change in an extraction, its sys_attr_changed__ attribute is absent from the identity record — it is not set to false. This means the condition sys_attr_changed__department_name eq false will not match identities whose department did not change; it will simply not match at all. To trigger a workflow only when a property has not changed, omit the sys_attr_changed__ check and rely on the attribute value directly.

    For new identities, Veza sets sys_attr_changed__<property> eq true for all properties, treating their first appearance as a change from non-existence.

    circle-info

    Because all sys_attr_changed__ attributes are set to true for new identities, adding a sys_attr_changed__ check to a condition that already includes sys_attr__is_new_identity eq true does not narrow the results further. Every property on a new identity is considered changed. Use sys_attr_changed__ to filter movers — identities that already exist in Veza and changed a specific property. For new identity workflows, rely on sys_attr__is_new_identity eq true alone or combined with attribute value conditions such as employment_status eq "ACTIVE".

    Trigger condition examples:

    Please note that sys_attr__is_mover is a persistent flag set when any property in the policy's mover_properties list changes. It does not identify which property changed. sys_attr_changed__ attributes are transient and per-property. They are set for all changed properties regardless of the mover_properties configuration.

    Secondary entity attributes: For secondary entity nodes (such as an HRIS record attached to an identity), prefix the attribute name with the entity type followed by a period:

    The entity type prefix matches the integration entity type name shown in the policy configuration. Without the prefix, the condition applies to the primary identity node.

    The trigger condition editor autocompletes sys_attr_changed__ and then suggests available attribute names. After typing or selecting the prefix, enter the property name to complete the attribute.

    hashtag
    See Also

    • Trigger Conditions Reference - Complete SCIM filter syntax for workflow conditions

    • Transformer Functions Reference - Complete list of transformation functions

    • Transformers - Attribute transformation concepts and examples

    • - Configuring mover properties and workflows

    {
      "mover_properties": ["department", "manager_id", "title", "location"]
    }
    sys_attr__is_mover eq true
    sys_attr__is_mover eq true and department eq "Engineering" and is_active eq true
    # Joiner workflow for all new identities, including re-hires
    sys_attr__is_new_identity eq true and employment_status eq "ACTIVE"
    
    # New hire into a specific department, combined with sys_attr_changed__
    sys_attr__is_new_identity eq true and sys_attr_changed__department_name eq true and department_name eq "Engineering"
    IF sys_attr__would_be_value co "@"
      {email | LOWER}
    ELSE
      {email | LOWER}@company.com
    IF sys_attr__would_be_value_len le 30
      {first_name | LOWER}.{last_name | LOWER | NEXT_NUMBER, 2, 3}
    ELSE IF sys_attr__would_be_value_len le 20
      {first_name | LOWER | FIRST_N, 10}.{last_name | LOWER | NEXT_NUMBER, 2, 3}
    ELSE
      {first_name | LOWER | FIRST_N, 1}.{last_name | LOWER | FIRST_N, 1 | NEXT_NUMBER, 2, 3}
    IF sys_attr__would_be_value_len le 15
      {username | NEXT_NUMBER, 2, 5}
    ELSE IF sys_attr__would_be_value_len le 15
      {username | FIRST_N, 13 | NEXT_NUMBER, 2, 5}
    # Triggers only when department changes TO Sales
    department_name eq "Sales" and sys_attr_changed__department_name eq true
    
    # Triggers when manager changes for active employees in specific departments
    sys_attr_changed__managers eq true and employment_status eq "ACTIVE" and (department_name eq "Engineering" or department_name eq "Marketing" or department_name eq "Sales")
    
    # Triggers when any of several properties change for active employees
    (sys_attr_changed__department_name eq true or sys_attr_changed__job_title eq true or sys_attr_changed__managers eq true) and employment_status eq "ACTIVE"
    
    # Triggers only when BOTH a chain-level field AND manager change in the same extraction
    (sys_attr_changed__customprop_management_chain_level_03 eq true or sys_attr_changed__customprop_management_chain_level_04 eq true) and sys_attr_changed__managers eq true
    # Trigger when department changes on a Beeline HRIS record (secondary source)
    OAABeeline_CSVHRISEmployee.sys_attr_changed__department eq true
    
    # Combine with a primary identity attribute value check
    OAABeeline_CSVHRISEmployee.sys_attr_changed__cost_center eq true and employment_status eq "ACTIVE"

    Lookup Tables

    Use lookup tables to transform identity attributes for target systems

    hashtag
    Overview

    You can use Lookup transformers to convert identity attributes from a source system into appropriate values for target systems based on CSV reference tables. This is particularly useful when mapping values between systems that use different naming conventions, codes, or formats for the same conceptual data.

    For example, you might need to transform a "Location" attribute from Workday (which might be stored as location codes like "MN001") into corresponding values for country, country code, or city names in a target system.

    Use Table Lookup Transformers when:

    • You need to map source attribute values to different values in target systems

    • You have standardized reference data that must be consistent across applications

    • You need to extract different pieces of information from a single attribute value

    • You have complex mapping requirements that built-in transformers cannot support

    hashtag
    Examples

    1. Geographic Information:

      • Transform location codes to country, region, city, or timezone information

      • Map office codes to physical addresses or facility types

    hashtag
    How It Works

    The Table Lookup Transformer references CSV-based mappings between source and destination values. When synchronizing user attributes, Veza:

    1. Takes the source attribute value

    2. Looks up this value in the specified lookup table

    3. Returns the corresponding value from the designated return column

    4. Applies this value to the target attribute

    hashtag
    Lookup Table Structure

    Lookup tables are CSV files with columns that map values from a source of identity to destination values. Each row represents a mapping entry. The first row must contain the column headers.

    For example, a location mapping table might look like:

    hashtag
    Creating and Managing Lookup Tables

    hashtag
    Creating a Lookup Table

    To create a new lookup table:

    1. Navigate to the Lookup Tables tab within your policy configuration

    2. Click Edit mode to enable policy changes

    3. Click Add New to create a new lookup table

    hashtag
    Managing Lookup Tables

    From the Lookup Tables tab, you can:

    • Edit table descriptions or upload a new CSV

    • Delete tables that are no longer needed

    hashtag
    Updating a lookup table

    To update an existing lookup table:

    1. Create a new policy draft version.

    2. Delete the CSV from the existing lookup table (do not delete the table itself).

    3. Upload the updated CSV.

    4. Publish the draft.

    hashtag
    Using Table Lookup Transformers

    hashtag
    Basic Syntax

    To use a Table Lookup Transformer in a common or action-synced attribute:

    1. In Destination Attribute, choose the attribute on the target entity that will be updated

    2. In Formatter, choose the source attribute to transform

    3. In Then Apply, specify the lookup table name, the column to match against, and the column containing values to return.

    The full syntax for using lookup table transformers is:

    Where:

    • <value> is the source attribute to transform (e.g., {location})

    • <table_name> is the name of the lookup table to use

    • <column_name>

    hashtag
    Examples

    Assuming a user has "location": "IL001" and a lookup table named locationTable structured as shown earlier:

    Formatter
    Result

    hashtag
    Advanced Features

    hashtag
    Pipeline Transformations

    You can combine lookup transformations with other transformation functions in a pipeline:

    This would look up the state_code corresponding to the location value and convert it to lowercase.

    hashtag
    Handling Missing Values

    When a lookup value is not found in the table, the transformation will fail for that specific attribute.

    For full coverage, ensure your lookup table includes entries for all possible source values that may be encountered during provisioning.

    To ensure robust provisioning workflows, it's important to include all expected values in your lookup table, validate source data before implementing lookup transformations, and test transformations with representative data sets.

    hashtag
    Technical Details

    hashtag
    Implementation Notes

    • Lookup tables are immutable and automatically deleted when no longer referenced by any policy version

    • Multiple policy versions can reference the same lookup table (e.g., an active version and a draft version)

    • Lookup tables are defined at the policy level and can be referenced by any transformer within the policy

    hashtag
    Best Practices

    1. Standardize Naming: To use a lookup-based transformer, you will reference the table by file name. Apply consistent conventions for both the table and columns.

    2. Document Mappings: Add descriptions for each lookup table to explain its purpose

    3. Validate Data: Ensure lookup tables are complete and accurate before using them in transformers. Consider how lookup tables will be maintained over time, especially for values expected to change.

    hashtag
    Troubleshooting

    hashtag
    Common Issues

    Issue
    Resolution

    hashtag
    Related Topics

    Activity Log

    Understanding the Lifecycle Management Activity Log for tracking provisioning operations

    The Lifecycle Management Activity Log provides visibility into all provisioning operations performed by Veza's Lifecycle Management system. It serves as a record of all activities, including successful actions, errors, and failures.

    hashtag
    Overview

    A Lifecycle Management policy defines automated workflows that execute when changes occur in a source of identity. The Activity Log tracks all aspects of these operations through a hierarchical structure:

    1. Policies define the overall automation framework for managing identities

    2. Workflows determine which actions should be executed for specific identities

    3. Actions represent specific operations to be performed on target systems

    4. Jobs are individual tasks executed as part of actions

    5. Events record atomic changes resulting from successful jobs

    The Activity Log provides four views of this activity across different tabs: Events, Jobs, Actions, and Workflow Tasks.

    hashtag
    Activity Log Tabs

    Each tab can help track recent actions, verify that expected changes have occurred, identify patterns or issues in lifecycle events, and monitor the overall health of your Lifecycle Management implementation.

    hashtag
    Events Tab

    The Events tab shows individual changes made to entities and relationships within the system. Each event represents an atomic change resulting from a successful action.

    Column
    Description

    hashtag
    Jobs Tab

    The Jobs tab displays individual jobs executed as part of actions. Jobs represent specific tasks performed on target systems, such as creating a user account or updating attributes. Use this tab to review whether individual jobs executed successfully or encountered an error and could not be completed.

    Column
    Description

    hashtag
    Actions Tab

    The Actions tab shows high-level operations triggered by workflows. Actions typically involve one or more jobs that work together to accomplish a specific goal.

    Column
    Description

    See for more details on supported actions and configuration options.

    hashtag
    Workflow Tasks Tab

    The Workflow Tasks tab displays workflows executed for specific identities. Workflows represent a sequence of actions executed as part of a Lifecycle Management .

    Column
    Description

    hashtag
    Workflow Execution Process

    For each identity, Lifecycle Management follows this process:

    1. Validation: The system validates the identity against workflow trigger conditions

    2. Execution Determination: The system determines whether execution is needed based on:

      • Identity state (e.g., CREATED, CHANGED, UNCHANGED)

    hashtag
    Using the Activity Log

    The Activity Log provides filtering and search options to help locate particular events:

    • Filter by time period: Use the date range filters to focus on date ranges

    • Search by identity or entity: Use the search fields to find activities related to unique identities or entities

    • Filter by event type or state: Use the dropdown filters to focus on event type or state

    hashtag
    Log Retention and Security

    Veza maintains all Lifecycle Management activity logs for audit purposes. These logs are retained even if the associated integration is removed, maintaining a full historical record of all provisioning operations.

    Note: Events shown in the Activity Log are distinct from the system-wide Event Logs found in the Veza Administration section.

    hashtag
    Best practices

    hashtag
    Review timing

    Review the Activity Log after extractions complete to verify expected workflow execution. For large policies, trigger evaluation and workflow execution can take several minutes to complete. Allow time for processing before reviewing activity.

    hashtag
    Custom monitoring dashboards

    For advanced monitoring requirements, you can build custom dashboards using Veza's query and dashboard features to track LCM policy health metrics. Contact for guidance on building LCM-specific monitoring dashboards for your deployment.

    Identity Override Attributes

    hashtag
    Overview

    This guide explains how to configure identity override attributes in Lifecycle Management to address scenarios where user attributes at the source of identity are incorrect, slow to update, or temporarily need adjustment for policy execution.

    Identity override attributes allow Lifecycle Management administrators to override the value of any user attribute set at the source of identity. These overrides take precedence over actual values during Lifecycle Management workflows.

    hashtag
    Problem scenarios for attribute overrides

    Identity override attributes address operational challenges where the source of identity doesn't immediately reflect ground truth:

    • Incorrect or slow-to-update attributes:

      • Employee termination: An employee has been terminated and needs immediate deprovisioning, but the termination status is not yet reflected at the source of identity

      • Role changes: An employee has immediately changed roles and needs new birthright access, but the role change and the new manager haven't been updated in the source system

    hashtag
    Before you start

    Before you configure identity override attributes, verify that override values comply with organizational policies and data standards, and assess the downstream impact of attribute changes. Ensure:

    • You have administrative access to Veza Lifecycle Management

    • You understand which source identity attributes need to be overridden

    • You have identified the specific identities requiring attribute overrides

    • You understand that overrides only affect Lifecycle Management workflows, not Access Visibility

    hashtag
    Configure identity override attributes

    Veza supports overrides for various property types from the source of identity:

    • Text properties (e.g., Department, Manager, Job Title)

    • Date properties (e.g., Activated At, Hire Date, End Date)

    • Numeric properties (e.g., Employee ID)

    hashtag
    Create attribute overrides for individual identities

    You can view, create, edit, and delete overrides from the identity details view.

    1. Click Lifecycle Management in the navigation sidebar, then select the Identities tab.

    2. Locate the identity requiring an attribute override.

      2.1. Use the Search by name field to find the specific user

      2.2. Click on the identity name to show more information in the sidebar

      2.3 Click Details to open the expanded details view

    The identity details view provides visibility into both original and overridden values. A visual indicator will highlight any attributes with overrides:

    1. Properties: Use this tab to show side-by-side comparisons of actual values from the source of identity and override values

    2. Overview: This tab includes a consolidated view of all active overrides for an identity

    hashtag
    Update existing overrides

    To change the value of an attribute override:

    1. Navigate to the identity's Properties tab. Access the same identity detail view where you created the override.

    2. Locate the attribute with an active override. Find the attribute showing "yes" in the Override column.

    3. Edit the override value.

      3.1. Click the Actions menu (three dots) for the overridden attribute

    3.3. Modify the Override Value in the dialog 3.4. Click Save to apply the changes

    hashtag
    Cancel attribute value overrides

    To remove an override:

    1. Access the identity's Properties tab. Navigate to the identity detail view with active overrides.

    2. Identify the override to remove. Locate the attribute with "yes" in the Override column.

    3. Clear the override.

      3.1. Click the Actions menu (three dots) for the overridden attribute

    The attribute will revert to using the source of identity value, and the Override column will show "no".

    hashtag
    Important considerations

    hashtag
    Override scope and limitations

    The current implementation supports overrides at the individual identity level. Note that any attribute overrides are not reflected in the Veza Access Graph.

    • Lifecycle Management only: Attribute overrides affect only Lifecycle Management workflows and policy execution

    • Access Visibility unchanged: The Access Graph and Access Visibility features continue to use the actual source of identity values

    • Source system independence: Overrides do not modify data in the originating identity providers or HR systems

    hashtag
    Operational best practices

    You should typically use overrides as temporary measures while addressing root causes in source systems. Maintain clear records of why each override was implemented and the business justification.

    Consider the following best practices when implementing attribute overrides:

    • Regular review process: Establish periodic audits of active overrides to ensure they're still necessary

    • Monitor policy impact: Review workflow execution logs to confirm that overrides produce expected policy outcomes. You can review the identity details Activity tab and Lifecycle Management Activity Logs to ensure that override values are applied as expected during provisioning, deprovisioning, and other lifecycle actions.

    • Emergency response procedures: Establish clear protocols for when and how to use overrides in approved scenarios.

    hashtag
    See also

    Understanding Conditions and Transformers

    Conceptual guide to the different condition and transformer systems in Lifecycle Management and when to use each

    Lifecycle Management automates identity provisioning across your applications. When an employee joins, changes roles, or leaves, workflows answer two questions: Should this person get access? And what should their account look like?

    This document explains the building blocks: conditions that control when things happen, and transformers that control what values are set.

    hashtag
    Terminology

    These terms are used throughout Lifecycle Management documentation.

    formatters
    Policies

    Contract extensions: A contractor's end date has been extended, but the extension isn't reflected yet at the source of identity

  • Missing manager data: The source of identity is missing a manager value, but this information is required for downstream application provisioning

  • Emergency access control:

    • Security incidents: Immediate access restrictions are needed before HR systems can be updated

    • Temporary access grants: Providing temporary access while permanent changes are processed

  • You recognize that overrides should be used for exceptional cases, not routine operations

  • Boolean properties (e.g., Active status, Enabled flags)

    Open the identity's Properties tab:

    3.1 In the identity detail view, click the Properties tab to view all available attributes from the source of identity.

    The Properties tab displays both original attribute values and any existing overrides.

  • Create a new attribute override:

    4.1. Find the attribute you want to override in the properties table

    4.2. Click the Actions menu (three dots) for that attribute

    4.3. Select Create Override from the dropdown menu

  • Set the override value in the Create Override dialog:

    5.1. Enter the desired override value in the Override Value field

    5.2. For date attributes, use the calendar picker to select the appropriate date and time

    5.3. For text attributes, type the new value directly

    5.5. Click Save to apply the override, or Cancel to discard changes

    The Create Override modal displays the attribute name and the current actual value for reference.

  • Verify the attribute override is active:

    • The Override column now shows "yes" for the modified attribute

    • The Override Value column displays your custom value

    • The override count updates in the Property Overrides filter (e.g., "1 Override")

  • View the override summary in the identity details Overview tab:

    7.1. Return to the Overview tab for the identity

    7.2. Check the Property Overrides section to see all configured overrides for the identity

    7.3. Each override displays the attribute name, override value, and actual value from the source

  • 3.2. Select Edit Override from the dropdown menu
    3.2. Select Clear Override from the dropdown menu

    3.3. Confirm the action when prompted

    Change management coordination: Communicate with HR and identity provider teams when overrides are needed.

    Lifecycle Management Policies
    Lifecycle Management Overview
    Access Profiles
    Conditions and Actions

    The identity associated with the event

    Entity Name

    The name of the entity affected by the event

    Entitlement Entity

    The entitlement entity involved in the event, if applicable

    Message

    Additional details or error messages related to the event

    The type of action (e.g., SYNC_IDENTITIES, MANAGE_RELATIONSHIPS)

    Identity

    The identity associated with the job

    State

    The current state of the job (Completed, Errored)

    Any Changes

    Whether the job resulted in changes to the system

    Error Message

    Detailed error information if the job failed

    The type of action (e.g., SYNC_IDENTITIES, MANAGE_RELATIONSHIPS)

    State

    The current state of the action (Completed, Errored)

    Jobs Started

    Number of jobs initiated by this action

    Any Changes

    Whether the action resulted in changes to the system

    When the workflow started

    Completed At

    When the workflow completed

    Entity Type

    The type of entity processed by the workflow

    State

    The current state of the workflow (Completed, Errored)

    Manually Triggered

    Whether the workflow was triggered manually (Yes) or by an automatic policy evaluation (No)

    Messages

    Additional details or error messages related to the workflow

    Continuous sync settings
  • Last execution time (for unchanged identities)

  • Task Creation: If execution is needed, a workflow task is created

  • Action Execution: The system executes conditions and actions via the task runner

  • Result Storage: The result is stored as an event in the Activity Log

  • Filter by manually triggered: In the Workflow Tasks tab, filter to show only manually triggered workflows or only automatically triggered ones
  • View error messages: Review issues by checking for error messages in the Message column

  • Event Type

    The type of event that occurred (e.g., REMOVE_RELATIONSHIP, ADD_RELATIONSHIP, SYNC_IDENTITY)

    Timestamp

    When the event occurred

    Success

    Whether the event completed successfully (True/False)

    Started At

    When the job started

    Completed At

    When the job completed

    Action Name

    The name of the action that initiated the job

    Started At

    When the action started

    Completed At

    When the action completed

    Action Name

    The name of the action

    Workflow

    The name of the workflow

    Identity

    The identity for which the workflow was executed

    Scheduled For

    When the workflow was scheduled to run, if applicable

    Actions
    Policy
    Veza Supportarrow-up-right

    Identity

    Action Type

    Action Type

    Started At

    Organizational Mapping:
    • Convert department codes to department names or business units

    • Map cost centers to budget codes or accounting categories

  • System-Specific Configurations:

    • Transform job titles to role designations in target systems

    • Convert skill codes to certification requirements or training needs

  • Provide a Name and optional Description for the lookup table
  • Drag a CSV file or click Browse to upload your reference data

  • Review the automatically detected column names

  • Click Save to store the lookup table

  • is the column in the table to match against
  • <return_column_name> is the column containing the value to return

  • Lookup tables can have multiple columns to support different transformations from the same reference data

    {location} | LOOKUP locationTable, location_code, city

    "Chicago"

    {location} | LOOKUP locationTable, location_code, state

    "Illinois"

    {location} | LOOKUP locationTable, location_code, state_code

    "IL"

    Value not found in lookup table

    Add the missing mapping to the lookup table with the correct source value

    Incorrect column name referenced

    Check the column names in your lookup table (they are case-sensitive)

    Unexpected transformation results

    Verify the lookup table content and ensure the correct columns are specified

    Attribute Transformers
    Common Transformers
    Then Apply
    Lifecycle Management Workflows
    Configuring an action-level attribute transformer using lookup tables.
    location_code,state_code,state,city
    MN001,MN,Minnesota,Minneapolis
    CA001,CA,California,Los Angeles
    TX001,TX,Texas,Houston
    TX002,TX,Texas,Austin
    {<value> | LOOKUP <table_name>, <column_name>, <return_column_name>}
    {location | LOOKUP locationTable, location_code, state_code | LOWER}
    Term
    Definition
    Example

    Condition

    A SCIM filter expression that evaluates to true/false

    department eq "Engineering"

    Transformer

    A complete attribute mapping configuration

    Maps email to target, with formatter {first_name}.{last_name}@co.com

    Formatter

    circle-info

    Key relationship: A Transformer CONTAINS a Formatter. The transformer is the complete configuration (which attribute to set, the formatter template, sync options). The formatter is just the template string that defines how to construct the value.

    hashtag
    Quick Reference

    When You Need To...
    Use This System
    Syntax Type
    Output

    Decide IF a workflow runs

    SCIM filter

    Boolean

    Decide IF a subsequent action runs

    hashtag
    The Four Systems

    hashtag
    Workflow Trigger Conditions

    Purpose: Determine whether a workflow should execute based on identity attributes.

    Syntax: SCIM filter expressions that evaluate to true or false.

    Example:

    When to use: Gate workflow execution based on identity state, department, location, employment type, or other attributes.

    See Trigger Conditions Reference for complete syntax documentation.


    hashtag
    Conditions on Success

    Purpose: After a workflow trigger matches, determine whether subsequent actions should run.

    Syntax: Same SCIM filter syntax as workflow triggers.

    Example:

    When to use: Create branching logic within a workflow where different actions apply to different identity subsets.

    See Conditions and Actions for configuration details.


    hashtag
    Attribute Transformers

    Purpose: Construct attribute values when syncing identities to target systems.

    Syntax: Formatter templates with optional pipeline functions.

    Examples:

    When to use: Transform source attributes into the format required by target systems (usernames, email addresses, distinguished names, etc.).

    Transformers also support IF/ELSE conditional logic to select different values based on identity attributes. See Attribute Sync and Transformers for complete documentation.


    hashtag
    Dynamic Access Profiles

    Purpose: Dynamically determine which Access Profile to assign based on identity attributes.

    Syntax: Formatter templates (same as attribute transformers) that resolve to Access Profile names.

    Example:

    If user's department is "Engineering", this resolves to the Access Profile named dept-engineering.

    When to use: Assign Access Profiles based on department, location, role, or other attributes without creating separate workflow conditions for each combination.

    circle-info

    Dynamic Access Profiles answer "which profile?" not "should we assign a profile?" They use formatter syntax, not SCIM conditions.

    See Dynamic Access Profiles for complete documentation.


    hashtag
    Combining Conditions and Transformers

    Conditions and transformers can work together. Workflow trigger conditions can embed transformer syntax for dynamic value comparisons.

    hashtag
    Example: Time-Windowed Leaver Trigger

    This condition triggers a leaver workflow when an employee's last day falls within a 2-day window around today:

    Breaking it down:

    Component
    Layer
    Purpose

    is_active eq true

    SCIM condition

    Check if employee is active

    customprop_lastdayofwork le ...

    SCIM condition

    Compare last day to threshold

    The syntax {\| FUNCTION \| ...} (pipe immediately after opening brace) indicates a transformer with no source attribute—it starts directly with a function like NOW.

    See Dynamic Value Comparisons for more examples.


    hashtag
    Summary

    Feature
    Workflow Conditions
    Attribute Transformers

    Purpose

    Gate execution

    Construct values

    Output

    Boolean (yes/no)

    String (the value)


    hashtag
    Related Topics

    • Trigger Conditions Reference - Complete SCIM syntax for workflow triggers

    • Attribute Sync and Transformers - Formatter syntax and pipeline functions

    • Transformer Reference - All available transformation functions

    • - Formatter-based profile assignment

    • - Computed attributes like sys_attr__is_mover

    • - Creating and configuring Lifecycle Management policies

    is_active eq true and department eq "Engineering"
    job_level ge 5 and location sw "US-"
    {first_name}.{last_name}@company.com
    {first_name | LOWER}.{last_name | LOWER | SUBSTRING, 0, 10}
    dept-{department | LOWER}
    is_active eq true
    and customprop_lastdayofwork le "{| NOW | UTC_TO_TIME_ZONE, \"-05:00\" | DATE_ADJUST_DAY, 0 | DATE_FORMAT, \"DateOnly\"}"
    and customprop_lastdayofwork gt "{| NOW | UTC_TO_TIME_ZONE, \"-05:00\" | DATE_ADJUST_DAY, -2 | DATE_FORMAT, \"DateOnly\"}"

    The template string within a transformer that constructs the value

    {first_name}.{last_name}@company.com

    Then Apply

    A transformation applied within a formatter using the pipe (|) character

    UPPER, LOWER, SUBSTRING

    SCIM filter

    Boolean

    Decide WHAT value an attribute should have

    Formatter (template)

    String

    Decide WHICH Access Profile to assign

    Formatter (template)

    String (profile name)

    {| NOW | UTC_TO_TIME_ZONE, "-05:00" | ...}

    Embedded transformer

    Generate "today in EST" dynamically

    Base syntax

    SCIM filter (eq, le, and, or)

    Template ({attribute})

    Supports IF/ELSE

    No (use nested conditions)

    Yes

    Can embed transformers

    Yes, for dynamic values

    N/A (is the transformer)

    Then Apply

    Only within embedded values

    Yes (| UPPER | LOWER)

    Dynamic Access Profiles
    System Attributes
    Policies
    Workflow Trigger Condition
    Condition on Success
    Attribute Transformer
    Dynamic Access Profile

    Attribute Mapping

    How source system properties become Veza attributes

    hashtag
    Overview

    When connecting to integrated systems (see Veza Integrations), Veza ingests properties from the source systems (e.g., Workday, Okta, Active Directory) and normalizes them into standardized attributes that appear when configuring Workflow trigger conditions, configuring Actions, and in Identities views.

    While these standardized attributes are intended to ensure consistent naming across different systems, it is important to understand that some attributes may appear differently than their original names in the source system.

    You can retrieve the original attribute names for enabled Lifecycle Management integrations using the API.

    hashtag
    Attribute Naming Conventions

    Veza normalizes all property names for consistency:

    Original Format
    Veza Format
    Rule Applied

    The following normalization rules typically apply:

    • Source properties are converted to lowercase

    • Any spaces and hyphens become underscores

    • Special characters removed

    • CamelCase converted to snake_case

    hashtag
    Attribute Types and Mappings

    The following sections include some examples of how Veza handles attributes from common integrations.

    hashtag
    Standard Attributes

    Veza recognizes and standardizes many common attributes across source systems:

    Attribute
    Type
    Description
    Example Value

    hashtag
    Source-Specific Mappings

    Veza will make conversions to some attribute names from the source integration. For example, sAMAccountName in Microsoft Active Directory is shown as account_name for Active Directory Users in Veza Access Graph.

    Workday → Veza

    Workday Property
    Veza Attribute
    Notes

    Okta → Veza

    Okta Property
    Veza Attribute
    Notes

    Active Directory → Veza

    AD Property
    Veza Attribute
    Notes

    hashtag
    Custom Properties

    Some integrations support custom property extraction for organization-specific fields from custom reports or extended schemas:

    • Always prefixed with customprop_

    • Automatically discovered during extraction once enabled

    • Follow standard normalization rules (lowercase, underscores)

    Examples:

    • customprop_department_code - Custom department identifier

    • customprop_employeeou - Organizational unit

    • customprop_region - Geographic region

    hashtag
    System Attributes

    Some entity attributes are computed by Veza, and not derived from source data:

    • sys_attr__is_mover - Identity has changed monitored properties

    • sys_attr__would_be_value - Preview value in conditional transformers

    • sys_attr__would_be_value_len - Preview value length in conditional transformers

    See for details.

    hashtag
    Using Attributes in Workflows

    When configuring a Workflow trigger condition or an action that syncs attributes, you can choose from available attributes using a dropdown menu.

    hashtag
    Primary vs Secondary Sources

    Primary Source - Attributes from the main identity source appear without prefixes:

    Secondary Sources - Attributes from additional sources are prefixed with the entity type:

    hashtag
    Example Usage

    Lifecycle Management uses two different expression syntaxes depending on the context:

    In Workflow Conditions (SCIM Filter Syntax):

    Trigger conditions use SCIM filter syntax to evaluate boolean expressions. See for complete documentation.

    In Transformers (Formatter/Pipeline Syntax):

    Attribute transformers use curly braces and pipes to produce output values. See for complete documentation.

    circle-exclamation

    Important: These syntaxes cannot be interchanged. Use SCIM filter syntax only in condition fields, and formatter syntax only in attribute mapping fields.

    With Secondary Sources (in Conditions):

    hashtag
    See Also

    • - Computed attributes for advanced scenarios

    • - Modifying and combining attribute values

    • - Using attributes in workflow conditions

    cost_center

    Special chars removed

    Department Code

    customprop_department_code

    Custom fields prefixed

    Custom fields are identified with a customprop_ prefix

  • System-computed fields are identified with the sys_attr__ prefix

  • department

    string

    Department name

    Engineering

    title

    string

    Job title

    Senior Engineer

    business_title

    string

    Business position

    Senior Engineer

    manager

    string

    Manager reference

    managers

    list

    List of managers

    [John Smith]

    is_active

    boolean

    Active status

    true

    hire_date

    date

    Employment start date

    2024-01-15

    cost_center

    string

    Financial allocation

    CC-1000

    business_title

    Job position

    Cost Center

    cost_center

    Financial allocation

    Employee Type

    employee_types

    List (e.g., Full Time)

    Manager

    managers

    List of manager names

    status

    ACTIVE, SUSPENDED, etc.

    department

    department

    Department name

    manager

    manager

    Manager's email/ID

    user_principal_name

    user@domain format

    memberOf

    member_of

    List of group DNs

    department

    department

    Department name

    title

    title

    Job title

    customprop_project_code - Project allocation

    Employee ID

    employee_id

    Spaces → underscores

    BusinessTitle

    business_title

    CamelCase → snake_case

    employee_id

    string

    Employee identifier

    E-98765

    email

    string

    Worker ID

    workday_id

    Unique worker identifier

    Employee ID

    employee_id

    Employee number

    login

    login

    Username

    email

    email

    Primary email

    sAMAccountName

    account_name

    Pre-Windows 2000 login

    distinguishedName

    distinguished_name

    Full LDAP path

    workday_id
    employee_id
    business_title
    hire_date
    email
    customprop_department_code
    OktaUser.login
    OktaUser.department
    AzureADUser.job_title
    ActiveDirectoryUser.distinguished_name
    employee_types co "Full Time" and department eq "Engineering"
    {first_name}.{last_name}@{customprop_domain}.com
    OktaUser.status eq "ACTIVE" and WorkdayWorker.is_active eq true
    ListLifecycleManagerDatasources
    System Attributes
    Trigger Conditions Reference
    Transformers
    System Attributes
    Transformers
    Policies
    Selecting attributes in a workflow trigger condition.

    Cost-Center

    Primary email

    Business Title

    status

    userPrincipalName

    Implementation and Core Concepts

    hashtag
    The IAM challenge

    Without automated lifecycle management, organizations face a fragmented identity and access management landscape. Multiple systems require manual coordination, leading to delays in provisioning, security gaps from orphaned accounts, and compliance risks.

    hashtag

    Assign O365 Licenses with Workday and Azure AD

    Assigning Microsoft 365 licenses to users based on Workday attributes during the onboarding process

    This guide explains how to automatically assign Microsoft 365 licenses to users as part of a Workday-triggered onboarding workflow. License assignment is a common requirement when provisioning new employees who need access to Microsoft productivity tools like Outlook, Teams, and SharePoint.

    hashtag
    Overview

    When a new employee is hired in Workday, you can configure Veza Lifecycle Management to:

    Managing Identities

    Manage user identities and lifecycle automation in Veza, including synchronization, access profiles, and workflow triggers for joiner, mover, and leaver processes.

    hashtag
    Identities

    Identities in Veza Lifecycle Management represent a top-level view of an individual user, used to automate provisioning and deprovisioning across systems, applications, or services.

    This can include birthright access managed throughout the user's lifecycle, triggered by joiner, mover, or leaver events, as well as ad-hoc, just-in-time access granted upon approval of an access request.

    Identities can refer to users who may be employees, contractors, or external collaborators (partners). Additionally, Veza supports lifecycle management for Non-Human Identities (NHI), such as service accounts, though with a simplified action set. See

    [email protected]envelope
    [email protected]envelope
    How Veza streamlines IAM

    Veza Lifecycle Management provides a unified platform that automates identity provisioning and de-provisioning across your entire technology stack. Changes in your HR system automatically trigger coordinated workflows across all connected applications, ensuring consistent access management throughout the employee lifecycle.

    IAM framework with Veza showing automated workflows and centralized management

    Before you begin creating draft Policies for automating Lifecycle Management workflows, you should establish and document how employees in your organization are mapped to business roles, and corresponding birthright entitlements (default access permissions granted based on an employee's role) such as groups and roles in target applications.

    Implementing Veza Lifecycle Management will require:

    • Defining segmentation criteria in terms of Business Roles for identities in your organization.

    • Defining Role Conditions used in Lifecycle Management policies that Veza will use to match roles to identities, based on attributes from the source of identity.

    • Defining Profiles for each target application that will map Business Roles to application-specific entitlements.

    • Assigning Profiles to Business Roles to enable business rules.

    The topics in this document will help you structure your Lifecycle Management implementation, and establish foundations that you can use to simplify access management throughout the employee lifecycle.

    hashtag
    Planning Your Implementation

    hashtag
    Key considerations and requirements

    • Is a lifecycle management process defined for your organization?

      • If yes: Begin assessing your current policies for implementation with Veza Lifecycle Management.

      • If no: Work with application owners, HR administrators, and other stakeholders to establish protocols for granting and revoking access as employees join, depart, or change roles.

    • Do you have one, or even multiple sources of truth for employee identity metadata?

      • At least one source of identity is required to trigger Lifecycle Management actions when there are changes in the data source. This data source could be an HRIS system, identity provider, directory service, or an exported report.

      • Veza supports importing employee records from built-in , OAA integrations using the , and .

      • For example, you may have different sources of identity for full-time and employees and contractors.

    • What scenarios will be automated?

      • A range of applications can be sources of identity and targets for Lifecycle Management, with different actions supported for each integration. See and for the current capabilities.

    hashtag
    Security considerations

    Implementing Lifecycle Management requires careful attention to access control, API key management, and credential handling to maintain security throughout your deployment.

    Access control

    Limit administrative access: Reduce standing administrator roles to those who need them. Best practice is no more than 5 administrators with standing access.

    Use operator role for monitoring: Users with Operator roles can view LCM policies without editing them. Use this role for monitoring and troubleshooting.

    Temporary support access: When working with Veza support on LCM issues, grant temporary administrator privileges using Administration > Support User Access rather than creating permanent accounts.

    API key management

    Monitor Veza API keys and disable unauthorized keys. API calls made with keys that have administrator privileges can modify LCM policies.

    Key rotation best practices:

    • Review API keys quarterly

    • Revoke keys that are no longer in use

    • Document the purpose of each active key

    • Use separate keys for different automation purposes

    Integration credentials

    Credential lifecycle:

    • Track credential expiration dates and renew before expiry

    • Avoid editing integration credentials except when renewing them

    • Test credential changes in a sandbox environment before applying to production

    Critical system protection: Identity source extractions are the most critical step in the LCM process. Handle integration configuration changes with care:

    • Schedule credential updates during maintenance windows

    • Verify extraction success immediately after credential changes

    • Have rollback procedures ready if extraction fails

    hashtag
    Define Segmentation Criteria (Business Roles)

    Begin by identifying and cataloging the different roles that can be assigned to employees and their digital identities within your organization. Users will be granted entitlements within target applications based on these business roles based on your Lifecycle Management policies.md.

    This list of business roles might be sourced from an organization chart, or a human resources information system (HRIS). These roles can be defined in terms of any discriminating attributes from a source of identity, such as:

    1. Employee or contractor status

    2. Roles and job positions

    3. Business Units (BUs)

    4. Locations

    5. Define and list the different populations of employees with different levels of access in your organization (such as by roles, regions, and teams).

    6. Organize the populations hierarchically, each inheriting the access granted to its parent population. For example, you might have a structure "All Employees" > "Sales Team" > "Sales Managers," with each inheriting the access granted to the parent.

    7. Create a in Veza to model each segment.

    Example Business Roles:

    • Sales

    • Developers

    • Executive Employees

    • US Employees

    • China Employees

    hashtag
    Define Role Conditions

    Identify the attributes and conditions that will identify the segment each user belongs to. The possible attributes will depend on the employee metadata provided by your HRIS or other source of truth for identity.

    For example, you might assign certain Active Directory groups only to US employees, identified by a source Workday Worker's work_location. To define these conditions, you will need to understand what attributes are available within the source of truth, and how the values map to each employee segment.

    1. Consider how employee records are structured in your source of identity, including all the built-in attributes belonging to an identity, and the possible values.

    2. Check if any custom attributes can be used to define role conditions, and ensure these are enabled in the Veza Access Graph.

    3. Document how employee populations correspond to the attribute values contained in the source of identity.

    Examples: Source attributes for role conditions

    The following standard attributes are available by all HRIS integrations that use an Open Authorization API template, along with any custom properties enabled for the integration. You can typically import data from any HRIS system to Veza using this template, sourced from a generated report, API calls, or CSV data.

    hashtag
    OAA HRIS Built-In Attributes

    Attribute
    Description

    Employee Number

    Unique identifier for the employee.

    Company

    The company or subsidiary the employee works for.

    First Name

    Employee's first name.

    Using this standard identity metadata, a Lifecycle Management workflow runs specific actions for identities where some or all of the conditions are true:

    • Employment Status equals "Pending"

    • Employment Types equals "Full Time"

    • Department equals "Engineering"

    • Work Location equals "US"

    • Cost Center equals "R&D"

    • Start Date on or after "2025-01-01"

    hashtag
    Define Profiles

    A Profile defines a set of entitlements for a specific application that can be assigned to users. For each target application, application owners will need to establish levels of birthright entitlements by defining Profiles mapped to groups, roles, or other entitlements that can be assigned to a user.

    1. Review target applications to validate that the expected entitlements are configured, with the correct scopes and permissions for the Profiles they will be associated with.

    2. Create Lifecycle Management Access Profiles mapped to those entitlements.

    Examples: Access Profiles

    Profile Name
    Target
    Relationship

    AD Executive Employees

    Active Directory

    Executive Employee - Manager US (Active Directory Group)

    AD Engineering Managers

    Active Directory

    Engineering - Manager US (Active Directory Group)

    When configuring the Manage Relationships action, administrators can grant or revoke access by choosing a Business Role that inherits the desired Profile.

    hashtag
    Map Business Roles to Profiles

    Configure Business Roles to inherit the corresponding access profiles, mapping entitlements to employee segments.

    1. Create Business Roles for each segment.

    2. For each Business Role, inherit a corresponding access profile.

    3. Assign one or more Profiles to each Business Role as needed to fully define the birthright entitlements for each position.

    Examples: Map Business Roles to Profiles

    Asia Employees

    US Employees

    Developers

    hashtag
    Define synced attributes

    Attributes from the source of identity can determine the attributes of users in target systems when creating or updating a target entity.

    For example, a provisioned Okta User's country_code might be set to a source Workday Worker's work_location. Additionally, the Okta User manager attribute could be continually synchronized to match the Worker’s manager.

    Target synced attributes can have fixed values (e.g., always true), can match a source attribute, or contain a combination of source values, transformed as needed to match the required format. Rules for synchronizing attributes are managed with Transformers.

    1. For each application, understand the supported attributes for provisioned users.

    2. Assess the identity metadata from your source of truth to decide how source entity attributes will be used to set the values of target entity attributes.

    3. Veza can synchronize attributes during provisioning and de-provisioning workflows, and whenever a change is detected in the source of identity. Decide which attributes should be kept in Continuous Sync, and which should only be created (and never modified after creating an entity).

    Examples: Synced Attributes

    Sync Active Directory Accounts for Active Employees (Joiners/Movers)

    When provisioning AD Users, create user attributes based on values in the source of identity. These attributes can also be kept up-to-date with the source of identity when there are changes, by enabling Continuous Sync.

    Active Directory Attribute
    Source Attributes
    Transformer Value

    account_name

    display_full_name

    {display_full_name}

    distinguished_name

    first_name, last_name

    CN={first_name} {last_name},OU=Minnetonka,OU=US,OU=Evergreen Staff,DC=evergreentrucks,DC=local

    Sync Active Directory Attributes for Withdrawn Employees (Leavers)

    When disabling AD Users, update the DN and Primary Group DN to a group and OU reserved for terminated employees:

    Active Directory Attribute
    Source Attributes
    Transformer Value

    account_name

    display_full_name

    {display_full_name}

    distinguished_name

    first_name, last_name

    CN={first_name} {last_name},OU=Evergreen Termination,OU=Evergreen Staff,DC=evergreentrucks,DC=local

    • Moving leavers into a "Terminated Users" group (via the primary_group_dn attribute) effectively restricts access to systems that rely on Active Directory for authentication and authorization.

    • Updating the distinguished_name to place leavers in a specific organizational unit (OU), like "Evergreen Termination," separates active users from inactive ones, and enables the application of policies, scripts, and queries that target inactive users without affecting active employees.

    IAM framework before Veza showing manual processes and disconnected systems
    Create a user account in Azure AD
  • Assign the appropriate Microsoft 365 licenses based on employee attributes (department, role, location)

  • Optionally enable email functionality

  • This automation ensures consistent license assignment, reduces manual IT work, and helps control licensing costs by assigning only the licenses each employee needs.

    hashtag
    System Architecture

    The following diagram shows the license assignment flow:

    hashtag
    Prerequisites

    Before starting this implementation, ensure you have:

    1. Workday Integration: Configured Workday for Lifecycle Management as your source of identity

    2. Azure AD Integration: Configured Azure AD for Lifecycle Management as a target system with the following permissions:

      • Directory.ReadWrite.All

      • Group.ReadWrite.All

      • GroupMember.ReadWrite.All

      • User.EnableDisableAccount.All

    3. Completed Extractions: At least one successful extraction for each integration

    4. Available Licenses: Sufficient Microsoft 365 licenses in your Azure AD tenant for the license SKUs you plan to assign

    5. Administrative Access: Veza administrative access to create Lifecycle Management policies

    circle-info

    Finding License SKU IDs: To assign licenses, you'll need the SKU IDs for your Microsoft licenses. You can retrieve these using the Microsoft Graph API endpoint GET /subscribedSkus. For a complete list of Microsoft product names and SKU identifiers, see the Microsoft product names and service plan identifiersarrow-up-right documentation.

    hashtag
    Implementation Steps

    hashtag
    Step 1: Identify License Requirements

    Before configuring the workflow, map your organization's license requirements to Workday attributes:

    Employee Type
    Department
    License SKU
    License Name

    Full-Time

    Any

    ENTERPRISEPACK

    Microsoft 365 E3

    Full-Time

    Engineering

    circle-info

    SKU IDs vs. Display Names: The SKU IDs shown above (like ENTERPRISEPACK) are internal Microsoft identifiers. The display names (like "Microsoft 365 E3") are what you see in the Azure portal and Veza UI.

    hashtag
    Step 2: Create the Lifecycle Management Policy

    Create a policy using Workday as the source of identity:

    1. Navigate to Lifecycle Management > Policies

    2. Click Create Policy

    3. Configure the policy in the wizard:

      • Policy Name: Workday Azure License Provisioning

      • Description: (Optional) Describe the policy purpose

      • Primary Identity Source: Select your Workday integration (the entity type is shown alongside the integration name)

    4. Click Save to create the policy

    hashtag
    Step 3: Configure the Joiner Workflow

    Add a workflow that triggers when new employees are hired:

    1. Edit your policy and click Add Workflow

    2. Configure the workflow trigger:

      • Workflow Name: New Employee Onboarding

      • Condition: is_active eq true (optionally add AND hire_date ge "2024-01-01T00:00:00" to limit to employees hired after a specific date). The date format follows ISO 8601 (RFC 3339) syntax.

      • Continuous Sync: Enabled

    hashtag
    Step 4: Add Sync Identities Action

    First, create the user in Azure AD:

    1. In your workflow, click Add Action

    2. Select Sync Identities

    3. Configure the action:

      • Description: Create Azure AD user from Workday

      • Target: Azure AD User

      • Integration: Your Azure AD integration

      • Create new users: Enabled

      • Continuous Sync: Enabled

    4. Configure attribute mappings:

    Destination Attribute
    Source/Format
    Continuous Sync

    principal_name

    {username}@yourdomain.com

    Yes

    display_name

    {first_name} {last_name}

    Yes

    circle-exclamation

    Usage Location Required: The usage_location attribute must be set before licenses can be assigned. This two-letter country code (ISO 3166-1 alpha-2) determines which services are available to the user based on regional compliance requirements.

    chevron-rightConverting Date Formats Between Systemshashtag

    When mapping date attributes between Workday and Azure AD, you may need to convert date formats. Use the DATE_FORMAT transformer with Go time layout syntaxarrow-up-right to specify the output format.

    Example: Converting hire_date to ISO 8601 format

    If Workday provides dates in MM/DD/YYYY format but Azure AD expects YYYY-MM-DD:

    Destination Attribute
    Source/Format

    The reference date for Go time layouts is Mon Jan 2 15:04:05 MST 2006. Common format patterns:

    Pattern
    Output Example
    Description

    For more transformer options, see .

    hashtag
    Step 5: Create Access Profiles for Licenses

    Before adding the license assignment action, create Access Profiles that contain the license entitlements:

    1. Navigate to Lifecycle Management > Access Profiles

    2. Click Create Access Profile

    3. Configure the profile:

      • Name: Microsoft 365 E3 License

      • Description: Standard Microsoft 365 E3 license assignment

    4. Add an entitlement:

      • Integration: Your Azure AD integration

      • Entity Type: Azure AD License

    5. Click Save

    Repeat this process to create additional Access Profiles for different license types:

    Access Profile Name
    License SKU
    Use Case

    Microsoft 365 E3 License

    ENTERPRISEPACK

    Standard employees

    Microsoft 365 E5 License

    ENTERPRISEPREMIUM

    Engineering department

    circle-info

    Access Profiles Best Practice: Create separate Access Profiles for each license type rather than combining multiple licenses in one profile. This provides flexibility for conditional assignment and easier maintenance.

    hashtag
    Step 6: Add License Assignment Action

    Now add the license assignment using Manage Relationships with your Access Profiles:

    1. Click Add Action

    2. Select Manage Relationships

    3. Configure the action:

      • Description: Assign Microsoft 365 licenses

      • Access Profiles: Select the appropriate Access Profile(s)

      • Remove Existing Relationships: No (to preserve any manually assigned licenses)

    hashtag
    Basic License Assignment (All Employees)

    For assigning the same license to all employees:

    • Condition: (leave empty for all users matching workflow)

    • Access Profiles: Select "Microsoft 365 E3 License"

    • Remove Existing Relationships: No

    hashtag
    Conditional License Assignment (By Department)

    For different licenses based on department, add multiple Manage Relationships actions with conditions:

    Engineering Department (E5):

    • Condition: department eq "Engineering"

    • Access Profiles: Select "Microsoft 365 E5 License"

    • Remove Existing Relationships: No

    All Other Departments (E3):

    • Condition: department ne "Engineering"

    • Access Profiles: Select "Microsoft 365 E3 License"

    • Remove Existing Relationships: No

    hashtag
    Conditional License Assignment (By Employee Type)

    Full-Time Employees:

    • Condition: worker_type eq "Full_Time"

    • Access Profiles: Select "Microsoft 365 E3 License"

    • Remove Existing Relationships: No

    Contractors:

    • Condition: worker_type eq "Contractor"

    • Access Profiles: Select "Microsoft 365 Business Basic"

    • Remove Existing Relationships: No

    hashtag
    Step 7: Add Email Creation Action (Optional)

    If you want to ensure Exchange Online is configured:

    1. Click Add Action

    2. Select Create Email

    3. Configure the action:

      • Description: Enable Exchange Online mailbox

      • Target: Azure AD User

      • Integration: Your Azure AD integration

    circle-info

    Create Email vs License Assignment: The Create Email action specifically assigns an Exchange Online license and enables email functionality. If your main license (E3, E5) already includes Exchange Online, this step may be redundant. Use this action when you need to ensure email is enabled regardless of which base license is assigned.

    hashtag
    Step 8: Configure Action Order

    Ensure your actions execute in the correct order:

    1. Sync Identities - Creates the user account (must run first)

    2. Manage Relationships - Assigns licenses via Access Profiles (requires user to exist)

    3. Create Email (optional) - Enables mailbox (requires user and license)

    circle-info

    Access Profiles Must Exist First: The Access Profiles referenced in your Manage Relationships actions must be created before you configure the workflow. Access Profile creation (Step 5) is a one-time setup that happens outside the workflow itself.

    Use the drag handles in the workflow editor to reorder actions if needed.

    hashtag
    Step 9: Test the Configuration

    hashtag
    Test with Simulation Dry Run

    1. Select your policy

    2. Click the overflow menu (three dots icon) and select Perform Dry Run

    3. In the Identity field, select an employee from the dropdown

    4. Click Show results to verify:

      • User creation attributes are correct

      • License assignment action is included

      • No errors are reported

    hashtag
    Test with a Single User

    1. Identify a test user in Workday (or create one in a test environment)

    2. Ensure the test user matches your workflow conditions

    3. Enable the policy and trigger a sync

    4. Verify in Azure AD:

      • User account was created

      • Correct license(s) are assigned

      • Usage location is set

    hashtag
    Advanced Configuration

    hashtag
    Multiple License Assignments

    To assign multiple licenses to a single user, you can either:

    Option 1: Create an Access Profile with multiple entitlements

    Create a single Access Profile containing multiple license entitlements, then reference it in one Manage Relationships action.

    Option 2: Add multiple Manage Relationships actions with different Access Profiles

    circle-info

    Access Profile Strategy: Option 2 (separate Access Profiles) provides more flexibility for conditional logic and makes it easier to manage license changes independently. Option 1 is simpler when all licenses are always assigned together.

    hashtag
    License Removal on Role Change (Mover Workflow)

    When employees change roles, you may need to update their licenses:

    1. Create a Mover Workflow with the condition: department changed

    2. Add a Manage Relationships action with:

      • Remove Existing Relationships: Yes (removes old licenses)

      • Add conditional license assignments for the new role

    hashtag
    License Removal on Termination (Leaver Workflow)

    To remove licenses when employees leave:

    1. In your Leaver Workflow, add Deprovision Identity action:

      • Remove All Licenses: Yes

      • De-provisioning Method: Disabled

    Alternatively, use Manage Relationships with Remove Existing Relationships enabled before deprovisioning.

    hashtag
    See Also

    • Access Profiles

    • Azure Lifecycle Management - Azure AD integration reference

    • Workday Integration - Workday configuration

    • Lifecycle Management with Workday, Okta, and Active Directory

    Action 1: Manage Relationships
      - Description: Assign base Microsoft 365 license
      - Access Profiles: Microsoft 365 E3 License
    
    Action 2: Manage Relationships
      - Description: Assign Power BI Pro license
      - Condition: department eq "Analytics" OR department eq "Finance"
      - Access Profiles: Power BI Pro License
    
    Action 3: Manage Relationships
      - Description: Assign Visio license
      - Condition: department eq "Engineering"
      - Access Profiles: Visio Plan 2 License
    for details on NHI-specific capabilities and limitations.

    With Lifecycle Management, workflows defined within policies dictate the users’ onboarding, job-function change, and offboarding processes, ensuring that corresponding identities have precisely the access they need as their roles evolve or their status within the organization changes. Similarly, access granted to identities may also change as just-in-time access requests are fulfilled or revoked.

    The Lifecycle Management > Identities page serves as a central hub for viewing identities known to Lifecycle Management and Access Requests, as well as performing actions on individual identities.

    Identities are populated into Lifecycle Management by first identifying the entire user population by integrating their source of identity (SOI) and creating and enabling a policy that uses that data source. A policy does not require configured workflows to begin populating identity data. Enabling a policy against an identity source is sufficient to start the Identities table. This may require enabling a built-in integration for your identity source (e.g., Workday integration), uploading user data in CSV format (CSV Upload integration), or using a custom OAA connector.

    See Integrations for detailed information on integrating the source of identity.

    For Integration management using APIs, see the Datasource Management APIs.

    hashtag
    Identity Synchronization

    Identities are maintained through synchronization with the identity sources. Syncing identities ensures that all systems reflect the most current user state, whether through onboarding, role changes, or attribute updates, keeping access aligned, consistent, and audit-ready.

    The Sync Identities action is used for the automatic synchronization of user identities between an authoritative source (such as an HR system or identity provider) and target systems. In the Lifecycle Management workflow, Sync Identities works alongside other key actions:

    • Manage Relationships (handling group/role memberships)

    • Deprovision Identity (removing access when users leave the organization)

    Synchronization is executed through Lifecycle Management policy workflows. Policy workflows can be defined with triggers and actions to synchronize changes in your identity source with target systems. Additionally, SCIM (System for Cross-domain Identity Management) or OAA (Open Authorization API) can enable identity sync for a wide range of target applications that don't have a built-in Veza integration, but do expose standard user and group management APIs or support bulk data export.

    • See SCIM for more information on usage.

    • See Open Authorization API (OAA) for detailed information.

    hashtag
    Multi-Value Attribute Management

    Active Directory supports appending values to multi-value attributes during Identity Sync actions. This allows you to add new values without replacing existing ones.

    For detailed information about appending multi-value attributes, including supported attributes, syntax, and examples, see Appending Multi-Value Attributes in the Transformers documentation.

    hashtag
    Identities Table

    Column
    Description
    Usage

    Name

    Identity display name

    The full display name is an attribute composed of the user's first name and last name.

    Status

    Current lifecycle status (Active/Inactive)

    Indicates employment status.

    Note: The display name is not the primary unique identifier, as multiple users may share the same first and surname.

    hashtag
    Identity attribute display priority

    When an identity has multiple sources (primary and secondary), the Identities table displays attributes based on the active status of each source. The "active" status is determined by the is_active field in each source of identity, which typically represents employment or account status (e.g., an active employee in Workday, an active contractor account in a secondary system).

    Display Priority:

    Primary Source Status
    Secondary Source Status
    Displayed Attributes Source

    Active

    Any

    Primary source

    Inactive

    Active

    Secondary source

    This behavior ensures the table reflects the most current and relevant source of identity information. For example, when an employee terminates (primary source becomes inactive) but remains as an active contractor in a secondary source, their attributes are displayed from the contractor system.

    circle-info

    Early Access: Enhanced display prioritization may require Veza support to enable. Contact your Customer Success Manager for scenarios where secondary identities should be displayed when primary identities become inactive.

    hashtag
    Filter and Search an Identity

    To start, you can use filtering options to locate specific identities or analyze a group of identities based on standard criteria. The following filters are available on the Identities overview:

    • Search by name: Locate specific individuals using a name-based search

    • Department filter: View identities by organizational unit

    • Status filter: Filter by Active or Inactive employment status

    • Access Profiles filter: Find identities with specific profile assignments

    • Integrations filter: Filter by source integration system

    • Policy filter: View identities managed by specific policies

    • Workflows Triggered filter: Identify identities that have triggered automation

    • Not in a Workflow: Find identities outside automated workflows

    hashtag
    Identity Actions

    For each identity record, administrators can perform actions through the Actions menu:

    • View Details: Access identity information, attribute history, and related accounts

    • Trigger Workflow: Manually initiate a workflow in a policy

    • Request Access: Launch an Access Request for additional access (requires Veza Access Requests).

      See Notification Templates for Lifecycle Management for customizing the Request Access Template.

    • Show in Graph: Visualize identity relationships and access patterns

    hashtag
    View User Details

    Click on your selected identity to open the Identity Details view.

    The following fields in the Identity Details view are populated with the current user's information:

    • Title: The user’s position title.

    • Email: The user's email address.

    • Providers: A list of assigned integrations. When you click a specific provider, the Integration page opens, displaying the provider's detailed information, including its Entity Categories distribution.

    • Access Profiles: A list of assigned Access Profiles to the identity. When you click on a specific profile, its detailed information page appears, displaying its status (either Draft or Published). You can also edit the Access Profile if needed.

    • Last Workflow Triggered: The name of the workflow that was recently executed.

    • Primary: The Primary identifier is configured (True or False) to be the authoritative attribute for matching or locating an identity.

    • Secondary Identities: An associated name is connected to the primary identity.

    • ID: The Identification number assigned to the primary identity.

    • Active: The user’s identity is active if True. Otherwise, False when inactive.

    • Last Changed: A time frame (in days, weeks, months) when the identity was last changed.

    hashtag
    Attribute Overrides

    When executing a policy where user attributes at the source of identity are incorrect, slow to update, or temporarily need adjustment, you can override the existing attribute with a different value until the issue is corrected. For more information, see Identity Override Attributes.

    Here are some examples of incorrect or slow-to-update attributes:

    • Employee termination: An employee has been terminated and needs immediate deprovisioning, but the termination status is not yet reflected at the source of identity

    • Role changes: An employee has immediately changed roles and needs new birthright access, but the role change and the new manager haven't been updated in the source system

    • Contract extensions: A contractor's end date has been extended, but the extension isn't reflected yet at the source of identity

    • Missing manager data: The source of identity is missing a manager value, but this information is required for downstream application provisioning

    • Security incidents: Immediate access restrictions are needed before HR systems can be updated

    • Temporary access grants: Providing temporary access while permanent changes are processed

    To create an Override Value, perform the following:

    1. Select an identity by name.

    2. Click Details.

    3. Click Properties in the Details menu.

    4. Click Actions (three dots icon)

    5. Select Create Override.

    6. The Create Override window appears. The Property Name and Actual Value fields are populated.

    7. Enter an Override Value.

    8. Click Save.

    hashtag
    Internal metadata

    The Internal Metadata tab on the Identity details view exposes Lifecycle Management's internal sync state for an identity. This is useful when troubleshooting stuck syncs, correcting identity mismatches, or forcing a resync after source-of-identity corrections.

    For example, if an HR system initially created an employee with the wrong employee ID and the identity was already synced to a target system, Lifecycle Management retains the original mapping in its internal metadata. Correcting the employee ID at the source alone does not clear the stale mapping. The Internal Metadata tab allows administrators to clear the stuck mapping directly, so the next sync cycle picks up the corrected identity.

    Enabling the tab

    The Internal Metadata tab is hidden by default. To enable it:

    1. Go to Lifecycle Management > Settings > Identity Settings.

    2. Under Display Settings, enable the Show internal metadata toggle.

    3. Click Save.

    Enabling this setting requires the administrator role. Once enabled, the Internal Metadata tab appears as the last tab on all Identity detail views.

    Metadata sections

    The tab displays the following categories of internal state. Use the dropdown to select which sections to display. By default, Synced Entities, Action Run Info, and Workflow Failures are shown. Synced Relationships is available but not displayed by default.

    Section
    Description

    Synced Entities

    Target system entities that are mapped ("stuck") to this identity. Each entry shows the datasource, entity type, and entity ID. When a sync creates or updates a target account, Lifecycle Management records the mapping here so future syncs update the same target entity.

    Action Run Info

    Per-action execution state, including the action name, current state, and last run timestamp.

    Workflow Failures

    Failure tracking per workflow, including first and last failure timestamps and the number of consecutive failures.

    Clearing metadata

    Action Run Info, Workflow Failures, and Synced Relationships each have a section-level Clear button that removes all stored metadata for that category. For Synced Entities, clear buttons appear on each individual entity mapping, allowing you to remove specific mappings without affecting others.

    Clearing metadata does not modify the target system. It removes Lifecycle Management's record of the prior sync, so the next sync cycle treats the identity as if it has not been synced before and performs a full sync from the identity source.

    A confirmation dialog appears before any clear operation. Clearing metadata should be done infrequently and only when the stored state is known to be incorrect.

    Audit logging

    All metadata edits are recorded as IDENTITY_METADATA_EDIT events in the Activity Log. Each event includes the identity, the fields that changed, and the previous and new values.

    hashtag
    Performing Actions on an Identity

    Click the overflow icon (three dots) to display options for performing actions on the identity. Next, click on the desired action:

    • Trigger Workflow

    • Request Access

    • Show in Graph

    hashtag
    Trigger Workflow

    The Trigger Workflow option is a convenient way to test a specific user in a policy workflow. For example, you can test a new employee's identity in a joiner workflow to evaluate whether they have sufficient access to perform their duties.

    Use the Trigger Workflow option to manually run a workflow for a specific user.

    To trigger a workflow with a specific user, perform the following steps:

    1. Select a workflow in the dropdown menu.

    2. Click Trigger to run the workflow.

    hashtag
    Request Access for an Identity

    Requests Access allows for additional or temporary access grants, particularly when a user’s current access is insufficient for their duties.

    Use the Request Access option in the Identity Details view to grant access to a specific user while reviewing their detailed information. You can grant access to the user through the following:

    Access Profiles option

    A collection of entitlements that are granted as part of the user’s identity lifecycle requirements. Access Profiles can:

    • Define reusable collections of entitlements across multiple target systems by business roles, departments, or functions

    • Automate consistent access provisioning

    • Manage access profile types and their capabilities

    See Access Profile and Access Profile Types for more information.

    To grant an Access Profile, perform the following:

    1. Click the Access Profile radio button.

    2. The Choose from Access Profile window appears.

    3. Enter a Reason for granting the Access Profile for the user.

    4. Select an existing Access Profile from the dropdown menu.

    5. Enter an Expiration Time in Hours or Days.

    App option

    An App refers to a target system, where user access is provisioned or deprovisioned as part of the identity lifecycle process.

    To grant an App, perform the following:

    1. Click the Access Profile radio button.

    2. The Request Grant Access window appears.

    3. Enter a Reason for granting the App for the user.

    4. Select an existing Integration from the dropdown menu.

    5. Use the arrows to select an Expiration Time in Days, where 0 means no expiration.

    6. Click Create.

    Entitlements option

    Granting Entitlements to a user provides specific access permissions (roles, permissions, group memberships) required to perform their responsibilities.

    Note: By granting Entitlements to a specific user, you pre-fill an Access Request with the appropriate configuration settings and policy.

    To grant an Entitlement, perform the following:

    1. Click the Entitlements radio button.

    2. The Request Grant Access window appears.

    3. Enter a Reason for granting the Entitlement for the user.

    4. Select an existing Integration from the dropdown menu.

    5. Based on the integration you selected, the Target Entity Type is automatically populated.

    6. Use the arrows to select a Target Entitlement.

    7. Use the arrows to select an Expiration Time in Days, where 0 means no expiration.

    8. Click Create.

    hashtag
    Show in Graph

    Use the Show in Graph option to display a graph that represents all assigned Access Profiles, Apps, and Entitlements, including all associations.

    This is a graphical representation of John Smith’s assigned access and entitlements to roles/groups.

    Graph Example
    NHI Security > Lifecycle Management for NHI

    Property Overrides

    Shows "Yes" if identity has custom attribute overrides

    Identifies identities with manual attribute modifications (overriding attributes from your SOI )

    Department

    Organizational department from SOI

    Used for access assignment and reporting

    Policy

    Associated Lifecycle Management policy

    Links identity to a specific Lifecycle Management workflow

    Access Profiles

    Assigned Access Profiles with counts

    Shows current access assignments

    Last Changed at

    Timestamp of the most recent update

    Tracks synchronization and change activity

    Workflows

    Associated Lifecycle Management workflow name

    Identifies which policy workflow manages the identity

    Active

    Active

    Primary source (default)

    Inactive

    Inactive

    Primary source (default)

    Synced Relationships

    Target relationship bindings (such as group memberships) that Lifecycle Management has established for this identity.

    03/15/2024

    US date format

    Entitlement: Select "Microsoft 365 E3" (or your specific SKU)

    ENTERPRISEPREMIUM

    Microsoft 365 E5

    Contractor

    Any

    O365_BUSINESS_ESSENTIALS

    Microsoft 365 Business Basic

    mail_nickname

    {username}

    Yes

    first_name

    {first_name}

    Yes

    last_name

    {last_name}

    Yes

    department

    {department}

    Yes

    job_title

    {job_title}

    Yes

    usage_location

    US

    Yes

    hire_date

    {hire_date | DATE_FORMAT, "2006-01-02"}

    2006-01-02

    2024-03-15

    ISO date only

    2006-01-02T15:04:05Z07:00

    2024-03-15T09:30:00-07:00

    Full ISO 8601 with timezone

    Microsoft 365 Business Basic

    O365_BUSINESS_ESSENTIALS

    Contractors

    Attribute Transformers
    Actions
    Attribute Transformers
    Activity Log

    01/02/2006

    Last Name

    Employee's last name.

    Preferred Name

    Employee's preferred first name.

    Display Full Name

    Full name for display; includes preferred first name if available.

    Canonical Name

    Employee's canonical name.

    Username

    Username as shown in the integration UI.

    Email

    Employee's work email (unique).

    IDP ID

    ID for connecting to the destination IDP provider.

    Personal Email

    Employee's personal email.

    Home Location

    Employee's home location.

    Work Location

    Employee's work location.

    Cost Center

    Cost center ID associated with the employee.

    Department

    Department ID (Group ID) of the employee.

    Managers

    List of employee IDs of the employee's managers.

    Groups

    List of group IDs the employee is associated with.

    Employment Status

    Employment status, e.g., ACTIVE, PENDING, or INACTIVE.

    Is Active

    Indicates if the employee is active.

    Start Date

    The date the employee started working.

    Termination Date

    Employee's termination date, if applicable.

    Job Title

    Employee's job title.

    Employment Types

    Type of employment, e.g., FULL_TIME, PART_TIME, INTERN, CONTRACTOR, or FREELANCE.

    Primary Time Zone

    Employee's primary time zone.

    Azure Helpdesk Role

    Azure

    Helpdesk Administrator (Azure AD Role)

    Google China Employees

    Google Cloud

    Google China Employees (Google Group)

    user_principal_name

    username

    {username}@evergreentrucks.com

    email

    username

    {username}@evergreentrucks.com

    display_name

    display_full_name

    {display_full_name}

    given_name

    first_name

    {first_name}

    sur_name

    last_name

    {last_name}

    country_code

    work_location

    {work_location}

    job_title

    job_title

    {job_title}

    primary_group_dn

    -

    CN=Domain Users,CN=Users,DC=evergreentrucks,DC=local

    primary_group_dn

    -

    CN=Terminated Users,OU=Evergreen Groups,DC=evergreentrucks,DC=local

    integrations
    Custom HRIS template
    CSV upload
    Actions
    Integrations
    Business Role

    Integrations

    Overview of supported provisioning integrations in Veza, with capabilities and supported actions for target applications and sources of identity.

    hashtag
    Overview

    This page covers the integrations that power Lifecycle Management workflows and can act as identity sources for LCM policies, and target applications that can be provisioned or deprovisioned.

    Enabling provisioning on an integration also makes it available to other Veza products that use write-back capabilities, including Access Intelligence (Disable Accounts) and Access Requests. The integration tables below represent the validated, production-ready set for Lifecycle Management specifically.

    Veza supports three primary implementation pathways:

    Native Integrations: Direct API-based provisioning with out-of-the-box support (see validated integrations below)

  • SCIM 2.0 Protocol: Standards-based provisioning for any SCIM-compliant application

  • OAA Write Framework: Veza's Open Authorization API (OAA) extends write-back support to applications not natively integrated with the Veza platform

  • This architecture means that nearly any existing Veza integration can be enabled for provisioning. The validated integrations listed below represent tested, production-ready configurations. For additional integration support, contact your Customer Success Manager.

    hashtag
    Supported Integrations

    hashtag
    Identity Sources

    Identity sources are authoritative systems that provide information about user identities. While Veza does not require write permissions to the identity source of truth, some of these integrations are also supported as provisioning targets. Integrations can also allow write-back of a user's newly created email address to the user's record in the source of identity as part of the initial provisioning workflow.

    Veza supports leading HR systems, IDPs and directory services, ITSM platforms, payroll systems, custom applications, and flat files:

    Identity Source
    Supported Entity Types
    Notes

    ActiveDirectoryUser

    CustomHRISEmployee

    hashtag
    Target Application Support

    The following integrations are validated as provisioning targets for Lifecycle Management workflows. Enabling provisioning on an integration enables actions (create, sync, deprovision, manage relationships) that can be triggered from LCM policies and from other Veza products.

    Validated Integrations

    The following table lists the out-of-the-box, Veza-validated target application integrations.

    Target Application
    Manage Relationships
    Sync Identities
    Deprovision Identity
    Additional Actions
    Supported Entitlement Types
    Notes

    ✅

    ✅

    Other Supported Integrations

    For any Veza-supported application not listed above, contact your Customer Success Manager for more details on how to enable the specific Veza integration for use with provisioning as a target application for provisioning and de-provisioning.

    Custom REST Actions

    Veza provisioning supports Custom REST Actions that enable HTTP requests to external APIs and services as part of automated workflows. This action type provides integration with custom applications, webhooks, and any REST-based service that supports identity management operations.

    Custom REST Actions extend provisioning support to virtually any system with an accessible API, enabling use cases such as triggering custom workflows, notifying external systems, or coordinating provisioning sequences across multiple downstream applications.

    hashtag
    Configuring Integrations for Provisioning

    hashtag
    Insight Points for provisioning

    An Insight Point is required to enable provisioning operations and identity discovery for systems that Veza cannot access directly, such as an on-premises application server behind a firewall. The Insight Point is a lightweight connector that runs in your environment, enabling secure gathering and processing of authorization metadata for provisioning tasks.

    A Veza Insight Point is typically deployed as a Docker container or VM OVA, running within your network for metadata discovery and provisioning job execution. This ensures secure communication between your environment and Veza.

    For deployment instructions, refer to the Insight Point Documentation.

    hashtag
    Scheduled and Manual Extractions

    You can configure extraction intervals for your integrations to ensure data is regularly updated for provisioning workflows.

    1. Go to Veza Administration > System Settings

    2. In the Pipeline > Extraction Interval section, set the global extraction interval

    3. To override the global setting for specific integrations, use the Active Overrides section

    Available extraction intervals are:

    • Auto (hourly, but may take longer when the extraction pipeline is full)

    • 15 Minutes

    • 1 Hour

    • 6 Hours

    • 12 Hours

    • 1 Day

    • 2 Days

    • 3 Days

    • 7 Days

    • 30 Days

    To manually trigger an extraction:

    1. Go to Integrations > All Data Sources

    2. Search for the desired data source

    3. Select Actions > Start Extraction

    Note: Custom application payloads are extracted after the payload is pushed to Veza using the Open Authorization API.

    hashtag
    Enabling provisioning

    To enable provisioning for a specific integration:

    1. Open the Integrations page (in the Featured section of the navigation sidebar), or Lifecycle Management > Integrations (in the Products section).

    2. Search for the integration you want to enable and open its settings.

    3. Check the Enable usage for Provisioning checkbox, then click Save Configuration.

    The Edit Integration panel showing the Enable usage for Provisioning checkbox

    After saving, the integration shows Enabled in the Lifecycle Management column on the Integrations overview.

    The Integrations overview showing Lifecycle Management Enabled for configured integrations

    hashtag
    Checking provisioning data sources

    To verify the health of the provisioning data source:

    1. Open Lifecycle Management > Integrations (in the Products section of the navigation sidebar), or the main Integrations page (in the Featured section)

    2. Search for the integration and click the name to view details

    3. In the Properties panel, click the magnifying glass icon under Lifecycle Management Enabled

    hashtag
    Best practices for identity sources

    hashtag
    API rate limits

    Many identity source systems have API rate limits that can affect extraction timing. Avoid forcing repeated extractions within short time windows (typically 5 minutes) to prevent API errors that delay workflow execution.

    hashtag
    Custom field management

    For systems using custom or user-defined fields (UDFs), maintain clear documentation of:

    • Field purpose and mapping

    • Expected data formats and validation rules

    • Which fields are used in workflow trigger conditions

    This documentation ensures consistency when fields are added or modified.

    hashtag
    Data retention policies

    Understand the data retention policies of your identity sources, particularly for terminated employees or contractors. Some systems retain terminated records for limited periods (e.g., 90 days), which affects leaver workflow design. Plan workflow timing to ensure LCM can process records before they're purged from the source system.

    hashtag
    Critical field changes

    Changes to core identity fields can break LCM workflows. Coordinate with system administrators before modifying:

    • Unique identifiers (employee ID, username)

    • Employment status fields

    • Date fields (hire date, termination date)

    • Location or department identifiers

    • Any fields used in workflow trigger conditions

    Communicate planned changes in advance and test in sandbox environments before applying to production identity sources.

    hashtag
    Additional Resources

    For more information:

    • Refer to individual integration documentation for detailed provisioning capabilities

    • Consult the Veza documentation for troubleshooting and best practices

    • Contact Veza support for assistance with enabling or configuring provisioning for your integrations

    Trigger Conditions Reference

    Complete reference for SCIM filter syntax used in Lifecycle Management workflow trigger conditions

    This page provides a comprehensive reference for the SCIM filter syntax used in Lifecycle Management workflow trigger conditions. Trigger conditions determine when a workflow action should execute based on identity attributes.

    hashtag
    SCIM Filter Syntax Overview

    SCIM (System for Cross-domain Identity Management) filter syntax provides a standardized way to express conditions. The basic structure is:

    For example:

    Dynamic Access Profiles

    Use attribute formatters to dynamically select Access Profiles at runtime based on user attributes

    hashtag
    Overview

    Dynamic Access Profiles enable context-aware provisioning by enabling the Manage Relationships action to resolve Access Profile names at runtime using user attributes.

    Instead of explicitly selecting static Access Profiles when configuring a workflow, you can use attribute formatter expressions that evaluate to Access Profile names dynamically when the workflow executes. This is particularly valuable for organizations with complex access patterns based on attributes like department, location, role, or business unit.

    This feature eliminates the need for separate workflow conditions for each profile combination, supporting configurations where a single workflow provisions users to different Access Profiles based on their identity attributes.

    Coupa CCW

    CustomHRISEmployee

    Custom IDP

    CustomIDPUser

    Custom HRIS (OAA)

    CustomHRISEmployee

    HiBob

    CustomHRISEmployee

    Supports email write-back

    LDAP

    LDAP user

    Ivanti Neurons HR

    CustomHRISEmployee

    Azure AD

    AzureADUser

    Google Workspace

    GoogleWorkspaceUser

    Okta

    OktaUser

    Oracle HCM

    OAA.Oracle HCM.HRISEmployee

    Supports email write-back

    ServiceNow

    ServiceNowUser

    UKGPro

    CustomHRISEmployee

    Workday

    WorkdayWorker

    Supports email write-back

    ✅

    Reset Password, Create Entitlements, Delete Identity

    ActiveDirectoryGroup

    -

    Atlassian Cloud

    ✅

    ✅

    ✅

    Delete Identity

    AtlassianCloudAdminGroup

    -

    AWS SSO

    ✅

    ✅

    ✅

    Create Entitlement

    AwsSsoGroup

    -

    Azure

    ✅

    ✅

    ✅

    Reset Password, Create & Manage Email, Create Entitlement

    AzureADGroup, AzureADRole, ExchangeOnlineDistributionGroup, AzureADLicense

    Email management includes mailbox configuration (size limits, quotas, auditing) and client access settings (OWA, ActiveSync, MAPI, POP, IMAP)

    Custom Application (OAA Template)

    ✅

    ✅

    ✅

    Delete Identity

    ApplicationGroup, ApplicationRole

    -

    Exchange Server

    ❌

    ❌

    ❌

    Create Email

    -

    -

    GitHub

    ✅

    ✅

    ✅

    Delete Identity

    GithubOrganization, GithubTeam

    -

    LDAP

    ✅

    ✅

    ✅

    Create Entitlement, Delete Identity

    LDAP group

    Includes Red Hat Identity Manager and FreeIPA

    Google Workspace (Google Cloud)

    ✅

    ✅

    ✅

    -

    GoogleWorkspaceGroup

    -

    MySQL

    ✅

    ✅

    ✅

    Delete Identity

    MySQLRoleInstance

    -

    Okta

    ✅

    ✅

    ✅

    Reset Password, Create Entitlement, Delete Identity

    OktaGroup

    Supports two deprovision types: SUSPENDED (temporary) and DISABLED (permanent deactivation)

    Oracle Database

    ✅

    ✅

    ✅

    Delete Identity

    OracleDBRole

    -

    Oracle Fusion Cloud

    ✅

    ✅

    ✅

    Delete Identity

    OracleRole

    -

    Oracle HCM

    ❌

    ✅

    ❌

    -

    -

    -

    PagerDuty

    ✅

    ✅

    ❌

    Delete Identity

    PagerDutyTeam

    Platform does not support user deactivation; use Delete Identity instead

    PostgreSQL

    ✅

    ✅

    ✅

    Delete Identity

    PostgreSQLGroup

    -

    Salesforce

    ✅

    ✅

    ✅

    -

    SalesforceGroup, SalesforcePermissionSet, SalesforcePermissionSetGroup, SalesforceProfile, SalesforceUserRole

    -

    SAP ECC

    ✅

    ✅

    ✅

    -

    SapEccRole

    Manage Relationships supports role assignment only (revocation is not supported)

    SCIM

    ✅

    ✅

    ✅

    Delete Identity

    SCIMGroup

    -

    ServiceNow

    ❌

    ❌

    ❌

    Custom Action

    -

    -

    Snowflake

    ✅

    ✅

    ✅

    -

    SnowflakeRole

    -

    Splunk Enterprise

    ✅

    ✅

    ❌

    Delete Identity

    SplunkEnterpriseRole

    Platform does not support user deactivation; use Delete Identity instead

    Workday

    ✅

    ✅

    ❌

    -

    WorkdaySecurityGroup

    -

    Veza

    ✅

    ✅

    ✅

    -

    VezaRoleBinding, VezaAccessProfile, VezaGroup

    -

    Active Directory
    Beeline
    Active Directory
    spinner
    spinner
    spinner
    spinner
    This condition evaluates to true when the identity's department attribute equals "Engineering".

    hashtag
    Comparison Operators

    hashtag
    String Operators

    Operator
    Name
    Description
    Example

    eq

    Equal

    Exact match (case-sensitive)

    department eq "Sales"

    ne

    Not Equal

    hashtag
    Numeric Operators

    Operator
    Name
    Description
    Example

    eq

    Equal

    Exact numeric match

    department_code eq 100

    ne

    Not Equal

    hashtag
    Boolean Operators

    Operator
    Name
    Description
    Example

    eq

    Equal

    Boolean match

    is_active eq true

    ne

    Not Equal

    hashtag
    Timestamp Operators

    Timestamp comparisons use ISO 8601 format (YYYY-MM-DDTHH:MM:SSZ).

    Operator
    Name
    Description
    Example

    eq

    Equal

    Exact timestamp match

    hire_date eq "2024-01-15T00:00:00Z"

    lt

    Before

    hashtag
    String List Operators

    For attributes that contain multiple values (arrays), the following operators are supported:

    Operator
    Name
    Description
    Example

    co

    Contains

    List contains a specific value

    employee_types co "Full Time"

    eq

    Equal

    circle-info

    The co operator is most commonly used for checking membership in a list. Use eq for exact list matching and pr to verify the attribute has any values.

    hashtag
    Logical Operators

    Combine multiple conditions using logical operators.

    Operator
    Description
    Example

    and

    Both conditions must be true

    is_active eq true and department eq "IT"

    or

    Either condition must be true

    department eq "IT" or department eq "Engineering"

    circle-info

    The not() operator uses parenthetical notation. For simple negation of a single value, prefer using ne (not equals) which has broader support across all condition contexts.

    circle-exclamation

    Limitation: The not() operator may not be fully supported in all LCM trigger condition contexts. If you encounter unexpected behavior with not(), rewrite the condition using ne or restructure the logic. For example, instead of not(status eq "Active"), use status ne "Active".

    hashtag
    Precedence

    • not has the highest precedence

    • and has higher precedence than or

    • Use parentheses () to control evaluation order

    Example combining operators:

    hashtag
    Common Trigger Condition Patterns

    hashtag
    Joiner Scenarios

    hashtag
    Mover Scenarios

    Two system attributes support mover detection:

    • sys_attr__is_mover: Set to true when any property in the policy's Mover Properties list changes. Indicates that the identity changed, but does not identify which property changed.

    • sys_attr_changed__<property>: Set to true for each specific property that changed in the most recent extraction. These attributes are transient and are cleared at the start of each extraction cycle.

    Use sys_attr__is_mover when you want to trigger on any mover event. Use sys_attr_changed__<property> when you need to trigger only on specific property changes or combinations.

    Broad mover detection with sys_attr__is_mover:

    Targeted mover detection with sys_attr_changed__:

    See System Attributes for the full sys_attr_changed__ reference.

    hashtag
    Leaver Scenarios

    hashtag
    Attribute-Based Access Control

    hashtag
    System Attributes in Conditions

    Lifecycle Management provides two families of computed system attributes for use in trigger conditions:

    • sys_attr__ prefix: Persistent boolean flags such as sys_attr__is_mover (any monitored property changed) and sys_attr__is_new_identity (first appearance of an identity).

    • sys_attr_changed__ prefix: Per-property change detection attributes, transient per extraction cycle. sys_attr_changed__department eq true means department changed in the most recent extraction.

    See System Attributes for the complete reference.

    hashtag
    Dynamic Value Comparisons with Embedded Transformers

    For time-sensitive workflows, you can embed transformer functions directly in condition values. This enables comparisons against dynamically-computed dates and times rather than static values.

    hashtag
    Syntax

    Embedded transformers use the {| FUNCTION | ...} syntax. The pipe (|) immediately after the opening brace indicates there is no source attribute—the expression starts directly with a function:

    This differs from attribute transformers where you reference an attribute first:

    • Attribute transformer: {hire_date | DATE_FORMAT, "DateOnly"} (starts with attribute)

    • Embedded in condition: {| NOW | DATE_FORMAT, "DateOnly"} (starts with function)

    hashtag
    Common Functions for Dynamic Conditions

    Function
    Purpose
    Example

    NOW

    Current UTC timestamp

    `{

    UTC_TO_TIME_ZONE

    Convert to specific timezone

    `{

    See Transformer Reference for all available functions.

    hashtag
    Example: 2-Day Leaver Window

    Trigger a leaver workflow when an employee's last day of work falls within a 2-day window around today (Eastern Standard Time):

    Breaking down the embedded transformer:

    Step
    Function
    Input
    Output

    1

    NOW

    (none)

    Current UTC timestamp

    2

    UTC_TO_TIME_ZONE, "-05:00"

    Result: The workflow triggers when:

    • The employee is active (is_active eq true)

    • Their last day is today or earlier (le today)

    • Their last day is after 2 days ago (gt 2 days ago)

    This creates a 2-day processing window for departing employees.

    hashtag
    Example: Pre-Hire Provisioning

    Trigger a joiner workflow 7 days before an employee's start date:

    This triggers for employees whose hire date is within the next 7 days, enabling pre-provisioning of accounts before their start date.

    hashtag
    Example: Post-Termination Cleanup

    Trigger a cleanup workflow for employees terminated more than 30 days ago:

    circle-exclamation

    Escaping quotes: When embedding transformers in conditions, you must escape inner quotes with backslashes. For example: \"-05:00\" and \"DateOnly\".

    circle-info

    Timezone consideration: Use UTC_TO_TIME_ZONE to ensure date comparisons align with your organization's business timezone. Without timezone conversion, comparisons use UTC which may cause workflows to trigger at unexpected times.

    hashtag
    Related Documentation

    For a conceptual overview of how conditions and transformers work together, see Understanding Conditions and Transformers.

    hashtag
    Best Practices

    hashtag
    Use Specific Conditions

    hashtag
    Test with Dry Run

    Before enabling a policy, use the Dry Run feature to preview which identities match your trigger conditions. This helps catch overly broad or restrictive conditions before they affect real accounts.

    hashtag
    Combine Conditions Thoughtfully

    hashtag
    Handle Edge Cases

    Consider what happens when attributes are null or empty:

    hashtag
    Troubleshooting

    hashtag
    Condition Not Matching Expected Users

    1. Check attribute names: Ensure the attribute name exactly matches the source attribute (case-sensitive)

    2. Verify data types: String values need quotes, booleans don't

    3. Review operator choice: co for contains vs. eq for exact match

    4. Use Dry Run: Test the condition against specific identities

    hashtag
    Condition Matching Too Many Users

    1. Add specificity: Combine multiple conditions with and

    2. Check for broad patterns: co "" matches all non-null values

    3. Verify logical grouping: Ensure and/or precedence is correct

    hashtag
    Timestamp Issues

    1. Use ISO 8601 format: YYYY-MM-DDTHH:MM:SSZ

    2. Include timezone: Always use Z suffix for UTC

    3. Check attribute type: Ensure the source attribute is a timestamp, not a string

    hashtag
    Related Topics

    • Understanding Conditions and Transformers - Conceptual overview of conditions vs. transformers

    • Policies - Create and configure Lifecycle Management policies

    • Conditions and Actions - Configure workflow actions and their triggers

    • - Transform attribute values using formatter syntax

    • - Complete list of transformation functions

    • - Available system attributes for conditions

    • - Formatter-based profile assignment

    • - Map source attributes to target attributes

    <attribute> <operator> <value>
    department eq "Engineering"
    # Full-time employees in Engineering or IT departments
    employee_types co "Full Time" and (department eq "Engineering" or department eq "IT")
    # New full-time employees in specific departments
    employee_types co "Full Time" and (department eq "Engineering" or department eq "Sales")
    
    # New hires with specific job levels
    is_active eq true and job_level ge 3 and hire_date gt "2024-01-01T00:00:00Z"
    
    # Contractors starting in a specific region
    is_contractor eq true and location sw "US-"
    # Any change in monitored properties for active employees
    sys_attr__is_mover eq true and is_active eq true
    
    # Department-specific mover handling (identity moved AND is now in Engineering)
    sys_attr__is_mover eq true and department eq "Engineering"
    
    # Mover detection combined with employment type
    sys_attr__is_mover eq true and is_active eq true and employee_types co "Full Time"
    # Triggers only when department changes TO Sales (not when Sales employees change other attributes)
    department_name eq "Sales" and sys_attr_changed__department_name eq true
    
    # Triggers when manager changes for active employees in specific departments
    sys_attr_changed__managers eq true and employment_status eq "ACTIVE" and (department_name eq "Engineering" or department_name eq "Marketing" or department_name eq "Sales")
    
    # Triggers when any of several properties change
    (sys_attr_changed__department_name eq true or sys_attr_changed__job_title eq true or sys_attr_changed__managers eq true) and employment_status eq "ACTIVE"
    
    # Triggers only when BOTH a location field AND manager change in the same extraction
    (sys_attr_changed__customprop_management_chain_level_03 eq true or sys_attr_changed__customprop_management_chain_level_04 eq true) and sys_attr_changed__managers eq true
    # Terminated employees
    employment_status eq "Terminated"
    
    # Inactive contractors
    is_active eq false and is_contractor eq true
    
    # Users with imminent termination date
    termination_date le "2024-12-31T23:59:59Z" and termination_date gt "2024-01-01T00:00:00Z"
    # High-privilege access for senior engineers
    department eq "Engineering" and job_level ge 5 and is_active eq true
    
    # Region-specific access
    location sw "EMEA-" and employee_types co "Full Time"
    
    # Cost center based provisioning
    cost_center eq "CC-1000" and is_active eq true
    {| NOW | UTC_TO_TIME_ZONE, "-05:00" | DATE_FORMAT, "DateOnly"}
    is_active eq true
    and customprop_lastdayofwork le "{| NOW | UTC_TO_TIME_ZONE, \"-05:00\" | DATE_ADJUST_DAY, 0 | DATE_FORMAT, \"DateOnly\"}"
    and customprop_lastdayofwork gt "{| NOW | UTC_TO_TIME_ZONE, \"-05:00\" | DATE_ADJUST_DAY, -2 | DATE_FORMAT, \"DateOnly\"}"
    is_active eq false
    and hire_date le "{| NOW | DATE_ADJUST_DAY, 7 | DATE_FORMAT, \"DateOnly\"}"
    and hire_date gt "{| NOW | DATE_FORMAT, \"DateOnly\"}"
    employment_status eq "Terminated"
    and termination_date lt "{| NOW | DATE_ADJUST_DAY, -30 | DATE_FORMAT, \"DateOnly\"}"
    # Good: Specific and targeted
    department eq "Engineering" and job_level ge 3 and is_active eq true
    
    # Avoid: Too broad, may affect unintended users
    department eq "Engineering"
    # Use parentheses for clarity when mixing and/or
    (department eq "IT" or department eq "Engineering") and is_active eq true
    
    # Without parentheses, this evaluates differently due to precedence:
    # department eq "IT" or (department eq "Engineering" and is_active eq true)
    department eq "IT" or department eq "Engineering" and is_active eq true
    # Explicit check for non-empty department
    department ne "" and department eq "Engineering"
    
    # Check for active status before other conditions
    is_active eq true and department eq "Engineering"
    circle-info

    Terminology: Dynamic Access Profiles use formatter syntax—the same template syntax used in attribute transformers. A formatter is a template string like {department | LOWER} that constructs a value from identity attributes. See Understanding Conditions and Transformers for more context.

    hashtag
    How It Works

    hashtag
    Runtime Resolution Process

    When a Lifecycle Management workflow runs with dynamic Access Profiles configured:

    1. Attribute Evaluation: The system evaluates each dynamic Access Profile formatter expression using the identity's attributes. For example, if the expression is dept-{department | LOWER} and the user's department attribute is Engineering, the system evaluates this to dept-engineering.

    2. Name Resolution: The evaluated expression produces an Access Profile name.

      Access Profiles must be named using a predictable, consistent pattern to facilitate resolution. Without consistent naming conventions, dynamic profile resolution will fail to match existing profiles.

    3. Profile Lookup: Veza looks up an Access Profile with that exact name

    4. Profile Application: If the profile exists in the RUNNING state, its entitlements are applied. Resolved profiles can contain entitlements across multiple target integrations, and dynamically resolved profiles can inherit entitlements from other profiles.

    5. Graceful Continuation: If the profile name doesn't resolve or doesn't exist, Veza logs the issue to the Activity Log and continues processing any other Access Profiles. This is the default behavior and ensures missing or non-existent profiles don't cause the entire workflow to fail.

    circle-info

    Failure Handling: Dynamic Access Profile resolution failures do not stop workflow execution. When a profile cannot be resolved or doesn't exist, the system logs "Dynamic access profile not found" to the Activity Log and continues processing other profiles. This prevents a single missing profile from blocking all access provisioning.

    hashtag
    Key Characteristics

    • Name-based Lookup: Dynamic Access Profiles resolve to profile NAMES, not IDs

    • Naming Convention Critical: Access Profiles must be named using a predictable, consistent pattern

    • Profile Inheritance Support: Dynamically resolved profiles can inherit entitlements from other profiles

    • Multi-Integration Support: Resolved profiles can contain entitlements across multiple target integrations

    • Graceful Failure: By default, missing or non-existent profiles don't cause the entire workflow to fail

    Dynamic and static Access Profiles can be used together in the same action.

    hashtag
    Comparison: Static vs. Dynamic Access Profiles

    Aspect
    Static Access Profiles
    Dynamic Access Profiles

    Selection Time

    Policy configuration time

    Workflow execution time

    Identifier Type

    Access Profile ID

    Access Profile name (resolved from expression)

    hashtag
    Configuration

    hashtag
    Prerequisites

    Before configuring Dynamic Access Profiles:

    1. Create Access Profiles following a consistent naming convention that includes attribute values

    2. Identify User Attributes that will drive profile selection (e.g., department, location, role)

    3. Plan Naming Pattern that incorporates these attributes predictably

    hashtag
    Configuring Dynamic Access Profiles

    1. Navigate to Lifecycle Management > Policies

    2. Create or edit a policy

    3. Add or edit a Manage Relationships action

    4. In the Dynamic Access Profiles section:

      • Click Add Profile Name to add a new dynamic profile expression

      • Enter an attribute formatter expression that evaluates to an Access Profile name

      • Use the autocomplete to reference available attributes

    hashtag
    Formatter Expression Syntax

    Dynamic Access Profile expressions use the attribute formatter syntax:

    Common Patterns include:

    • {department} - Direct attribute value

    • {department | LOWER} - Convert attribute value to lowercase

    • {OAA.Secondary.Employee.department} - Attribute from a secondary source of identity

    • TEAM-{department}-{businessUnitCode} - Multiple attributes combined with static text

    • {location | UPPER}-{role | LOWER} - Multiple attributes with different formatters

    You can configure multiple dynamic Access Profile expressions in a single action by clicking Add Profile Name for each additional expression. Each expression is evaluated independently.

    hashtag
    Conditional Profile Selection with IF/ELSE

    You can use IF/ELSE conditional logic within a Dynamic Access Profile expression to select different profile names based on user attributes. This allows a single expression to evaluate to different Access Profile names depending on the identity's properties.

    Syntax:

    You can use multiple ELSE IF branches to check several conditions in sequence:

    circle-check

    Multi-Branch Expressions Work in a Single Field

    A single IF/ELSE IF/ELSE block with multiple branches is one expression and works perfectly in one Access Profile Name field. The expression evaluates conditions top-to-bottom and returns the first matching profile name.

    Example: Department-Based Profile Selection

    IF customprop_custom_department eq "Legal"
      Legal Department
    ELSE IF customprop_custom_department eq "Mergers and Acquisitions"
      M&A Department
    ELSE IF customprop_custom_department eq "Information Technology"
      Information Technology Department
    ELSE
      No_Profile_Selected

    This single expression handles four different outcomes in one field—no need for multiple fields.

    Supported Comparison Operators:

    Operator
    Meaning
    Example

    eq

    Equals

    department eq "Engineering"

    ne

    Not equals

    status ne "Terminated"

    Combine conditions with and, or, or negate with not. Use parentheses to group complex conditions.

    circle-exclamation

    When Multiple Fields Are Required

    Use separate Access Profile Name fields only when you need to assign multiple independent profiles to the same user. Each field can contain one complete IF/ELSE expression.

    This requires two separate fields (assigning profiles based on TWO independent criteria):

    Access Profile Name (Field 1)
    Access Profile Name (Field 2)

    Department-based profile

    Location-based profile

    circle-exclamation

    This does NOT require multiple fields (one criterion with multiple outcomes):

    IF department eq "Sales"
      SalesProfile
    ELSE IF department eq "Engineering"
      EngineeringProfile
    ELSE
      DefaultProfile
    triangle-exclamation

    Error: Cannot Stack Separate IF Blocks

    Placing two separate IF/ELSE blocks in the same field causes the error "ELSE statement has to be last". This happens because the parser sees a second IF keyword after an ELSE statement.

    Incorrect (two separate IF blocks in one field):

    Correct approaches:

    1. For multiple outcomes from the same criterion, use ELSE IF branches:

    2. For independent criteria, use separate Access Profile Name fields (click Add Profile Name).

    Example: Complex Conditions with Logical Operators

    This expression assigns the SalesforceAdmins profile to users who meet the complex department/role criteria, and No_Profile_Selected (a placeholder that resolves to no profile) for everyone else.

    Using No_Profile_Selected as a Fallback

    When using IF/ELSE logic, the ELSE branch must provide a value. If you don't want to assign a profile when conditions aren't met, use a placeholder name like No_Profile_Selected that doesn't match any actual Access Profile. The system will log that the profile wasn't found and continue processing other profiles gracefully.

    Example: Configuring three dynamic profiles for department, location, and role-based access:

    Access Profile Name

    `dept-{department

    `location-{location

    `role-{role

    In this configuration, the user receives entitlements from up to three Access Profiles based on their attributes. Each expression is added as a separate profile in the UI.

    hashtag
    Examples

    chevron-rightExample 1: Department-Based Access Profileshashtag

    Scenario: Provision users to department-specific Access Profiles based on their department attribute.

    Access Profile Setup:

    • Create Access Profiles named: access-profile-engineering, access-profile-sales, access-profile-qa

    • Each profile contains entitlements appropriate for that department

    Dynamic Access Profile Configuration:

    With this formatter prefix:

    Runtime Behavior:

    • User with department=Engineering → Access Profile access-profile-engineering

    • User with department=Sales → Access Profile access-profile-sales

    chevron-rightExample 2: Multi-Attribute Profile Selectionhashtag

    Scenario: Provision users based on both department and business unit for more granular access control.

    Access Profile Setup: Create Access Profiles with names combining department and business unit:

    • TEAM-Engineering-12345

    • TEAM-Engineering-67890

    • TEAM-Sales-12345

    • TEAM-QA-12345

    Dynamic Access Profile Configuration:

    Runtime Behavior:

    • User with department=Engineering and businessUnitCode=12345 → Access Profile TEAM-Engineering-12345

    • User with department=Sales and businessUnitCode=12345 → Access Profile TEAM-Sales-12345

    chevron-rightExample 3: Location and Role Combinationhashtag

    Scenario: Provision users based on geographic location and job role.

    Access Profile Setup:

    • US-manager

    • US-engineer

    • EMEA-manager

    • EMEA-engineer

    Dynamic Access Profile Configuration:

    Runtime Behavior:

    • User with location=us and role=Manager → Access Profile US-manager

    • User with location=emea and role=Engineer → Access Profile EMEA-engineer

    chevron-rightExample 4: Combining Static and Dynamic Profileshashtag

    Scenario: All employees get a base access profile, plus department-specific access.

    Manage Relationships Action Configuration:

    • Access Profiles (static): all-employees-base-access

    • Dynamic Access Profiles: dept-{department | LOWER}

    Runtime Behavior: Every user receives:

    1. Entitlements from all-employees-base-access (static)

    2. Entitlements from their department-specific profile (dynamic)

    chevron-rightExample 5: Secondary Node Attributeshashtag

    Scenario: Use attributes from a secondary identity source.

    Setup:

    • Primary identity: Okta User

    • Secondary identity: HRIS Employee record with department attribute

    Dynamic Access Profile Configuration:

    Runtime Behavior: The system evaluates the department attribute from the secondary HRIS Employee node, not the primary Okta User node.

    chevron-rightExample 6: Multi-Branch Department Selection (Single Field)hashtag

    Scenario: Assign different Access Profiles based on which department a user belongs to. Since this is one criterion with multiple possible outcomes, use a single expression with ELSE IF branches.

    Access Profile Setup:

    • Legal Department - For Legal department users

    • M&A Department - For Mergers and Acquisitions users

    • Information Technology Department - For IT users

    • (No actual profile named No_Profile_Selected exists)

    Dynamic Access Profile Configuration:

    This uses a single Access Profile Name field with multiple ELSE IF branches:

    Runtime Behavior:

    • User in Legal department → Receives Legal Department profile

    • User in M&A department → Receives M&A Department profile

    • User in IT department → Receives Information Technology Department profile

    circle-info

    This pattern is ideal when you have many possible values for a single attribute. You can add as many ELSE IF branches as needed—all within one field.

    chevron-rightExample 7: Independent Criteria (Multiple Fields Required)hashtag

    Scenario: Assign profiles based on TWO independent criteria—department membership AND user-specific overrides for testing. Since these are unrelated conditions that could both apply simultaneously, use separate fields.

    Access Profile Setup:

    • SalesforceAdmins - For finance/sales department users with Account Manager role

    • Salesforce User - For specific test users

    • (No actual profile named No_Profile_Selected exists)

    Dynamic Access Profile Configuration:

    This requires two separate Access Profile Name fields because you want to potentially assign both profiles to the same user. Click Add Profile Name to add the second field.

    Access Profile Name (Field 1) - Department/Role based:

    Access Profile Name (Field 2) - Test user override:

    Runtime Behavior:

    • User in Finance department with "Account Manager" title → Receives SalesforceAdmins profile

    • User with first_name "user04" → Receives Salesforce User profile

    • User meeting both conditions → Receives both profiles

    circle-exclamation

    When to use multiple fields: Use separate fields only when you need to assign multiple profiles independently. If you're selecting ONE profile from multiple options, use ELSE IF branches in a single field instead.

    hashtag
    Best Practices

    hashtag
    Naming Conventions

    Success with Dynamic Access Profiles depends on establishing consistent naming patterns for your Access Profiles:

    • Use clear delimiters: Choose hyphens or underscores consistently (e.g., dept-engineering for department-based profiles or TEAM-dept-bu for multi-attribute combinations)

    • Add prefixes to organize: Group profiles by category (e.g., dept-{department}, loc-{location}, TEAM-{dept}-{bu})

    • Handle case sensitivity: Profile names are case-sensitive. Use transformers like LOWER or UPPER in your expressions to normalize values, and document your chosen convention

    • Document your convention: Ensure all teams follow the same naming pattern

    hashtag
    Using IF/ELSE Conditionals

    • Use ELSE IF for related conditions: When selecting one profile from multiple options based on the same attribute (e.g., department), use a single IF/ELSE IF/ELSE expression with multiple branches—this keeps your configuration simple and readable

    • Use multiple fields for independent criteria: Only add separate Access Profile Name fields when you need to evaluate completely independent conditions (e.g., one profile based on department AND another based on location)

    • Use fallback placeholders: When a condition shouldn't assign a profile, use a non-existent name like No_Profile_Selected as the ELSE value—the system will gracefully skip it

    • Test complex conditions: Use the Test Formatter feature to validate your IF/ELSE logic before deploying to production

    hashtag
    Timing and Order

    • Create profiles before processing: Always create Access Profiles before running workflows that reference them

    • The system performs name lookups at runtime: If a profile doesn't exist, it will be skipped

    • Plan for new attribute values: When adding new departments, locations, or roles to your organization, remember to create their corresponding Access Profiles first to avoid provisioning gaps

    hashtag
    Validation and Monitoring

    Before deploying to production, validate your configuration using dry-run mode to confirm profiles resolve correctly and attribute values match profile names exactly. Monitor your Lifecycle Management logs for "Dynamic access profile not found" messages, which indicate naming mismatches or missing profiles.

    hashtag
    Troubleshooting

    Issue
    Cause
    Solution

    Profile not found in Activity Log

    Name mismatch or profile is PAUSED

    Check Activity Log for the exact resolved name; verify profile exists and is in RUNNING state

    Formatter fails to resolve

    Missing attribute or incorrect path

    Verify attribute exists on identity node; check secondary node paths exist

    hashtag
    See Also

    • Understanding Conditions and Transformers - Conceptual overview of the different evaluation systems

    • Access Profiles - Creating and managing Access Profiles

    • Manage Relationships Action - Configuring the Manage Relationships action

    • - Available formatters and syntax

    • - Policy configuration and workflows

    {attribute_path | formatter | formatter_2}
    IF <condition>
      <profile_name_if_true>
    ELSE
      <profile_name_if_false>
    IF <condition1>
      <profile_name_1>
    ELSE IF <condition2>
      <profile_name_2>
    ELSE IF <condition3>
      <profile_name_3>
    ELSE
      <default_profile_name>
    IF ((department eq "Finance") or (department eq "DigitalSales") or (department eq "FP&A") or (department eq "Fiscal Operations")) and (job_title eq "Account Manager")
      SalesforceAdmins
    ELSE
      No_Profile_Selected

    Does not match

    status ne "Terminated"

    co

    Contains

    Substring match

    email co "@company.com"

    sw

    Starts With

    Prefix match

    employee_id sw "EMP"

    ew

    Ends With

    Suffix match

    email ew "@company.com"

    pr

    Present

    Attribute exists and is not null

    manager_id pr

    Does not equal

    level ne 0

    lt

    Less Than

    Strictly less than

    access_level lt 5

    le

    Less Than or Equal

    Less than or equal to

    risk_score le 50

    gt

    Greater Than

    Strictly greater than

    tenure_months gt 12

    ge

    Greater Than or Equal

    Greater than or equal to

    salary_grade ge 3

    pr

    Present

    Attribute exists and is not null

    access_level pr

    Boolean inverse

    is_contractor ne true

    pr

    Present

    Attribute exists and is not null

    is_contractor pr

    Earlier than

    termination_date lt "2024-06-01T00:00:00Z"

    le

    At or Before

    At or earlier than

    start_date le "2024-12-31T23:59:59Z"

    gt

    After

    Later than

    hire_date gt "2023-01-01T00:00:00Z"

    ge

    At or After

    At or later than

    last_login ge "2024-01-01T00:00:00Z"

    pr

    Present

    Attribute exists and is not null

    termination_date pr

    List exactly matches value(s)

    roles eq "Admin"

    ne

    Not Equal

    List does not match value(s)

    tags ne "deprecated"

    pr

    Present

    Attribute exists and is not empty

    groups pr

    not

    Negates a condition

    not(status eq "Terminated")

    DATE_ADJUST_DAY

    Add/subtract days

    `{

    DATE_FORMAT

    Format for comparison

    `{

    UTC timestamp

    Eastern time timestamp

    3

    DATE_ADJUST_DAY, 0

    EST timestamp

    Today (or -2 for 2 days ago)

    4

    DATE_FORMAT, "DateOnly"

    Adjusted timestamp

    Date string for comparison

    Attribute Transformers
    Transformer Reference
    System Attributes
    Dynamic Access Profiles
    Attribute Mapping
    Add multiple dynamic profile expressions as needed
    User with department=QA → Access Profile access-profile-qa

    User with department=QA and businessUnitCode=12345 → Access Profile TEAM-QA-12345

    User in any other department → No profile assigned (resolves to non-existent No_Profile_Selected)

    User meeting neither condition → No profiles assigned (both resolve to non-existent No_Profile_Selected)

    Validation

    Profile existence validated when saving policy

    Expression syntax validated when saving policy; profile existence checked at runtime

    Flexibility

    Fixed set of profiles

    Adapts based on user attributes

    Use Case

    Universal access for all users in a workflow

    Conditional access based on attributes

    Scalability

    Requires separate conditions for variations

    Single workflow handles all variations

    Failure Behavior

    Policy creation fails if profile doesn't exist

    Graceful continuation if profile doesn't exist

    co

    Contains

    groups co "Admins"

    sw

    Starts with

    location sw "US-"

    ew

    Ends with

    email ew "@company.com"

    gt

    Greater than

    employee_count gt 100

    ge

    Greater than or equal

    start_date ge "2024-01-01"

    lt

    Less than

    risk_score lt 50

    le

    Less than or equal

    level le 5

    Wrong profile applied

    Similar profile names

    Use distinctive naming patterns; avoid profile names that are substrings of others

    ELSE statement has to be last

    Two separate IF blocks in one field

    You cannot stack two separate IF/ELSE blocks in one field. Solution: Either combine related conditions using ELSE IF branches in a single expression (see Example 6), or use separate Access Profile Name fields for truly independent criteria (see Example 7).

    Attribute formatters
    Lifecycle Management Policies
    IF department eq "Sales"
      SalesProfile
    ELSE
      No_Profile_Selected
    
    IF location eq "US"
      USProfile
    ELSE
      No_Profile_Selected
    IF department eq "Sales"
      SalesProfile
    ELSE IF department eq "Engineering"
      EngineeringProfile
    ELSE
      No_Profile_Selected
    {department | LOWER}
    access-profile-{department | LOWER}
    TEAM-{department}-{businessUnitCode}
    {location | UPPER}-{role | LOWER}
    access-profile-{OAA.Secondary.Employee.department | LOWER}
    IF customprop_custom_department eq "Legal"
      Legal Department
    ELSE IF customprop_custom_department eq "Mergers and Acquisitions"
      M&A Department
    ELSE IF customprop_custom_department eq "Information Technology"
      Information Technology Department
    ELSE
      No_Profile_Selected
    IF ((department eq "Finance") or (department eq "DigitalSales") or (department eq "FP&A") or (department eq "Fiscal Operations")) and (job_title eq "Account Manager")
      SalesforceAdmins
    ELSE
      No_Profile_Selected
    IF first_name eq "user04"
      Salesforce User
    ELSE
      No_Profile_Selected

    Workday, Okta, and Active Directory

    Guide for implementing automated user lifecycle management across Workday, Okta, and Active Directory

    A well-designed identity Lifecycle Management solution automates the provisioning, synchronization of attributes and metadata, and deprovisioning of user accounts across your application and systems ecosystem.

    This guide demonstrates how to implement a worker (employees and contractors) Lifecycle Management solution using Workday as the source of identity with downstream user account provisioning and synchronization platforms of Okta and Active Directory (AD). This represents a common enterprise architecture where worker records originate in an HR system and are provisioned to identity and access management systems, while maintaining a seamless, secure, and compliant user lifecycle process.

    circle-info

    This guide uses Okta as the Identity Provider example, but the same architecture applies to any Veza-integrated IdP. You can substitute Azure AD, OneLogin, PingOne, or any other supported IdP in place of Okta throughout this guide.

    hashtag
    System Architecture

    The following diagram shows the complete identity provisioning and synchronization architecture from Workday, a human capital management platform, to Okta and Active Directory, which are identity management systems:

    The "Joiner Mover Leaver" (JML) process is a framework for managing users' employment lifecycle access within an organization. Provisioning access begins with onboarding new employees (Joiners), then managing internal transitions (Movers), and finally offboarding departing employees (Leavers).

    Lifecycle Management is based on the JML paradigm, where Workday is the authoritative source of identity, which is monitored for the status of the worker based on attributes in their record to determine whether the user is a joiner, mover, or leaver.

    hashtag
    JML Process Flow

    The joiner, mover, leaver (JML) process flows through the systems as follows:

    hashtag
    Prerequisites

    Before starting this implementation, ensure you have:

    1. Completed at least one successful extraction for each integration

    hashtag
    Implementation Steps

    hashtag
    Step 1: Define Access Profiles

    First, create Access Profiles that define which application entitlements a group of users will be assigned:

    1. Go to Lifecycle Management > Access Profiles

    2. Click Create Access Profile

    3. Configure a profile for each department or role:

    hashtag
    Example: Engineering Department Profile

    hashtag
    Example: Marketing Department Profile

    Create additional profiles as needed based on your organizational structure.

    hashtag
    Step 2: Create a Lifecycle Management Policy associated with Workday

    Next, create a Lifecycle Management policy using Workday as the source of identity:

    1. Navigate to Lifecycle Management > Policies

    2. Click Create Policy

    3. Configure the policy:

    hashtag
    Step 3: Configure Joiner Workflow

    Now add a workflow for new employee onboarding:

    1. Edit your Workday Employee Lifecycle policy

    2. Click Add Workflow

    3. Configure the workflow:

    hashtag
    Step 4: Configure Mover Workflow

    Add a workflow for handling employee role changes:

    1. Edit your Workday Employee Lifecycle policy

    2. Click Add Workflow

    3. Configure the workflow:

    hashtag
    Step 5: Configure Leaver Workflow

    Finally, add a workflow for employee termination:

    1. Edit your Workday Employee Lifecycle policy

    2. Click Add Workflow

    3. Configure the workflow:

    hashtag
    Step 6: Enable and Test the Policy

    After configuring your workflows for joiners, movers, and leavers, you can test your policy using Simulated Dry Runs to check the expected actions when executed.

    Another approach to test your policy is to create draft versions. You can make changes to your policy as an iterative draft until you are satisfied with the results. You can then publish the final version and enable it.

    As a final verification, make modifications to the Workday application to test your policy's expected performance. Ensure that the downstream applications, Okta and Active Directory, are correct with the modifications.

    hashtag
    Test using Simulation Dry Run

    1. Select Workday Employee Lifecycle policy.

    2. Click the overflow menu (three dots icon) at the top of the page.

    3. Select Perform Dry Run.

    hashtag
    Test using Draft Versioning

    1. Select Workday Employee Lifecycle policy.

    2. Click Create Draft.

    3. Select Edit Workflow.

    4. Modify any workflow in your policy.

    hashtag
    Make changes to the Workday application to test your policy

    In your Workday application, update the source of identity to test your policy. The following is a list of suggested changes:

    • Change the employee’s employee type (ie, from regular to contractor)

    • Verify account creation in Okta and Active Directory

    • Change the employee's department and verify group membership updates

    • Terminate the employee and verify account deprovisioning

    hashtag
    Identity Synchronization Configuration Reference

    Identity Synchronization is implemented during Lifecycle Management provisioning workflows. It is used to prevent provisioning errors due to duplication of username and/or email address. It supports robust identity sync across downstream applications (Okta and Active Directory) with different naming constraints or enforces unique identifiers.

    Use Identity Synchronization if your target system already has an identity with a given attribute (e.g., a username or email is already in use).

    hashtag
    Enable Identity Synchronization

    1. In the Policy page, select your policy, Workday Employee Lifecycle policy.

    2. Select Policy Settings.

    3. Scroll down to Advanced Settings.

    4. Under Identity Syncing, enable Sync on changes only or Always sync.

    hashtag
    Sync Okta Identities

    Synchronizes employee records to Okta user accounts, creating and updating user profiles with mapped worker attributes from Workday.

    Configuration:

    • Description: Synchronizes identities to Okta

    • Target: OktaUser

    • Create Allowed: Yes

    hashtag
    Attribute Mappings

    Destination Attribute
    Source/Format
    Continuous Sync
    Notes

    hashtag
    Conditional Actions

    All Employees

    • Assigns "All Okta Employee Access" profile

    • Does not remove existing relationships

    US Developers

    • Condition: wd_location eq "US" and department eq "developer"

    • Assigns developer-specific access profiles

    • Does not remove existing relationships

    hashtag
    Sync Active Directory Identities

    Creates and updates on-premises Active Directory accounts with location-specific group assignments and standardized naming conventions for different employee categories.

    Configuration:

    • Description: Synchronizes identities to Active Directory

    • Target: ActiveDirectoryUser

    • Create Allowed: Yes

    hashtag
    Attribute Mappings

    Destination Attribute
    Source/Format
    Continuous Sync
    Notes

    hashtag
    Conditional Actions

    US Location

    • Condition: work_location eq "US"

    • Assigns US Groups

    • Removes existing relationships

    Executive Group

    • Condition: employee_group eq "Executive"

    • Assigns the Executive Employee group

    • Removes existing relationships

    China Location

    • Condition: work_location eq "China"

    • Assigns China Groups

    • Removes existing relationships

    hashtag
    Deprovisioning Configuration Reference

    Defines the procedures for safely removing access when employees leave the organization, including specific handling for each identity provider.

    hashtag
    Deprovision Okta Identities

    Handles employee offboarding in Okta by disabling accounts while preserving access history and configurations.

    Configuration:

    • Description: Disables identities in Okta

    • Target: OktaUser

    • Remove Relationships: No

    hashtag
    Deprovision Active Directory Identities

    Controls the offboarding process for on-premises Active Directory, including moving accounts to a terminated user's organizational unit.

    Configuration:

    • Description: Disables identities in Active Directory

    • Target: ActiveDirectoryUser

    • Remove Relationships: No

    hashtag
    Attribute Transformations

    Destination Attribute
    Value
    Continuous Sync

    hashtag
    Expanded Joiner/Mover/Leaver Scenarios

    Below are more detailed examples of joiner, mover, and leaver scenarios that you can implement using Veza's Lifecycle Management.

    hashtag
    Joiner Scenarios

    hashtag
    Example 1: Full-Time Employee Onboarding

    hashtag
    Example 2: Contractor Onboarding

    hashtag
    Mover Scenarios

    hashtag
    Example 1: Department Change

    hashtag
    Example 2: Promotion to Manager

    hashtag
    Leaver Scenarios

    hashtag
    Example 1: Standard Termination

    hashtag
    Example 2: Involuntary Termination (Security Risk)

    hashtag
    Advanced Attribute Transformer Examples

    hashtag
    Workday to Okta Transformer (Enhanced)

    hashtag
    Workday to Active Directory Transformer (Enhanced)

    hashtag
    Advanced Configuration

    hashtag
    Using Attribute Overrides

    To handle edge cases where standard attribute formatting is not effective, use to define special exceptions. For example:

    • Contractors vs. Employees: Use different username formats based on employment type

    • Username Conflicts: Configure fallback formatters for handling duplicate usernames

    • Location-Specific Naming: Apply different naming conventions based on location or region

    hashtag
    Email Write-Back to Workday

    Ensure your email addresses remain consistent by configuring email write-back to Workday:

    1. In your Joiner workflow, after the Sync Identities actions, add:

      • Add Action > Create Email

      • Configure for your email system

    This ensures the email created in your systems is written back to Workday as the source of truth.

    hashtag
    Conditional Logic Best Practices

    When implementing conditional actions, consider these patterns for robust lifecycle management:

    hashtag
    Location-Based Conditions

    hashtag
    Role-Based Conditions

    hashtag
    Employment Type Conditions

    hashtag
    Monitoring and Troubleshooting

    hashtag
    Activity Log Monitoring

    Monitor your lifecycle management workflows using the :

    1. Navigate to Lifecycle Management > Activity Log

    2. Filter by policy name to see all actions for your Workday policy

    3. Look for failed actions and investigate error messages

    hashtag
    Common Issues and Solutions

    hashtag
    Username Conflicts

    If usernames are already taken in target systems:

    • Configure to handle conflicts

    • Use employee ID or other unique identifiers as backup username formats

    hashtag
    Missing Attributes

    If required attributes are missing from Workday:

    • Use DEFAULT transformers to provide fallback values

    • Configure conditional logic to handle missing data gracefully

    hashtag
    Group Assignment Failures

    If group assignments fail:

    • Verify that referenced groups exist in target systems

    • Check that service accounts have sufficient permissions

    • Use conditional logic to assign groups only when they exist

    Note: An extraction is the metadata ingestion process that pulls identity and permission data from target systems into Veza, enabling it to act across access policies, governance, and provisioning workflows.
  • Administrative access to Veza to create Lifecycle Management policies

  • Name: Workday Employee Lifecycle
  • Source of Identity: Workday

  • Data Source: Your Workday integration

  • Entity Type: Workday Worker

  • Click Create Policy to save the basic configuration

  • Workflow Name: Active Employee
  • Condition: is_active eq true AND hire_date eq "2025-08-04T00:00:00" This condition is triggered when, in Workday, the employee is active and a defined hiring date is "2025-08-04T00:00:00". Therefore, any active employee hired on or after the specified date is considered a joiner.

  • Continuous Sync: Enabled Continuous Sync is enabled, allowing updates to a user's source attributes—such as email, department, manager, or role—to be automatically synchronized to the target application on an ongoing basis after the user is provisioned.

  • Add actions to the workflow as detailed in the Configuration Reference section.

  • Workflow Name: Mover Workflow - Regional Sales Manager
  • Condition: is_active eq true AND first_name eq “Sarah” AND last_name eq “Johnson” AND position eq “Regional Sales Manager”

  • Continuous Sync: Enabled

  • Add actions similar to the Joiner workflow, but ensure Remove Existing Relationships is enabled in the Manage Relationships actions to update group memberships when departments change When a user’s role changes (mover), you often need to revoke existing entitlements—like group memberships, role assignments, and permission set grants—not just avoid adding new ones. Enabling Remove Existing Relationships ensures that previously granted relationships are actively removed to prevent privilege creep or orphaned access.

  • Workflow Name: Employee Termination
  • Condition: is_active eq false OR termination_date eq "2025-08-08T00:00:00" This condition is triggered when the employee is no longer active and a defined termination date is "2025-08-08T00:00:00". Therefore, any non-active employee terminated on or after the specified date is considered a leaver.

  • Add deprovisioning actions, such as Deprovision Okta Identities and Deprovision AD Identities

  • In the
    Identity
    field, select an employee name from the dropdown menu.
  • The Dry Run takes seconds to execute. Click Show results.

  • Ensure that Okta and Active Directory contain the correct identity information for the employee.

  • Click Save Workflow. The workflow is now a draft version.

  • Continue to iterate on changes to the workflow until it is ready.

  • Click Publish when the policy performs satisfactorily.

  • Click Settings at the top of the page.

  • Click Policy Settings.

  • Enable the Enable Policy Draft Mode radio button.

  • In the Policy page, select your policy and click Actions.

  • In the Actions menu, select Start.

  • Continuous Sync: Yes

    last_name

    {last_name}

    Yes

    country_code

    {work_location}

    Yes

    login

    {username}@sigmacorpx.com

    No

    Common transformer

    Continuous Sync: Yes

    email

    {username}@evergreentrucks.com

    Yes

    display_name

    {display_full_name}

    Yes

    given_name

    {first_name}

    Yes

    sur_name

    {last_name}

    Yes

    country_code

    {work_location}

    Yes

    job_title

    {job_title}

    Yes

    primary_group_dn

    CN=Domain Users,CN=Users,DC=evergreentrucks,DC=local

    Yes

    account_name

    {display_full_name}

    No

    Common transformer

    Deprovisioning Method: Disabled
  • Logout User: No

  • Remove Personal Devices: No

  • Deprovisioning Method: Disabled
    Then add:
    • Add Action > Write Back Email

    • Integration: Your Workday integration

    • Entity Type: Workday Worker

    Use the activity details to verify that transformations are working correctly

    email

    {username}@sigmacorpx.com

    Yes

    first_name

    {first_name}

    distinguished_name

    CN={first_name} {last_name},OU=Minnetonka,OU=US,OU=Evergreen Staff,DC=evergreentrucks,DC=local

    Yes

    See Microsoft Lightweight Directory Access Protocolarrow-up-right for more information on distinguished_name.

    user_principal_name

    {username}@evergreentrucks.com

    distinguished_name

    CN={first_name} {last_name},OU=Evergreen Termination,OU=Evergreen Staff,DC=evergreentrucks,DC=local

    No

    primary_group_dn

    CN=Terminated Users,OU=Evergreen Groups,DC=evergreentrucks,DC=local

    No

    Configured Workday for Lifecycle Management
    Configured Okta for Lifecycle Management
    Configured Active Directory for Lifecycle Management
    Identity Override Attributes
    Activity Log
    Fallback Formatters
    Integration Architecture
    JML Workflow

    Yes

    Yes

    Name: Engineering Department Access
    Profile Type: Application Entitlements 
    Description: Standard access for Engineering department employees
    Label: Developers
    
    Entitlements:
    - Active Directory Group: Engineering
    - Okta Group: Engineering
    Name: Marketing Department Access
    Profile Type: Application Entitlements
    Description: Standard access for Marketing department employees
    
    Entitlements:
    - Active Directory Group: Marketing
    - Okta Group: Marketing
    Trigger: New employee record created in Workday with status="Active" and worker_type="Full_Time"
    Actions:
    1. Create Okta user with attributes from Workday transformer
    2. Assign to department-specific groups in Okta
    3. Create AD user with attributes from Workday transformer
    4. Add to appropriate security groups in AD based on job role
    5. Send welcome email with account information
    Trigger: New worker record created in Workday with status="Active" and worker_type="Contractor"
    Actions:
    1. Create Okta user with limited attribute set and "Contractor-" prefix in username
    2. Assign to contractor-specific groups in Okta
    3. Create time-limited AD account with expiration date set to contract end date
    4. Add to contractor security groups with restricted access
    5. Send welcome email with temporary password and access instructions
    Trigger: Employee department changed in Workday
    Actions:
    1. Update department attribute in Okta and AD
    2. Remove previous department group memberships in both systems
    3. Add new department group memberships in both systems
    4. Update OU placement in AD
    5. Send notification to new manager
    Trigger: Employee job level changed to include management flag
    Actions:
    1. Update job title in all systems
    2. Add to manager-specific groups in Okta and AD
    3. Add to approval workflows in relevant systems
    4. Send manager training notification
    Trigger: Employee status changed to "Terminated" in Workday
    Actions:
    1. Disable user in Okta and AD (do not delete)
    2. Remove all group memberships
    3. Revoke all application access
    4. Move AD account to "Terminated Users" OU
    5. Generate access termination report for compliance
    Trigger: Employee terminated with reason="Security Risk"
    Actions:
    1. Immediately disable all accounts (high priority)
    2. Force logout from all active sessions
    3. Reset all passwords
    4. Remove all access rights and group memberships
    5. Generate security incident report
    # Okta User Attributes
    login: {worker_id}@company.com
    email: {work_email | DEFAULT, "{worker_id}@company.com"}
    first_name: {first_name}
    last_name: {last_name}
    display_name: {first_name} {last_name}
    department: {department_name}
    title: {job_title}
    manager_id: {manager_worker_id}@company.com
    # Handle different user types
    user_type: {worker_type | LOWERCASE | REPLACE, "full_time", "Employee" | REPLACE, "contractor", "Contractor" | DEFAULT, "Employee"}
    employee_id: {employee_id}
    # Custom attributes
    customField1: {location_code}
    customField2: {hire_date | DATE_FORMAT, "yyyy-MM-dd"}
    customField3: {termination_date | DATE_FORMAT, "yyyy-MM-dd" | DEFAULT, ""}
    # AD User Attributes
    account_name: {worker_id}
    # Build distinguished name based on employment type and department
    distinguished_name: {worker_type | EQUALS, "contractor" | IF_TRUE, "CN={first_name} {last_name},OU=Contractors,OU={department_name},DC=company,DC=local" | IF_FALSE, "CN={first_name} {last_name},OU=Employees,OU={department_name},DC=company,DC=local"}
    user_principal_name: {worker_id}@company.local
    email: {work_email | DEFAULT, "{worker_id}@company.com"}
    display_name: {first_name} {last_name}
    given_name: {first_name}
    sur_name: {last_name}
    department: {department_name}
    job_title: {job_title}
    description: {job_title} - {department_name}
    company: Company Inc.
    # Set account expiration for contractors
    account_expires: {worker_type | EQUALS, "contractor" | IF_TRUE, {contract_end_date} | IF_FALSE, ""}
    # Custom attributes
    extension_attribute_1: {cost_center}
    extension_attribute_2: {business_unit}
    extension_attribute_3: {hire_date | DATE_FORMAT, "yyyy-MM-dd"}
    extension_attribute_4: {employee_id}
    # US-based employees
    work_location eq "US"
    
    # International employees requiring different treatment
    work_location eq "China" OR work_location eq "EMEA"
    
    # Remote workers
    work_location eq "Remote" OR office_location contains "Remote"
    # Technical roles requiring elevated access
    department eq "Engineering" OR department eq "DevOps" OR job_title contains "Developer"
    
    # Management roles
    job_level eq "Manager" OR job_level eq "Director" OR job_level eq "VP"
    
    # Sensitive roles requiring additional security
    department eq "Finance" OR department eq "Legal" OR department eq "HR"
    # Full-time employees
    worker_type eq "Full_Time" AND status eq "Active"
    
    # Contractors with time-limited access
    worker_type eq "Contractor" AND contract_end_date is not null
    
    # Temporary workers
    worker_type eq "Temporary" OR employment_status eq "Temp"

    Access Profiles

    Map application entitlements to user populations based on common roles, functions, levels, or locations in the organization.

    Access Profiles govern how application entitlements are assigned to employees across your organization. These profiles define how birthright access should be granted based on segmentation criteria, such as business role, job function, seniority level, location, or group membership. Access Profiles are used by the Manage Relationship action to assign users to specific groups, roles, permission sets, or other access-granting entities when specific conditions are met.

    Profiles can be configured hierarchically to create a fine-grained model for assigning access to different employee groups. Administrators can position child profiles beneath a parent profile, with each child profile inheriting the parent profile's entitlements.

    For instance, a parent profile might be "Sales" (defining all the application entitlements that an individual belonging to the Sales organization should be granted), with child Profiles for "Account Executive," "Sales Engineering," "Sales Operations," and "Inside Sales." Each child Profile will have additional application entitlements specific to those roles. With these profiles configured, a workflow in policy for sales engineers can use just the "Sales Engineering" Profile, which includes the access defined by the "Sales" profile.

    hashtag
    Example Profiles

    Profile Name
    Target
    Relationship

    Since workflows in Lifecycle Management policies can apply these Profiles at all stages in a user's lifecycle, defining Profiles enables Veza to serve as a source of truth for birthright entitlements for all employees. Access Profiles also define what access-granting relationships to remove from users during de-provisioning workflows.

    The access granted by a Profile can be defined by both:

    • Explicitly-defined, application-specific entitlements, such as roles, groups, permission sets, etc., within the Profile. A single Access Profile can support granting one or more entitlements across one or more applications simultaneously.

    • Any entitlements inherited from a parent Profile.

    The example below shows Business Roles for teams, managers, and all employees, along with Profiles for different applications. When configuring workflow actions, administrators can choose from one or more Business Profiles to assign the entitlements granted by the child Profiles.

    hashtag
    Access Profile Types

    Veza offers two types of built-in Access Profile types for defining birthright entitlements by user segments:

    hashtag
    Profiles

    Profiles are a type of Access Profile used to define access-granting relationships (such as user assignments to groups or roles) within the applications you will provision to users. Profiles are intended to represent a specific set of entitlements across one or more applications that should be granted based on a user's segmentation criteria.

    Profiles should be configured in coordination with the application owner, who will best understand the exact permissions and privileges granted by various groups, roles, and other entitlements in each specific application.

    hashtag
    Business Roles

    Business roles are a type of Access Profile used to model your organization's structure, based on a hierarchy of job functions, locations, and titles. Ideally, by itself, a Business Role should not describe specific entitlements but can inherit relationships from other Profiles. These will usually be named according to logical segments that should be assigned to different applications with different levels of access, such as "Sales," "QA Contractors," or "Engineering Managers."

    hashtag
    Best Practices for Access Profile Types

    Business Roles can inherit Profiles to enable a hierarchical approach to birthright access management. You should draft and review Access Profiles to create a map of user entitlements for each application (such as "GitHub Developers" or "Salesforce Administrators").

    Create Business Roles that align with your organizational structure, especially considering location, business unit, and functional organization. Then, configure these Business Roles to inherit Profiles that describe the birthright entitlements granted to different user populations.

    hashtag
    Configuring Access Profiles

    To create and manage Access Profiles, go to Lifecycle Management > Access Profiles.

    1. Click Create Access Profile.

    2. Under Access Profile Details, choose the Profile Type to create:

      1. Business Role: Business roles are intended to represent logical units within your organizational structure, and can inherit entitlements defined in other Access Profiles. Use Business Roles to establish segmentation criteria based on location, role, business unit, or functional organization.

    After saving an Access Profile, you can view its details, edit it, or pause and resume it on the Lifecycle Management > Access Profiles page.

    When configuring a policy to include the Manage Relationships action, you can select any active profile for the target data source. You can also use Dynamic Access Profiles to resolve Access Profile names at runtime based on user attributes. See for details.

    hashtag
    Access Profile Ownership

    Access Profiles can have designated owners who are responsible for managing and maintaining the profile. Owners have elevated permissions to configure the profile, manage its lifecycle, and create additional profiles.

    hashtag
    Who Can Be Owners

    Both Veza Users and Veza Groups can be assigned as Access Profile owners:

    • Individual Users: Any Veza platform user with the appropriate permissions

    • Veza Groups: Both Customer Managed groups (created in Veza) and SCIM Managed groups (provisioned from identity providers). See for details on group types and management

    hashtag
    Owner Eligibility Requirements

    To be eligible as an Access Profile owner, a user or group must have the Creator permission set for the relevant Access Profile Type. This is a two-step configuration process:

    1. Grant Profile Type Permissions:

      • Navigate to Lifecycle Management > Settings

      • Select the Profile Types tab

    circle-info

    Group Ownership Behavior: When a group is assigned as an owner, all its members inherit the ownership capabilities. Individual group members will also appear as available owners in the interface.

    hashtag
    Owner Permissions

    When a user or group is designated as an Access Profile owner, they automatically receive three distinct permissions:

    1. Owner permission on the specific Access Profile

      • Read: View the profile's configuration, entitlements, and metadata

      • Update: Modify the profile's settings, labels, descriptions, and assigned relationships

    These permissions enable owners to not only manage their assigned profiles but also create additional profiles of any type they have access to.

    circle-exclamation

    Privilege Escalation: Becoming an Access Profile owner grants global Creator permission, allowing the user or group to create Access Profiles of any type (not just the type of the owned profile). Consider this privilege escalation when assigning ownership.

    hashtag
    Managing Owners

    Access Profile owners are managed through the Access Profiles interface:

    1. Navigate to Lifecycle Management > Access Profiles.

    2. Locate the Access Profile in the list.

    3. Click the Actions button (⋮) for that profile.

    circle-exclamation

    Owner Requirements: Every Access Profile must have at least one owner. The system will prevent you from removing the last owner from a profile to ensure ongoing management capability.

    circle-info

    Access Profile Creation Permissions (Early Access): By default, only Administrators can create Access Profiles. With Access Controls enabled, you can delegate creation permissions to specific Operators and Groups. See for details.

    hashtag
    Custom Properties

    Custom Attributes are admin-defined metadata fields that can be set on individual Access Profiles. You can use them to tag profiles with organizational context such as cost center, team, compliance classification, or region.

    These custom property values are available as parameters during dynamic approval rule evaluation, and support Access Requests approval routing driven by profile metadata. For example, this can enable tagging Access Profiles with a specific cost center and routing them to the appropriate approver group. See for configuration details.

    hashtag
    Defining custom attribute schemas

    Before custom properties can be set on individual profiles, an administrator must define the allowed attributes:

    1. Navigate to Lifecycle Management > Access Profiles.

    2. Click Settings in the page header.

    3. In the settings sidebar, select Custom Attribute Definitions.

    Custom attribute schemas are applied across all Access Profiles in the tenant. Definitions cannot be set on individual profile types.

    hashtag
    Setting custom property values on a profile

    Once schemas are defined, a Custom Properties section appears when creating or editing any Access Profile:

    1. In the Access Profile create or edit form, scroll to the Custom Properties section.

    2. Click Add Custom Property.

    3. In the dialog, select the Property (attribute name) and enter or select an Attribute Value.

    To edit custom properties for an existing profile, select it from the Profiles list to view details. In the header, locate the Custom Properties section and click to add or remove properties.

    Custom property values are validated against the current definitions. Property names must match a defined attribute, and values must come from the predefined list when one is configured.

    Custom property values are included in the API response when retrieving or listing Access Profiles via the custom_properties field (private API).

    circle-exclamation

    Cascade removal: If a custom attribute definition is removed from Access Profiles Settings, the system automatically removes that property from all profiles that had a value set for it. This cleanup is immediate and permanent. Review which profiles use a property before removing its definition.

    hashtag
    See Also

    Azure

    Helpdesk Administrator (Azure AD Role)

    Google Asia Employees

    Google Cloud

    Google Asia Employees (Google Group)

    Profile: Profiles define entitlements that can be assigned to users in target applications, such as groups, roles, or permission sets assigned to users as birthright entitlements. Profiles cannot be inherited from other Access Profiles, but can be inherited by Business Roles. Use this profile type to define the birthright entitlements within one or more applications (such as group memberships or role assignments).

  • Profile Name and Description: You should follow a standard naming convention for all profiles to help identify them, describing the employee segment or applications the Access Profile applies to.

  • Profile Labels: Labels are available for quickly finding access profiles when configuring actions in a policy. Apply and create labels as needed to organize your Access Profiles by employee segment and the applications they apply to.

  • Assigned Relationships:

    1. Click Add Relationship

    2. Choose the type of relationship to add:

      • Access Profile: Use the Relationship menu to pick one or more Access Profiles to grant those business roles or entitlements. This option is not available for Access Profiles of type "Profile".

      • Relationship: Choose the target data source and specific entities the Profile will govern access to (such as Google Cloud Platform > Google Group). This option is not available for Access Profiles with the "Business Role" type.

  • Click Assign to save the changes.

  • Locate the profile type in the table
  • Click the Actions button (⋮) for that profile type

  • Select Manage Permissions from the dropdown menu

  • In the Manage Permissions dialog, select USER or GROUP from the Type dropdown

  • Choose the specific user or group to grant Creator permissions

  • Assign as Owner: Once a user or group has Creator permissions for the profile type, they can be designated as owners for individual Access Profiles of that type

  • Create: Perform create operations within the profile context
  • Delete: Remove the Access Profile

  • Enables full control over the profile's configuration and lifecycle (pause/resume)

  • Creator permission globally for all Access Profiles

    • Grants the ability to create new Access Profiles of any type (subject to other constraints)

    • Scoped to the entire access_profiles table, not limited to specific Profile Types

    • This is a privilege escalation: first-time owner assignment grants global creation capability

  • Viewer permission on the Access Profile Type

    • Read: View details about the profile type configuration and requirements

    • Scoped to the specific Profile Type of the owned profile

  • Select Manage Owners from the dropdown menu.
  • In the Manage Owners dialog:

    • Use the Type dropdown to select USER or GROUP.

    • Use the Name dropdown to select the specific user or group to add as an owner.

    • View and manage existing owners in the list below.

    • Click Done to save changes.

  • Add one or more attribute definitions. For each attribute, specify:
    • Name — the attribute key used to identify the property on profiles.

    • Type — currently String is the only supported type.

    • Available Values (optional) — a predefined list of allowed values. When set, the value field becomes a dropdown selector when editing a profile.

  • Save the settings.

  • If the attribute definition includes predefined values, the value field is a dropdown.

  • If no predefined values are set, the field accepts free text.

  • Save the profile.

  • Veza Groups

  • Manage Access Profile Creation Permissions - Delegate Access Profile creation to Operators and Groups (Early Access)

  • Executive Employees

    Active Directory

    Executive Employee - Manager US (Active Directory Group)

    US Engineering Managers

    Active Directory

    Engineering - Manager US (Active Directory Group)

    Dynamic Access Profiles
    Veza Groups
    Manage Access Profile Creation Permissions
    Dynamic Approvers
    Manage Relationships
    Dynamic Access Profiles
    Lifecycle Management Policies
    Access Profile Types
    Inherited Profiles and Business Roles

    Azure Helpdesk Role

    Conditions and Actions

    Configure the conditions and actions that execute when workflows run.

    When creating Lifecycle Management Policies, you can configure workflows that define actions to execute during different employment lifecycle scenarios, such as when an employee is onboarded, changes function or role, or is withdrawn from the organization. Actions can be executed in sequence based on specific conditions, enabling you to automate onboarding and offboarding actions within Lifecycle Management, across systems in your environment.

    hashtag
    Understanding Policies, Workflows, and Actions

    Policies and workflows define how Veza automates identity management tasks across your environment by describing conditional actions to execute for different employee populations.

    hashtag
    Policies

    • Define the overall automation framework for managing identities throughout their lifecycle

    • Specify which source of identity triggers the automation

    • Can contain multiple workflows to handle different scenarios (joiner, mover, leaver)

    hashtag
    Workflows

    • Define specific sequences of actions that execute based on trigger conditions

    • Handle different lifecycle scenarios (e.g., new hire onboarding, role changes, terminations)

    • Support conditional execution based on user attributes (department, location, role, etc.)

    hashtag
    Conditions

    • Define when specific actions should occur within a workflow

    • Can be based on any attribute from the source of identity

    • Support SCIM filter expressions for precise targeting

    • Can be nested to create sophisticated logic trees

    Example Conditions for Lifecycle Management Actions:

    • Add to engineering groups based on department: department eq "Engineering"

    • Grant manager access based on role: is_manager eq true

    hashtag
    Actions

    • Represent specific tasks such as creating users, syncing attributes, or managing access

    • Types of actions include:

      • SYNC_IDENTITIES: Create/update user accounts

    hashtag
    Error Handling for Actions

    By default, when an action fails during workflow execution, the workflow stops and no further actions in that condition are executed. Two options allow workflows to continue past action failures instead of stopping:

    hashtag
    Continue if any action fails (Condition-level)

    Enable Continue Actions If Any Error on a condition to keep the workflow running even if any action under that condition fails. This is a blanket setting — if any action fails, the workflow continues to the next action instead of stopping. It applies equally to every action in the condition.

    When to use: When all actions in a condition are independent and none are prerequisites for others. For example, a condition with three notification actions (Slack, email, ServiceNow ticket) where each should fire regardless of the others.

    hashtag
    Continue if this action fails (Action-level)

    Enable Continue Workflow on Error on an individual action to keep the workflow running if that specific action fails. The workflow continues to the next step instead of stopping, while other actions in the condition remain critical.

    When to use: When most actions in a condition are critical but one specific step is optional. For example, a condition with three actions (Revoke Access, Send Slack Notification, Update CMDB) where the Slack notification is nice-to-have but the other two must succeed.

    circle-info

    When either option is enabled, failed actions are still recorded as Errored in the , but the overall workflow task completes successfully. This ensures errors remain visible and auditable even though they did not halt execution.

    Setting
    Scope
    Effect

    hashtag
    Example Conditions and Actions: Provisioning to Active Directory

    The following workflow configuration for a Lifecycle Management Policy enables provisioning actions for Active Directory users when workers are added in Workday:

    • Create an Active Directory user, synchronizing attributes with the source Workday Worker

    • Create email addresses for new employees in Exchange Server

    • Update the Workday Worker and AD User records to include the new email

    hashtag
    Sync Active Directory Accounts for Active Employees (Joiners/Movers)

    When provisioning users, Veza synchronizes attributes for active employees and creates them during AD User provisioning. These attributes can be transformed from attributes in the source of identity (Workday):

    Active Directory Attribute
    Source Attributes
    Transformer Value

    hashtag
    Sync Active Directory Attributes for Withdrawn Employees (Leavers)

    To de-provision users, Veza moves accounts to a terminated users group and adds them to an OU for terminated employees:

    Active Directory Attribute
    Source Attributes
    Transformer Value
    • Moving leavers into a "Terminated Users" group (via the primary_group_dn attribute) effectively restricts access to systems that rely on Active Directory for authentication and authorization

    • Updating the distinguished_name to place leavers in a specific organizational unit (OU) like "Evergreen Termination" separates active users from inactive ones and enables the application of policies, scripts, and queries that target inactive users without affecting active employees

    hashtag
    Action Types

    circle-exclamation

    Action Hierarchy Requirement: The Sync Identities action is the only action type that can be declared at the root condition level. All other actions must be defined within sub-conditions after establishing a root condition with Sync Identities. The UI enforces this hierarchy.

    hashtag
    Quick Reference

    Action
    Use When You Need To...

    hashtag
    Sync Identities

    Synchronizes identity attributes between systems, with options to:

    • Create new identities if they don't exist

    • Update attributes of existing identities

    • Enable continuous sync to keep attributes aligned with the source of truth

    Example Use Cases:

    • Create new user accounts in target systems when employees join

    • Update user attributes when information changes in HR systems

    • Ensure consistent user information across multiple platforms

    Setting
    Description

    Password output (Early Access)

    When password output is enabled, the password generated during identity creation is available to subsequent workflow actions via transformer expressions. Use {EntityType.password} syntax to reference it, such as {OktaUser.password} in a Send REST Request payload.

    This is useful in joiner workflows where Veza provisions a new account and needs to pass the generated password to a downstream system such as an HR portal or ticketing API.

    circle-exclamation

    Passwords are passed as plaintext to downstream actions. Use this only when the workflow requires it, and ensure receiving endpoints use HTTPS. Passwords are never written to the Veza database. They are available in memory during workflow execution only and are redacted from stored job payloads before persistence.

    circle-info

    Early Access: Password output requires the LCM_INCLUDE_PASSWORD_IN_OUTPUT_ENTITIES feature flag. Contact Veza support to enable it for your tenant.

    hashtag
    Manage Relationships

    Controls entitlements such as group memberships and role assignments for identities.

    Example Use Cases:

    • Add users to appropriate security groups, roles, permission sets, or other access-grant entities

    • Remove users from groups during role changes

    • Update entitlements when employees move between departments

    • Dynamically assign access based on user attributes (department, location, role)

    Setting
    Description

    hashtag
    Create Email

    Integrates with an email provider to create email addresses for identities. This action is often used in combination with other actions in new hire and temp-to-hire workflows.

    Example Use Cases:

    • Create corporate email accounts for new employees

    • Establish shared mailboxes for teams or projects

    Setting
    Description

    hashtag
    Deprovision Identity

    Safely removes or disables access for identities when they withdraw from the organization.

    Example Use Cases:

    • Disable accounts when employees or contractors leave

    • Revoke access while maintaining audit records

    • Transition resources when owners depart

    circle-info

    Note for Non-Human Identities: DEPROVISION_IDENTITY is not supported for NHI entity types such as Managed Service Accounts. Use instead to remove NHI accounts.

    Setting
    Description

    hashtag
    Delete Identity

    Permanently removes user accounts from target systems. Unlike the DEPROVISION_IDENTITY action which disables or suspends accounts while preserving audit records, DELETE_IDENTITY performs complete account removal.

    triangle-exclamation

    Warning: DELETE_IDENTITY permanently removes accounts from target systems. Deleted data is typically unrecoverable. Consider using DEPROVISION_IDENTITY instead if you need to preserve audit trails or may need to reactivate accounts in the future.

    Example Use Cases:

    • Database user cleanup after employee offboarding

    • Compliance with data deletion policies (e.g., GDPR right to be forgotten)

    • Removing test or temporary accounts

    • Service account lifecycle management (NHI)

    circle-info

    Non-Human Identity (NHI) Lifecycle: For service accounts and other NHI entity types, DELETE_IDENTITY is the primary decommissioning action since DEPROVISION_IDENTITY is not supported. See for details.

    Setting
    Description

    Supported Integrations:

    • Active Directory (Users and Managed Service Accounts)

    • Okta

    • PostgreSQL

    • MySQL

    hashtag
    Custom Action

    Executes integration-specific operations that extend beyond standard Lifecycle Management action types. CUSTOM_ACTION enables integrations to define specialized operations with flexible attribute schemas tailored to their unique capabilities.

    circle-info

    CUSTOM_ACTION currently supports ServiceNow only. For generic HTTP requests to external APIs, use the action instead.

    Example Use Cases:

    • Insert records into ServiceNow tables when employees join or change roles

    • Create ServiceNow incidents or requests as part of onboarding workflows

    • Update ServiceNow CMDB records during employee lifecycle events

    Setting
    Description
    circle-exclamation

    Custom Actions are non-idempotent. Each execution creates a new record. Running the same action multiple times will create duplicate records.

    Supported Integrations:

    Integration
    Custom Action Capability
    Documentation

    For detailed configuration examples including incident creation and audit logging, see .

    hashtag
    Write Back Email

    Updates HRIS or other systems with email addresses created in other actions.

    Example Use Cases:

    • Update employee records with newly created email addresses

    • Sync email information back to master HR systems

    • Ensure consistent email records across all platforms

    Setting
    Description

    hashtag
    Pause

    Introduces a deliberate delay in the workflow execution.

    Example Use Cases:

    • Allow time for system propagation between actions

    • Implement rate limiting in multi-step workflows

    • Coordinate timing with external processes

    Setting
    Description

    hashtag
    Send REST Request

    Makes HTTP requests to external APIs and services as part of provisioning workflows. This action enables integration with custom applications, webhooks, and REST-based services that support identity management operations.

    Example Use Cases:

    • Notify external systems when users are created or updated in target systems

    • Trigger custom provisioning workflows in third-party applications

    • Send identity data to SCIM endpoints for user synchronization

    • Create service desk tickets for manual provisioning steps

    Setting
    Description
    circle-info

    Data Source Selection (Optional): Select a data source to route the REST request through an Insight Point instead of the Veza control plane. Use this to reach endpoints that are not publicly accessible, such as internal APIs behind a firewall. The dropdown only shows Custom Providers configured with external_lifecycle_management_type: SEND_REST_PAYLOAD. If no data sources appear, see for configuration.

    TLS certificates: If the target API uses an internal or self-signed CA certificate, the Insight Point must trust that CA or the request will fail with x509: certificate signed by unknown authority. Configure the CA certificate in the Insight Point's trust store before enabling Insight Point routing. See (OVA) or (install script).

    Variable Substitution:

    When constructing the webhook URL and JSON payload, you can reference identity attributes using curly brace syntax. Two sources of attributes are available specifically for this URL and payload context:

    • Source-of-identity (SOI) attributes: Attributes from the identity source triggering the workflow (e.g., Workday worker fields, Okta user attributes).

    • Sync Identities output entity attributes: When a Sync Identities action precedes this action in the same workflow, attributes from the provisioned or updated target user (such as Active Directory user attributes) are also available. See below.

    Available transformations include UPPER, LOWER, TRIM, and accessing nested attributes with dot notation, such as {Manager.email}. See for complete transformation syntax.

    Note: If any placeholder in the URL or payload cannot be resolved (e.g., due to missing attributes), the entire transformation is skipped and the original URL is used without any substitution. The system logs a warning for troubleshooting. Ensure all referenced attributes exist in the source of identity to enable proper variable substitution.

    Form field substitution (Access Requests only):

    When a Send REST Request action is configured as part of an Access Request , the JSON payload can reference form field values submitted by the requester. This enables dynamic payloads where the requester provides values (such as a role name or resource ID) at request time, and those values are injected into the API call.

    Use the {$form_field.field_name} syntax in the JSON payload, where field_name matches a field defined in the catalog definition's form fields.

    To configure form field substitution:

    1. Create a Send REST Request action in a provisioning policy with placeholders in the JSON payload:

    2. Create a Send REST Payload and add form fields with names that match the placeholders (e.g., role_name, role_id).

    3. When a user submits an access request using this catalog definition, they fill in the form fields. The submitted values replace the corresponding {$form_field.*}

    Form field substitution applies to the JSON payload only. It does not apply to the webhook URL or authorization header. Field names must contain only letters, numbers, and underscores (role_name is valid, role-name is not). If a placeholder references a field that was not provided in the access request, the placeholder is left unchanged in the payload.

    circle-info

    Form field substitution and identity attribute substitution can be combined in the same payload. For example: {"user": "{email}", "role": "{$form_field.role_name}"} substitutes the identity's email from the source of identity and the role name from the access request form.

    hashtag
    Standard Active Directory attributes available for substitution

    The following attributes are populated on the sync_identities output entity for Active Directory integrations and can be used in variable substitutions:

    Attribute key
    Description

    Custom properties defined in the integration configuration are also available, using the key customprop_<property_name> (where <property_name> is the property's format name as configured).

    Response Handling:

    When "Add Response to Output Entities" is enabled, the action parses JSON responses and extracts specified entity data. This enables chaining actions where one API call creates a resource and returns an identifier that subsequent actions can reference.

    For example, if a user creation API returns:

    Configure the action with:

    • Response Entity Attribute: result

    • Response ID Attribute: user_id

    • Response Name Attribute: display_name

    The extracted entity becomes available to downstream workflow actions.

    HTTP Method Guidelines:

    • GET: Query operations, typically without payload; use for checking resource state or retrieving data. Does not set workflow change flags

    • POST: Create new resources; requires JSON payload; sets both AnyCreated and AnyChanges flags that can trigger downstream actions with "Only Send if Any Upstream Changes" enabled

    • PUT

    Workflow Integration: The AnyCreated and AnyChanges flags enable conditional workflow execution. Actions configured with "Only Send if Any Upstream Changes" will only execute when a previous action has set these flags, allowing you to build sophisticated conditional workflows (e.g., only send a notification webhook if a user was actually created, not just updated).

    Authentication Patterns:

    The authorization header supports common authentication methods:

    • No Authentication: Leave the authorization header empty when connecting to endpoints that don't require credentials, such as internal services or pre-authenticated URLs

    • Bearer Token: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...

    • API Key: X-API-Key: secret-key-123 or Authorization: ApiKey sk-prod-xyz

    circle-info

    The "No Auth" option is useful for internal microservices, pre-authenticated webhook URLs, or endpoints behind a VPN that handle authentication at the network level.

    Limitations:

    • Only JSON payloads are supported (no XML, form-data, or other formats)

    • Authentication must be header-based (OAuth flows requiring user interaction are not supported)

    • Response parsing requires valid JSON if "Add Response to Output Entities" is enabled

    chevron-rightExample: Suspend Okta users via REST APIhashtag

    The Send REST Request action can call Okta lifecycle APIs to suspend users, enabling workflows that handle leave of absence (LOA) scenarios before native Suspend action support is available.

    Configuration:

    Setting
    Value

    hashtag
    Send Notification

    Triggers email notifications and webhooks based on lifecycle events and action success or failure. Notifications can be added to any action type under Edit Action > Action Notification Settings.

    Example Use Cases:

    • Alert IT staff when provisioning is complete

    • Notify managers of access changes

    • Create a service desk ticket for any manual steps

    • Send standardized notifications using custom templates across workflows

    Setting
    Description

    Email Template Selection:

    When configuring email notifications (either as a Send Notification action or in Action Notification Settings), you can choose which template to use:

    • Default template: Uses the built-in event-specific template based on the lifecycle event being processed

    • Custom template: Uses a reusable custom email template you've created, allowing consistent messaging across multiple workflows

    Custom templates support the same placeholders as event-specific templates, enabling dynamic content like identity names, workflow names, and action results. See for placeholder reference and template management.

    hashtag
    Reset Password

    Resets user passwords in target systems. Configuration options and behavior vary by integration.

    Example Use Cases:

    • Reset passwords for new users who must change on first login

    • Enforce password rotation policies

    • Recover from account lockouts

    Setting
    Description
    circle-info

    Password complexity requirements, unique identifier options, and force-change-on-login settings vary by integration. See the integration-specific guides below for configuration details.

    Supported Integrations:

    Password output (Early Access)

    When password output is enabled, the new password generated by this action is available to subsequent workflow actions via transformer expressions. Use {EntityType.password} syntax, such as {ActiveDirectoryUser.password} in a Send REST Request payload.

    This is useful in workflows where a password reset must be confirmed or forwarded to an external system, such as an employee self-service portal.

    circle-exclamation

    Passwords are passed as plaintext to downstream actions. Use this only when the workflow requires it, and ensure receiving endpoints use HTTPS. Passwords are never written to the Veza database. They are available in memory during workflow execution only and are redacted from stored job payloads before persistence.

    circle-info

    Early Access: Password output requires the LCM_INCLUDE_PASSWORD_IN_OUTPUT_ENTITIES feature flag. Contact Veza support to enable it for your tenant.

    hashtag
    Create Access Review

    Automatically creates access review campaigns during lifecycle events. This action bridges Lifecycle Management with Veza Access Reviews, enabling automated certification workflows triggered by identity lifecycle changes.

    circle-info

    CREATE_ACCESS_REVIEW is a control-plane action that executes within the Veza platform. The action creates review campaigns asynchronously: first queuing the review, then creating it based on the defined certification plan.

    Example Use Cases:

    • Review contractor access 30 days after onboarding to ensure appropriate permissions

    • Certify elevated permissions after role changes or promotions

    • Trigger periodic access reviews based on employment anniversaries

    Setting
    Description

    Certification Creation Plan Configuration:

    The Certification Creation Plan is the core configuration element for CREATE_ACCESS_REVIEW:

    Parameter
    Required
    Description
    circle-info

    Early Access: Multi-level approval (second and third level reviewers) is in Early Access and may require Veza support to enable.

    How It Works:

    1. A lifecycle event triggers a workflow containing the CREATE_ACCESS_REVIEW action

    2. The action evaluates the Certification Creation Plan against the identity that triggered the event

    3. A review campaign is queued in Veza Access Reviews

    4. The review campaign is created and assigned to the designated reviewers

    Event Notifications:

    CREATE_ACCESS_REVIEW generates two notification events:

    Event
    Timing
    Description

    You can configure email notifications or webhooks for both events to track review creation progress. See for configuration details.

    circle-info

    LCM-triggered reviews have special behaviors including automatic exclusion of unchanged results and entity type matching requirements. See for complete behavior documentation.

    Related Topics:

    • : Behavior, filtering, entity matching, and troubleshooting

    • : Configuring certification plans and managing reviews

    • : Managing birthright entitlements included in reviews

    hashtag
    Rotate Key

    Rotates cryptographic keys in Azure Key Vault by creating a new key version. The action targets one or more named keys in a specified vault and runs rotations concurrently (up to five keys in parallel). Each key's result is reported individually, so partial success is possible.

    circle-info

    NHI feature: ROTATE_KEY is part of Veza's Non-Human Identity (NHI) management capabilities and requires the NHI_ROTATE_KEY feature flag. It does not require an LCM license. For ad-hoc key rotation outside of a scheduled workflow, use the key entity's action menu in Access Intelligence.

    Example Use Cases:

    • Rotate Azure Key Vault keys on a scheduled basis to meet compliance requirements

    • Automatically rotate keys when a service account is offboarded

    • Trigger key rotation after a security incident

    Setting
    Description

    Supported Integrations:

    Integration
    Notes

    Required Azure permissions:

    The Veza app registration must have the rotate operation on the target Key Vault. The List permission used for extraction is not sufficient. Grant the rotation permission using the model the vault uses:

    • RBAC model (recommended): Assign the Key Vault Crypto Officer role to the Veza app registration on the target vault. This role includes the keys/rotate permission.

    • Access policy model (legacy): Under Key Permissions, add Rotate, Get Rotation Policy, and Set Rotation Policy.

    Microsoft recommends RBAC over access policies for new vault deployments. See and the .

    Result placeholders (for notification templates):

    Placeholder
    Description
    Support continuous synchronization to keep identities up-to-date
  • Enable email notifications and webhooks for action-related events

  • Allow for complex decision trees through nested conditions
  • Execute actions in a defined order when conditions are met

  • Can trigger multiple actions when met

  • Can spawn additional conditions after successful action completion

  • Assign cost center groups: cost_center eq "IT-1234"
  • Add to contractor AD groups: employment_type eq "CONTRACTOR"

  • MANAGE_RELATIONSHIPS: Grant/revoke access
  • CREATE_EMAIL: Generate email addresses

  • DEPROVISION_IDENTITY: Disable/remove access

  • DELETE_IDENTITY: Permanently delete accounts

  • CUSTOM_ACTION: Integration-specific operations (e.g., ServiceNow table inserts)

  • WRITE_BACK_EMAIL: Update source system

  • PAUSE: Add workflow delays

  • SEND_REST_REQUEST: Make HTTP requests to external APIs

  • SEND_NOTIFICATION: Trigger alerts

  • RESET_PASSWORD: Reset existing user password

  • CREATE_ACCESS_REVIEW: Trigger access review campaigns

  • ROTATE_KEY: Rotate cryptographic keys in Azure Key Vault

  • Grant entitlements by assigning Access Profiles according to the Worker's department

    username

    {username}@evergreentrucks.com

    email

    username

    {username}@evergreentrucks.com

    display_name

    display_full_name

    {display_full_name}

    given_name

    first_name

    {first_name}

    sur_name

    last_name

    {last_name}

    country_code

    work_location

    {work_location}

    job_title

    job_title

    {job_title}

    primary_group_dn

    -

    CN=Domain Users,CN=Users,DC=evergreentrucks,DC=local

    -

    CN=Terminated Users,OU=Evergreen Groups,DC=evergreentrucks,DC=local

    Disable accounts while preserving audit trails

    Permanently remove accounts (databases, cleanup)

    Execute ServiceNow-specific operations

    Update HRIS with newly created email addresses

    Add delays between workflow actions

    Make HTTP requests to external APIs

    Trigger emails or webhooks on action events

    Reset user passwords in target systems

    Automatically create certification campaigns

    Rotate Azure Key Vault keys (NHI feature)

    Shared transformation rules across multiple sync actions

    Action Synced Attributes

    Create, format, and modify the specified target attributes. See for more details

    When enabled together with Remove Existing Relationships, restricts removal to relationships that were originally granted as birthright entitlements (created via a Manage Relationships action). Relationships added by other means are preserved.

    Access Profiles

    Static Access Profiles to assign to the identity. See for more details about managing birthright entitlements.

    Dynamic Access Profiles

    Attribute transformer expressions that resolve to Access Profile names to assign at runtime based on user attributes. See for details.

    Shared transformation rules across multiple deprovisioning actions

    Action Synced Attributes

    Target attributes to create, format, and modify for de-provisioned entities

  • Contractor account removal after project completion

  • Shared transformation rules across multiple delete actions

    Sync Action Names

    Reference to previous Sync Identities actions for unique identifier resolution

    OracleDB

  • GitHub

  • AWS RDS (MySQL, PostgreSQL, OracleDB)

  • Custom Application

  • Log audit records for compliance tracking
  • Execute webhooks to coordinate multi-system workflows

  • Extract response data (like user IDs) from external systems for use in downstream actions

  • Request body in JSON format. Supports for attribute substitution: {"user": "{name}", "email": "{email}"}

    Timeout

    Maximum wait time in seconds for the request to complete (default: 60 seconds)

    Only Send if Any Upstream Changes

    When enabled, the request is only executed if a previous action in the workflow modified or created resources

    Add Response to Output Entities

    Extract entity data from the API response to make available for downstream actions

    Output Entity Type

    Type of entity to create from response (required if "Add Response to Output Entities" is enabled)

    Response Entity Attribute

    JSON path to extract from response using dot notation (e.g., result extracts response.result, data.user extracts response.data.user)

    Response ID Attribute

    Attribute name containing the entity identifier in the response (defaults to id)

    Response Name Attribute

    Attribute name containing the entity display name in the response (defaults to name)

    Execute from Insight Point

    Optional data source to route the request through an Insight Point agent. Leave empty to execute from the control plane. See for configuration.

    placeholders in the payload before the REST call is made.

    Display name (displayName)

    department

    Department

    title

    Job title

    user_principal_name

    UPN (login name) (userPrincipalName)

    street_address

    Street address (streetAddress)

    : Replace entire resources; requires JSON payload; sets
    AnyChanges
    flag
  • PATCH: Partially update resources; requires JSON payload; sets AnyChanges flag

  • DELETE: Remove resources; payload optional; sets AnyChanges flag

  • HEAD: Metadata query without response body; payload optional; sets AnyChanges flag

  • OPTIONS: Describes communication options for the target resource; payload optional; sets AnyChanges flag

  • Custom Headers: Any header format your API requires

  • Timeout applies to entire request; no automatic retry on failure
  • POST, PUT, and PATCH methods require non-empty, valid JSON payloads

  • https://{your-okta-domain}/api/v1/users/{employee_id | FROM_ENTITY_ATTRIBUTE,"OktaUser","employee_id","login"}/lifecycle/suspend

    HTTP Method

    POST

    Authorization Header

    SSWS {your-okta-api-token}

    JSON Payload

    {}

    Key notes:

    • User identification: Okta's suspend API requires the user's Okta ID or login. Use the FROM_ENTITY_ATTRIBUTE transformer to look up the Okta login from the Authorization Graph based on a source attribute like employee_id.

    • Authorization format: Okta API tokens must be prefixed with SSWS (e.g., SSWS 00abcd1234...), not Bearer.

    • Empty payload: The suspend endpoint requires a POST with an empty JSON object {} as the payload.

    Example workflow condition:

    To suspend users when their SOI lifecycle status changes to a leave state:

    Unsuspending users: To reactivate suspended users, create a separate workflow condition with the unsuspend endpoint:

    This approach is used when the SOI lifecycle status changes back to an active state (e.g., lifecycle_status eq "Employed").

    (Action notification settings) Configure email alerts on action success and/or failure for the specified recipients

    Webhook Configuration

    Configure webhooks to trigger on success and/or failure by specifying the URL to send the payload and optional auth header for the POST request

    Veza Action

    Select an existing Veza Action for pre-configured webhook or email settings

    Automatically review access for high-risk roles or sensitive systems
  • Create access reviews when users join specific departments or teams

  • Yes

    Specifies which data to use: Current Data, Most Recent Snapshot, or a specific snapshot

    Reviewer Assignment

    No

    Primary level reviewer assignment (manager, resource owners, or designated reviewers)

    Fallback Reviewers

    No

    Reviewers to assign if automatic assignment fails

    Due Date Offset

    No

    Time from certification start when reviews are due

    Creation Mode

    No

    Create and Publish (starts immediately) or Create Draft (requires manual publishing)

  • Reviewers receive notifications to certify or revoke the identified access

  • Continue Actions If Any Error (Condition)

    All actions in a condition

    If any action fails, the workflow continues instead of stopping

    Continue Workflow on Error (Action)

    One specific action

    If this action fails, the workflow continues to the next step instead of stopping

    account_name

    display_full_name

    {display_full_name}

    distinguished_name

    first_name, last_name

    CN={first_name} {last_name},OU=Minnetonka,OU=US,OU=Evergreen Staff,DC=evergreentrucks,DC=local

    account_name

    display_full_name

    {display_full_name}

    distinguished_name

    first_name, last_name

    CN={first_name} {last_name},OU=Evergreen Termination,OU=Evergreen Staff,DC=evergreentrucks,DC=local

    Sync Identities

    Create or update user accounts in target systems

    Manage Relationships

    Assign or remove group memberships, roles

    Create Email

    Generate email addresses via email providers

    Entity Type

    The data source and type of identity to sync (e.g., Okta User, Azure AD User)

    Create Allowed

    Whether new identities can be created if not found

    Attribute Sync

    Keep attributes in sync even after initial creation

    Access Profiles to Remove

    Static Access Profiles whose entitlements will be revoked from the identity when the action runs. Use this to selectively remove specific access without affecting other existing entitlements.

    Dynamic Access Profiles to Remove

    Attribute transformer expressions that resolve to Access Profile names to remove at runtime. Enables attribute-based removal logic, such as removing access profiles derived from a user's previous department or role. See Dynamic Access Profiles for expression syntax.

    Remove Existing Relationships

    When enabled, removes all current relationships created by Lifecycle Management actions before applying the new set. Use Access Profiles to Remove instead when you need to selectively revoke specific entitlements rather than all existing ones.

    Entity Type

    The type of identity to create an email

    Action Synced Attributes

    Define how email attributes should be formatted. See Transformers for more details

    Sync Action Name

    Reference to sync action for conflict resolution

    Entity Type

    The data source and target entity type to disable, delete, or lock

    Remove All Relationships

    Whether to remove existing group memberships and role assignments

    Relationships to Create

    Access Profile to apply after deprovisioning (e.g., move to specific groups)

    Entity Type

    The data source and target entity type to permanently delete

    Unique Identifiers

    Attributes used to locate the user account for deletion (e.g., username, email, or account ID)

    Attribute Transformers

    Define how to identify and match the user for deletion. See Transformers for more details

    Entity Type

    The target integration and entity type to operate on

    Table

    (ServiceNow) The table name to insert records into (e.g., incident, sc_request, u_custom_table)

    Attribute Transformers

    Map source attributes to target table fields. See Transformers for more details

    ServiceNow

    Insert records into any ServiceNow table

    ServiceNow Provisioning

    Entity Type

    The type of entity to update with email information

    Duration in seconds

    Number of seconds to pause the workflow

    Webhook URL

    Target REST endpoint URL. Supports variable substitution using {attribute_name} syntax in URL path and query parameters

    HTTP Method

    Request method: GET, POST, PUT, PATCH, DELETE, HEAD, or OPTIONS. Methods are case-insensitive and automatically converted to uppercase. POST, PUT, and PATCH require a JSON payload

    Authorization Header

    Required authentication header (e.g., Bearer <token>, X-API-Key: <key>, or custom authorization format)

    URL: https://api.example.com/users/{email}/provision?dept={department}
    Payload: {"name": "{first_name} {last_name}", "role": "{job_title | UPPER}"}
    {"roleName": "{$form_field.role_name}", "roleId": "{$form_field.role_id}"}

    email

    Primary email address (mail)

    given_name

    First name (givenName)

    sur_name

    Surname (last name) (sn)

    {
      "result": {
        "user_id": "12345",
        "display_name": "John Doe"
      }
    }

    Notification Type

    Select Email, Webhook, or Service Now

    Email Template

    (Email notifications only) Select the template to use for the notification. Choose "Default template" to use the event-specific template, or select a custom email template. See Custom Email Templates for details

    Recipients

    (Email notifications only) Specify email addresses to receive the notification, or select user attributes containing email addresses

    Entity Type

    The target integration and entity type (e.g., AD User, Okta User)

    Certification Creation Plan

    Defines the review scope, certification criteria, and reviewer assignment. See configuration details below

    Access Workflow

    Yes

    The Access Workflow ID where the certification is created

    Name

    No

    Name of the certification. Supports attribute transformers (e.g., Review for {name}). Custom names appear in Dry Run results

    CREATE_ACCESS_REVIEW_QUEUED

    Immediate

    Sent when the review creation is queued

    CREATE_ACCESS_REVIEW

    Asynchronous

    Sent when the review campaign is created

    Data Source

    The Azure Key Vault datasource providing credentials for the vault

    Vault Name

    Name of the Azure Key Vault (3–24 characters, alphanumeric and hyphens, must start and end alphanumeric)

    Key Names

    One or more key names to rotate. Each key gets a new version; the previous version is not deleted

    Azure Key Vault

    Only supported provider. Requires an Azure datasource configured with Key Vault permissions

    {{ROTATED_KEY_COUNT}}

    Count of keys successfully rotated

    {{FAILED_KEY_COUNT}}

    Count of keys that failed to rotate

    Activity Log
    Delete Identity
    NHI Security > Lifecycle Management
    Send REST Request
    ServiceNow Provisioning
    Custom Application with Send REST Payload
    Custom Certificate Configuration
    Using Custom Certificates
    Standard Active Directory attributes available for substitution
    Transformers
    catalog definition
    catalog definition
    Notification Templates
    Active Directory
    Azure AD
    Okta
    Notification Templates
    Access Reviews from Lifecycle Management
    Access Reviews from Lifecycle Management
    Access Reviews documentation
    Access Profiles
    Azure RBAC vs. access policiesarrow-up-right
    Azure Key Vault integration

    user_principal_name

    primary_group_dn

    Common Synced Attributes

    Remove Only Birthright Relationships

    Common Synced Attributes

    Common Synced Attributes

    JSON Payload

    display_name

    Webhook URL

    lifecycle_status eq "Leave" or lifecycle_status eq "Parental Leave" or lifecycle_status eq "Garden Leave"
    https://{your-okta-domain}/api/v1/users/{employee_id | FROM_ENTITY_ATTRIBUTE,"OktaUser","employee_id","login"}/lifecycle/unsuspend

    Notification Settings

    Data Source

    Deprovision Identity
    Delete Identity
    Custom Action
    Write Back Email
    Pause
    Send REST Request
    Send Notification
    Reset Password
    Create Access Review
    Rotate Key
    Transformers
    Access Profiles
    Dynamic Access Profiles
    transformer syntax
    Custom Application with Send REST Payload

    Lifecycle Management FAQ

    Frequently asked questions about Veza's Lifecycle Management for automated identity and access governance

    This document addresses common questions about Lifecycle Management (LCM) for automated identity and birthright access governance across systems and applications.

    hashtag
    Overview

    The questions in this document are designed to introduce key concepts and address common questions that often arise during deployments. Please contact your support team with additional questions and feedback. Note that specific functionality may depend on the features and integrations enabled in your environment.

    hashtag
    Learning more

    Your Lifecycle Management configuration can be straightforward or complex, depending on your organization's needs. To learn more about general implementation patterns, see and .

    See also:

    hashtag
    Dry Run Testing

    chevron-rightCan I test policy changes before making them live?hashtag

    Yes, dry run simulations let you safely preview policy changes before deployment. Dry run evaluates workflow logic and shows what actions would occur without making actual changes to target systems. You can test a single identity or run bulk dry runs against multiple identities with filtering options.

    circle-info

    For step-by-step instructions, see .

    chevron-rightWhat does a dry run test?hashtag

    Dry run evaluates the selected identity against all workflows in a policy and shows:

    • Matched workflows: Which workflows triggered and why

    • Planned actions: What provisioning or deprovisioning would occur, including full action configuration details

    hashtag
    Policy Configuration

    chevron-rightWhat happens when an action fails in a workflow?hashtag

    When an action fails, the entire workflow retries on the next policy run—not just the failed action. All actions (including previously successful ones) re-execute unless configured with "Skip if action has already been run".

    Retry configuration (API only):

    Property
    Description
    Default
    chevron-rightWhat is the "Skip if action has already been run" option?hashtag

    This safety mechanism prevents the same action from executing multiple times for the same identity, even if the workflow re-triggers. LCM tracks successful completions per identity and skips the action if already completed.

    Enable for one-time actions:

    • Create Email, Welcome notifications, Initial Password Setup, One-time provisioning

    Disable for repeatable actions:

    chevron-rightHow do I enable a new lifecycle management policy?hashtag

    Creating a policy involves configuring your source(s) of identity, workflows, and actions to automate lifecycle events:

    1. Create Policy: Go to Lifecycle Management > Policies > Create Policy

    chevron-rightHow do I temporarily disable workflows or actions?hashtag

    You can pause or disable specific workflows and actions within a policy for safer testing and gradual rollouts, without deleting or modifying the underlying configuration. Disabled workflows and actions are skipped during policy execution, and the policy editor displays them with a "Disabled" tag.

    Disabled workflows are still evaluated during Dry Run simulations by default, so you can test workflow logic before enabling it in production.

    circle-info

    For step-by-step instructions, see

    chevron-rightWhat is the Continuous Sync option, and why should I use it?hashtag

    Continuous Sync keeps a provisioned user's source attributes automatically updated in target systems after initial provisioning, rather than syncing only once at creation time.

    Why use Continuous Sync:

    • Keeps downstream systems current - Attribute changes (title, manager, department) propagate automatically

    chevron-rightWhy are secondary sources of identity optional if an admin can add multiple primary sources?hashtag

    Secondary sources of identity are not redundant, despite the availability of multiple primary sources. They serve fundamentally different purposes:

    Primary Sources of Identity (SOI):

    • Must all be of the same entity type (e.g., all Worker entities from Workday).

    hashtag
    Access Profiles

    chevron-rightWhat are Access Profiles, and how do they work with LCM?hashtag

    Access Profiles are collections of entitlements (groups, roles, or permissions) that can be automatically assigned to users based on their attributes. They serve two key functions:

    • Birthright Access: Automatically assigned through policy workflows during joiner/mover/leaver events via the Manage Relationships action

    hashtag
    Safety and Limits

    chevron-rightWhat safety mechanisms prevent unintended mass changes?hashtag

    Lifecycle Management provides two independent safety limit mechanisms that can be used individually or together for layered protection:

    Hard Limit (formerly "Safety Limit") — A reactive mechanism that halts processing during execution after the configured number of identity changes has been reached. When triggered, no further identity changes are processed for the current policy run.

    • Configured with max_identities_affected_count

    chevron-rightHow do I configure parallel execution settings?hashtag

    Lifecycle Management supports parallel workflow processing, allowing multiple workflows to run concurrently. Configure parallel execution using the private API endpoint at /api/private/lifecycle_management/parallel_execution_settings.

    Key settings include:

    • jobs: Maximum concurrent policy jobs

    chevron-rightWhy does the Hard Limit get exceeded when running tasks in parallel?hashtag

    When a policy runs with parallel execution enabled, the Hard Limit may be exceeded by a small amount. This happens because multiple tasks that are already running can complete before the system detects that the threshold has been reached. Once the overshoot is detected, all remaining tasks are halted and blocked for manual review.

    The amount of overshoot is proportional to the number of tasks allowed to run at the same time. For example, if parallel execution allows 10 concurrent tasks and the Hard Limit is set to 5, up to approximately 10 changes may complete before the remaining tasks are blocked.

    This is expected behavior. The Hard Limit still acts as a safeguard by halting all remaining tasks once the overshoot is detected.

    To enforce the Hard Limit with no overshoot, set the parallel task count to 1. Each task will finish and report back before the next one begins, giving the system an accurate count at every step. The tradeoff is that tasks will take longer to complete.

    hashtag
    Notifications

    chevron-rightWhen should I use policy-level notifications vs action-level notifications?hashtag

    Lifecycle Management supports notifications at two levels with different capabilities:

    Feature
    Policy-Level
    Action-Level

    hashtag
    Access Request Notifications

    chevron-rightDo administrators need to configure notifications for Access Request events?hashtag

    Yes, administrators must explicitly configure notifications for Access Request events. Notifications can be configured for six event types (created, action run, completed, failed, state changed, approver assigned), with recipients selected from five categories: Approvers, Creator, Beneficiary, Watchers, or specific email addresses.

    circle-info

    Behavior Change (August 2025): Previously, notifications were automatically sent to all recipient types for all events. The default was removed for better control. Existing customers had settings automatically migrated to match the old behavior.

    chevron-rightHow do I control or stop Access Request notifications?hashtag

    Access Request notifications are sent to five recipient categories: Approvers, Creator, Beneficiary, Watchers, and other_emails (specific addresses). Administrators receive notifications only when explicitly configured in one of these roles—there is no "all admins" setting.

    Common issue: If you're receiving unwanted notifications, you're likely configured as a default approver for Access Requests with to_approvers=true enabled. For customers migrated from pre-August 2025, all recipient types are enabled by default.

    Solutions:

    chevron-rightDoes the notification body support rich text HTML?hashtag

    Yes, notification templates fully support HTML and CSS. You can use standard HTML markup, inline styles, images, and links in all Lifecycle Management and Access Request notification templates.

    Key Capabilities

    • Standard HTML tags (<html>, <body>

    hashtag
    Data Processing and Extraction

    chevron-rightWhen does LCM evaluate identities for CSV/OAA data sources?hashtag

    LCM processes identities from CSV and OAA-based data sources only when specific events occur, unlike native integrations that can pull data on demand.

    Trigger Events for Identity Processing

    For CSV and OAA data sources, extraction and identity evaluation occur when:

    1. New Data Push - A new CSV file is uploaded or an OAA payload is pushed

    chevron-rightWhat happens when an extraction takes longer than the scheduled interval?hashtag

    Veza has built-in guardrails to prevent overlapping extraction jobs for the same data source. A new extraction job is enqueued only if there is no pending or in-progress job for that data source.

    Job Scheduling Behavior

    When an extraction is scheduled to run every hour but takes longer than one hour to complete:

    hashtag
    CSV Upload and Transformations

    chevron-rightCan I transform CSV data during upload for LCM?hashtag

    Yes, Veza supports data transformations when uploading CSV files for HRIS and application data sources. This allows you to manipulate and format data during the upload process without preprocessing.

    Supported Transformations

    Transformations can be applied to CSV columns during mapping configuration:

    • String Operations: Concatenation, splitting, case conversion

    hashtag
    Integrations

    chevron-rightDoes Veza support custom Active Directory attributes and moving users between organizational units (OU)?hashtag

    Yes, Lifecycle Management fully supports both custom Active Directory attributes and moving users between organizational units.

    Custom Attributes: You can synchronize custom AD attributes (like hrdivisionID, cost center, or other organizational data) from your source of identity. First, add custom properties in your AD integration configuration (in the Custom Properties step of the integration wizard), then map them in your LCM policy's Sync Identity action using attribute transformers. After enabling custom attributes for the integration, they can be set for new and existing users just as standard AD attributes.

    Moving Between OUs: You can move users between organizational units by modifying the user's distinguishedName

    circle-info

    For details on configuring LCM integrations, including setup instructions, extraction requirements, and supported capabilities, see .

    chevron-rightWhat is the difference between sources of identity and target applications in Veza Lifecycle Management?hashtag

    There are two different types of integrations supported by Lifecycle Management:

    • Source of Identity (SOI): These are authoritative systems that provide definitive information about user identities and their status within an organization. Common examples include Human Resource Information Systems (HRIS), corporate directories, and Identity Providers (IdPs). While Veza typically does not require write permissions to these sources, some can also serve as provisioning targets and support write-back of newly created user attributes, such as an email address.

    chevron-rightDo target applications have special integration requirements?hashtag

    Veza provides comprehensive coverage for target applications through a multi-faceted approach:

    • Native Integrations: Veza offers native, full CRUD-based provisioning and deprovisioning for numerous applications and platforms, including IdPs, directories, cloud platforms, business and productivity applications, databases, developer platforms, and more. These integrations typically provide deeper control over entitlement management and support user lifecycle actions (onboarding/offboarding) beyond basic account creation.

    chevron-rightWhat Source of Identity (SOI) systems are supported?hashtag

    Veza LCM supports a variety of Source of Identity systems to serve as authoritative sources for user identity information.

    Built-in SOI Systems include:

    • Beeline - Shift-based workforce management system

    chevron-rightWhat SCIM attributes does Veza support?hashtag

    Veza supports SCIM 2.0 attributes for both read-only data extraction and Lifecycle Management synchronization. The specific attributes available depend on whether you're extracting data for the Access Graph or synchronizing user/group information through LCM.

    Core User Attributes

    For LCM Synchronization, Veza supports the standard SCIM user attributes including:

    • Identity & Authentication

    chevron-rightWhich SOI systems support email writeback?hashtag

    Email writeback capability allows LCM to update the Source of Identity with newly created email addresses during provisioning workflows.

    Systems Supporting Email Writeback

    Currently, only a limited subset of integrations support email writeback actions:

    • Oracle HCM

    chevron-rightWhat target systems are supported natively and via SCIM?hashtag

    Veza LCM supports provisioning across target systems through native integrations and SCIM protocol compatibility.

    Supported Categories

    Native Integrations (Full lifecycle support):

    • Identity Providers: Okta, Azure AD, Active Directory, AWS SSO

    hashtag
    Advanced Configuration

    chevron-rightWhat optional features can be enabled for LCM?hashtag

    Lifecycle Management includes core workflow capabilities, with additional features available depending on your configuration needs. Some features that were previously gated are now available by default, while others require configuration or enablement.

    chevron-rightAre password reset and access review actions available by default?hashtag

    Yes, the Reset Password and Create Access Review workflow actions are now generally available as standard LCM functionality. These action types appear as available options when configuring workflow actions in LCM policies.

    Additionally, Secondary Sources of Identity are also now generally available, allowing you to configure secondary identity sources in policies without requiring special enablement.

    circle-info

    chevron-rightHow does Veza determine the active state and other attributes when an identity has both primary and secondary sources?hashtag

    When a policy identity has both primary and secondary sources, Veza determines which source's attributes to display in the Identities table—including the identity's active state—based on the is_active field from each source. The is_active field typically represents employment or account status (e.g., an active employee in Workday, an active contractor in a secondary system).

    Default behavior:

    hashtag
    Lifecycle Management Troubleshooting

    chevron-rightHow can I export or view the complete JSON configuration of a policy?hashtag

    The Show Raw JSON optional feature allows you to view and export the complete JSON representation of a Lifecycle Management policy for debugging and troubleshooting purposes.

    Accessing Raw JSON

    To view the raw JSON configuration:

    1. Go to Lifecycle Management

    chevron-rightWhat roles can access Lifecycle Management and Access Profiles?hashtag

    Access to Lifecycle Management and Access Profiles is managed through Veza's role-based permission system. User permissions can vary based on their assigned roles and team membership, enabling separation of duties and security controls across the platform.

    Only Administrator roles have full management capabilities for LCM policies and Access Profiles. All other roles provide various levels of read-only access, with some specialized roles offering additional functionality like integration management or review assignment.

    Role Categories and Access Levels

    Veza roles fall into two availability tiers that determine their LCM access capabilities. Generally Available roles can be assigned without additional configuration, while Early Access roles

    chevron-rightWhy isn't my workflow triggering for certain users?hashtag

    Several factors can prevent workflows from triggering. Here are some recommended diagnostic steps:

    1. Attempt a Dry Run Simulation

  • Access profiles: Which access profiles would be assigned or removed

  • Dry run does not test integration connectivity or validate that actions would succeed. It only evaluates whether workflow conditions are met.

    circle-info

    For step-by-step instructions, see Test policies with dry run.

    no_retry_for_failed_workflow

    Disables automatic retry when set to true

    false

    max_retries_for_failed_workflow

    Maximum number of retry attempts

    10

    circle-exclamation

    Example: If Azure Sync fails after AD notifications, the workflow retries and notifications send again. Enable "Skip if action has already been run" on notification actions to prevent duplicates.

    • Sync Identity, Manage Relationships, Deprovision Identity

    circle-info

    Key behaviors:

    • Only successful completions mark an action as "run"—failed actions continue to retry

    • Condition-based skips don't affect state (action runs when conditions become true)

    • Clear action history via API to force re-execution

    Configure Source: Select your HR system or IDP as the data source
  • Add Workflows: Define triggers for Joiner, Mover, and Leaver scenarios

  • Configure Actions: Set up provisioning, deprovisioning, and access assignments

  • Test and Activate:

    • Run dry-runs to test the policy configuration

    • Click Publish to save the policy (it will be in Initial state)

    • Click the Actions menu (⋮) and select Start to activate the policy (Running state)

  • circle-info

    For detailed step-by-step instructions, see Lifecycle Management Policies

    .

    Reduces drift - Avoids stale or inconsistent values that impact compliance

  • Supports policy logic - Updated attributes can trigger dynamic policy conditions

  • Configuration overview:

    Continuous Sync requires configuration at multiple levels:

    1. Action level: Enable "Update active users" on Sync Identity actions

    2. Attribute level: Select "Set for new and existing users" for attributes that should stay synchronized

    circle-info

    For complete configuration details, recommended settings, and best practices, see Attribute Synchronization.

    Create the core identity records that drive lifecycle management workflows.

  • All primary sources are treated as authoritative for identity creation.

  • Changes in any primary source trigger lifecycle workflows.

  • Secondary Sources of Identity:

    • Can be of different entity types than the primary source (e.g., HRIS Employee records enriching Workday Workers).

    • Primarily used for enrichment rather than identity creation.

    • Support two distinct operational modes via the only_enrich_existing flag:

      • Enrichment mode (only_enrich_existing = true): Only adds attributes to existing identities created from primary sources.

      • Hybrid mode (only_enrich_existing = false): Can create new Policy Identities if they don't exist in primary sources.

    Secondary sources of identity provide flexibility in scenarios that require:

    Data Enrichment from Non-Identity Sources: Organizations may need data from systems that shouldn't be authoritative for the identity lifecycle. Secondary sources support scenarios where core identities originate from HR (primary), and additional attributes come from departmental systems (secondary). Not all employees may exist in all systems. For instance:

    • HRIS system (primary) defines who exists in the organization.

    • A secondary system provides office location or manager metadata.

    • The secondary system shouldn't create/delete identities but should enrich them.

    Cross-System Correlation: Secondary sources create attribute mappings to link records across systems using custom correlation logic. This supports multiple matching strategies:

    • Exact match on identifier (e.g., employee_id = worker_id)

    • Email-based correlation

    • Composite key matching (multiple attributes)

    • Custom correlation expressions

      For example, correlating employee_id from an HRIS system with a worker_id in Workday, or matching users across systems based on email addresses.

    Just-in-Time (JIT) Access: Available for request through Access Requests, with provisioning managed by LCM policy

    Access Profile Types (Business Role, Entitlement, Application, etc.) determine behavior and can be configured hierarchically for fine-grained access control.

    circle-info

    For complete documentation including configuration, profile types, ownership, and best practices, see Access Profiles and Access Profile Types.

  • Enabled with enable_change_limit

  • Predictive Safety Limit — A proactive mechanism that blocks all changes before execution begins if the system predicts the number of workflow runs will exceed configured thresholds. This prevents unintended mass processing when upstream attribute changes in a Source of Identity would trigger unnecessary Joiner, Mover, or Leaver workflows.

    • Configured with max_workflow_runs_count

    • Enabled with enable_predictive_change_limit

    Safety limits can be configured at both the policy level and individual workflow level for granular control.

    For example, if you have 1,000 users in your organization:

    • A Hard Limit of 100 identities will halt processing after 100 identity changes have been executed

    • A Predictive Safety Limit of 200 workflow runs will block the entire policy run before it starts if more than 200 workflow executions are predicted

    In both cases, a warning notification is sent, and manual intervention is required before processing can continue.

    triangle-exclamation

    Safety limits are critical for production environments. Never proceed in re-enabling a policy without careful consideration. Safety Limits can be overridden with explicit API parameters.

    Parallel Execution and Paused Tasks

    When parallel workflow processing is enabled, paused tasks (waiting for approval, delays, etc.) free up running slots, allowing other tasks to start. This can create scenarios where many paused tasks bypass the safety limit check when they resume.

    To mitigate this, configure the max_paused_slots setting to limit how many paused tasks can free up running slots:

    • First N paused tasks: Free up slots (allowing new tasks to start)

    • Additional paused tasks: Remain counted as "running" (preventing new tasks from starting)

    This setting is configured via the parallel execution settings API (see Parallel Execution Settings below).

    Recovery Options

    When a Predictive Safety Limit triggers:

    • Navigate to the Blocked Tasks page to review what would have changed

    • Run blocked tasks individually or in bulk to manually approve execution

    • Abandon blocked tasks to discard them without executing

    • Resume processing after acknowledging the warning

    When a Hard Limit triggers:

    • Review the warning details in the policy event log

    • Run dry-runs to understand the impact on affected identities

    • If changes are expected (e.g., bulk onboarding):

      • Temporarily increase limits via API

      • Process with disregard_change_limit=true or disregard_predictive_change_limit=true parameter

      • Reset limits after processing

    • If changes are unexpected:

      • Check source system for data quality issues

      • Review recent policy configuration changes

    workflows: Maximum concurrent workflows per job

  • access_requests: Maximum concurrent access request workflows

  • max_paused_slots: Limits how many paused tasks can free up running slots (prevents safety limit bypass)

  • circle-info

    For complete API reference, configuration examples, and detailed explanation of max_paused_slots behavior, see Parallel Execution Settings API.

    Individual action success or failure

    Available data

    Entity details (names, emails, attributes)

    Action metadata (name, type, status) only

    Configuration

    Policy Settings > Notifications

    Edit Action > Action Notification Settings

    Best for

    User and stakeholder communications

    Simple operational confirmations

    Choosing the right level:

    • Use policy-level for user-facing notifications requiring entity context (usernames, emails, relationship details). These support dynamic recipients and rich placeholders like {{ENTITY_NAME}} and {{LOGIN_NAME}}.

    • Use action-level for operational monitoring where you only need confirmation that an action completed, without entity-specific details.

    circle-info

    The {{LOGIN_PASSWORD}} placeholder is only available for CHANGE_PASSWORD and RESET_PASSWORD events, not for identity creation events.

    For configuration details, see:

    • Policy Notifications - Event-based notifications with entity context

    • Send Notification Action - Action-level notification configuration

    • Notification Templates - Placeholders and custom templates

    Configure notifications through Lifecycle Management > Settings > Access Request Settings > Notifications, or via the Access Request Settings API. Note that there is no "all admins" option—administrators receive notifications only when explicitly configured as approvers, creators, watchers, or listed in other_emails.
    circle-exclamation

    Without notification configuration, users and approvers won't receive alerts about access request activities.

  • Remove your role: Stop being an approver, creator, or watcher for requests

  • Modify settings: Disable specific recipient groups (e.g., to_approvers=false) in Lifecycle Management > Settings > Access Request Settings > Notifications

  • Disable events: Turn off entire event types if not needed

  • For programmatic configuration, contact your Customer Success Manager or Veza support.

    ,
    <br>
    ,
    <div>
    ,
    <p>
    , etc.)
  • CSS styling (inline or embedded)

  • Images (embedded attachments or external URLs)

  • Links and formatting

  • Custom branding and layouts

  • Template Management

    • Templates are currently managed via the Notification Templates API

    • All built-in templates use HTML structure

    • Support for small image attachments (under 64kb, base64-encoded)

    • External image linking for high-resolution content

    circle-info

    For complete setup instructions, HTML examples, default templates, placeholder reference, and detailed formatting guidance, see Notification Templates for Lifecycle Management

  • Policy Configuration Changes - Any policy update forces a re-extraction

  • Manual Extraction - LCM explicitly queues an extraction job

  • Key Behaviors

    • No Automatic Refresh: CSV/OAA sources don't automatically fetch new data - they only process what was last pushed

    • Re-extraction Uses Same Data: If extraction is triggered without a new push, it re-processes the same payload

    • Policy Updates Trigger Processing: Changes to policy configuration (e.g., UID mapping, workflow conditions) will force re-extraction of existing data

    CSV-Specific Details

    • CSV files are converted to OAA payloads upon upload

    • The original CSV is not stored; only the OAA transformation is retained

    • Re-extraction processes the stored OAA payload, not the original CSV

    Common scenarios when working with CSV Uploads:

    Daily CSV Upload:

    • New file uploaded → Extraction triggered → Identities processed

    • Workflows evaluate all identities based on the "Sync on changes only" setting

    No New Upload for 7 Days:

    • No extraction occurs automatically

    • Existing data is NOT re-evaluated unless:

      • Policy is modified

      • Manual extraction is triggered

    Policy Configuration Modified:

    • Policy change → Forced extraction of existing data

    • All identities re-evaluated with a new configuration

    • Can trigger workflows even without data changes

    Important Considerations

    circle-exclamation

    Unexpected Re-processing: If workflows unexpectedly re-trigger for all users without a new CSV upload, check if:

    • Someone modified the policy configuration

    • UID mapping was changed

    • Workflow conditions were updated

    These changes trigger re-extraction of the datasource and can cause all identities to be re-evaluated.

    circle-info

    "Sync on changes only" Setting: When enabled, only identities with changed attributes or newly matching trigger conditions will have workflows executed, even during re-extraction.

    If an extraction job is already running, scheduled extractions during that time are skipped
  • The next extraction runs at the first scheduled time after the previous job completes

  • Skipped scheduled runs are dropped—they don't queue up for later execution

  • For example, supposing an hourly extraction schedule, where an extraction starts at 2:00 AM but takes 4 hours and 30 minutes to complete:

    • 2:00 AM - Extraction job starts

    • 3:00 AM - Scheduled extraction skipped (job still running)

    • 4:00 AM - Scheduled extraction skipped (job still running)

    • 5:00 AM - Scheduled extraction skipped (job still running)

    • 6:00 AM - Scheduled extraction skipped (job still running)

    • 6:30 AM - Initial extraction completes

    • 7:00 AM - Next scheduled extraction runs successfully

    In this scenario, the scheduled jobs at 3:00 AM, 4:00 AM, 5:00 AM, and 6:00 AM are dropped because an extraction was already in progress.

    This behavior applies to all extraction schedules and is not specific to any particular integration or API. It is intended to prevent system resource exhaustion from simultaneous extractions.

    Note that each data source is evaluated independently, and extractions for different data sources can run concurrently. Manual extraction triggers will also be skipped if an extraction is already running for that data source

    circle-info

    If you notice that extractions are consistently taking longer than your scheduled interval, consider adjusting the schedule frequency to accommodate typical extraction durations. Monitor extraction times in the integration activity logs to determine optimal scheduling.

  • Data Formatting: Date formatting, number formatting

  • Conditional Logic: If/then conditions based on column values

  • Template Mappings: Create complex attribute values from multiple columns

  • Use Cases

    1. Combine Multiple Columns: Create full names from first/last name columns

    2. Extract Data: Gather domains from email address values

    3. Format Dates: Convert date formats to match target system requirements

    4. Apply Business Logic: Set department codes based on location values

    5. Generate IDs: Create unique identifiers from existing data

    Example Transformations

    Concatenate columns:

    Extract email domain:

    Pad employee ID with zeros:

    Important notes:

    • Conditional logic is not supported: CSV transformations do not support IF statements or conditional expressions

    • CSV headers are automatically converted to lowercase, with underscores (e.g., "First Name" becomes "first_name")

    • Use {{column_name}} syntax to reference CSV columns in attribute transformations within a Lifecycle Management Policy.

    Technical Implementation Note

    When you upload a CSV file:

    1. The CSV is immediately converted to OAA (Open Authorization API) format

    2. Only the OAA payload is stored, not the original CSV

    3. Any re-extraction uses this stored OAA payload

    4. This ensures consistent data processing across all extraction cycles

    circle-info

    Transformations are applied during the data extraction process and don't modify your original CSV file. The transformed values are what LCM uses for identity processing and provisioning.

    circle-exclamation

    CSV transformations have different capabilities than full LCM transformers - they support basic string operations and functions but not conditional logic or complex expressions.


    attribute in a Sync Identity action. For example, use
    CN={{login_name}},OU=Disabled Users,DC=company,DC=com
    to move terminated employees to a disabled users OU, or dynamically construct paths like
    CN={{login_name}},OU={{department}},OU=Users,DC=company,DC=com
    for department-based placement. This is useful for mover and leaver scenarios where users need to be relocated based on employment status or organizational changes.
    circle-info

    For configuration details, supported attributes, and setup instructions, see [Active Directory Lifecycle Management](integrations/active-directory.md).

    Target Applications: These are the applications, platforms, and systems where Veza can programmatically provision and deprovision user access. This includes a wide range of systems from cloud infrastructure (AWS, Azure) and databases (Snowflake, MySQL) to SaaS applications (Salesforce, Atlassian Cloud).

    SCIM Support: Lifecycle Management supports any application that supports SCIM provisioning standards as target applications. You can enable Lifecycle Management for compatible targets using the generic SCIM Integration

  • Open Authorization API (OAA): Custom Application Templates and custom REST API actions enable provisioning and deprovisioning for the long tail of custom, legacy, and homegrown applications.

  • Any non-SCIM application that offers a suitable interface for user provisioning and deprovisioning can be supported. Customers, partners, or Veza can easily develop integrations with custom applications.

    Coupa CCW - Cloud-based business spend management platform
  • Custom IDP - Generic identity provider integration for custom authentication systems

  • Custom HRIS (OAA) - Custom HR systems using Open Authorization API (OAA) templates

  • HiBob - Modern HR platform for businesses

  • Ivanti Neurons HR - HR platform for onboarding/offboarding and self-service

  • Okta - Cloud-based identity and access management service

  • Oracle HCM - Human Capital Management cloud solution

  • Workday - Cloud-based human capital management platform

  • CSV Upload and Open Authorization API templates provide an extensible framework for adding custom identity providers or HRIS platforms.

    • Custom OAA Integration - Any system can be configured as an SOI through the Open Authorization API

    • Custom Principal - Support for non-traditional identity sources

    circle-info

    For integration setup for each target system, see the LCM Integrations Guide

    :
    userName
    (required),
    id
    ,
    externalId
    ,
    active
  • Contact Information: emails, phoneNumbers, addresses, ims

  • Personal Information: displayName, givenName, familyName, middleName, nickName

  • Professional Information: title, userType, locale, timezone, preferredLanguage

  • For Read-Only Extraction, all SCIM core attributes are captured, including additional metadata such as profileUrl, photos, createdAt, and lastModified.

    Group Attributes

    Veza supports standard SCIM group attributes including displayName, id, externalId, groupType, description, and members for both extraction and LCM operations.

    Extension Attributes

    Enterprise Extension Support: Veza can synchronize Enterprise Extension attributes including department, division, employeeNumber, costCenter, organization, and manager for both read-only extraction and LCM.

    Custom Extensions: Veza automatically discovers and extracts all custom vendor-specific SCIM extension attributes for read-only purposes (they appear in the Access Graph). You can synchronize Custom vendor extensions when Extension Schema Discovery is enabled, by referencing the normalized attribute name when constructing a transformer for Lifecycle Management or Access Requests.

    circle-info

    For the complete attribute reference with data types, requirements, and LCM capabilities, see the SCIM Lifecycle Managementarrow-up-right integration guide.

    Workday

    How Email Writeback Works

    1. LCM creates an email account in the target system (e.g., Exchange, Azure)

    2. The newly created email address is written back to the user's record in the SOI

    3. This ensures the SOI remains the authoritative source with current email information

    circle-exclamation

    Email writeback requires write permissions to the Source of Identity system, which may require additional configuration and security considerations. Refer to the specific integration documentation for setup requirements.

    circle-info

    For detailed configuration instructions, see the integration-specific documentation in the LCM Integrations.

    Collaboration: Google Workspace, GitHub, Exchange

  • Business Apps: Salesforce, ServiceNow, Workday, SAP ECC

  • Data Platforms: Snowflake, Veza Platform

  • SCIM 2.0 Support:

    • Generic SCIM (any compliant system)

    • Includes Atlassian Cloud, Oracle Fusion Cloud, and SwiftConnect

    circle-check

    The entire Veza application catalog can potentially be LCM-enabled. Contact your Customer Success Manager to discuss enabling specific applications.

    circle-info

    For all validated integrations and their capabilities, see LCM Integrations.

    Automatically reset passwords during user lifecycle events (termination, role changes)

    Available by default

    Automated Access Reviews

    Trigger compliance access reviews automatically based on user changes

    Available by default

    Multiple Identity Sources

    Use multiple HR systems or identity providers with priority handling

    Available by default

    Send REST Request Action

    Custom REST API action for provisioning workflows to integrate with external systems and custom applications

    Available by default

    Enhanced Dashboard View

    Consolidated overview dashboard showing policies, activity, and integration status at a glance

    Available by default

    Access Request & Approvals

    Enables users to request access with automated approval workflows and provisioning

    Requires configuration - contact your Customer Success Manager

    Policy JSON Viewer

    View and export full policy configurations in JSON format for debugging and technical support

    Available upon request

    Active Identity Source Prioritization

    When an identity has both primary and secondary sources, prioritizes displaying attributes from whichever source has an active user status, rather than always defaulting to the primary source

    Early Access - contact Veza support to enable

    Alias-Based Attribute Lookup

    Reference entity attributes in policies using custom aliases (e.g., $employee.email) to disambiguate when the same entity type appears as both a source of identity and a sync target

    Early Access - contact Veza support to enable

    circle-info

    Features marked "Available by default" are standard LCM functionality. "Early Access" features may require Veza support to enable. Contact your Customer Success Manager to discuss configuration options.

    These features were previously in Early Access but are now standard functionality available to all tenants.

    Always displays the primary source attributes if a primary source exists

  • Only displays secondary source attributes if no primary source exists

  • Enhanced behavior (Early Access):

    Primary Source Status
    Secondary Source Status
    Displayed Attributes Source

    Active

    Any

    Primary source

    Inactive

    Active

    Secondary source

    This prioritization ensures the Identities table reflects the most current source of truth, which is particularly useful in scenarios where:

    • A user's primary identity becomes inactive (e.g., employee terminated in Workday, is_active=false)

    • The secondary identity source remains active (e.g., contractor account still active in secondary system, is_active=true)

    • You need visibility into which system currently maintains active identity information

    Example scenario: An employee terminates from their full-time position (primary Workday identity becomes is_active=false) but continues as a contractor (secondary source remains is_active=true). With enhanced behavior enabled, the Identities table displays attributes from the contractor system, reflecting their current active status.

    circle-info

    Early Access: Enhanced identity source prioritization may require Veza support to enable. Contact your Customer Success Manager for availability.

    >
    Policies
  • Select a policy to view its details

  • Click Show Raw JSON in the policy header actions (if enabled for your tenant)

  • The complete policy configuration displays in a modal window

  • Use the Copy JSON button to copy the configuration to your clipboard

  • What's Included

    The raw JSON export includes the complete policy structure:

    • Policy metadata (name, description, state, version information)

    • Workflow configurations and trigger conditions

    • Action definitions and parameters

    • Transformer mappings and attribute configurations

    • Data source associations and identity mappings

    • Access profile assignments and permissions

    • Safety limit configurations

    • Notification templates and settings

    • Secondary identity source configurations

    The raw JSON feature is useful for providing complete policy configurations when working with support teams, and understanding the underlying policy structure. Use this option for creating backups of complex policy configurations and debugging complex policy behaviors.

    circle-info

    This feature may require enablement for your tenant. Contact your Customer Success Manager if the "Show Raw JSON" button does not appear in your policy header actions.

    circle-exclamation

    The raw JSON contains sensitive configuration information. Only share policy JSON with authorized personnel and avoid exposing credentials or other sensitive data when sharing configurations.

    For more information, see Policy Settings in the Policies documentation.

    require enablement by Veza support before assignment.

    Role

    Availability

    Team Support

    LCM Policies & Workflows

    Access Profiles

    Special Capabilities

    Administrator

    Generally Available

    Root only

    Full access: Create, edit, delete policies and workflows

    Understanding Team-Based Access Control

    Team assignments determine the scope of data and integrations that users can access within their assigned roles. The Root team provides unrestricted access to all integrated data providers, while custom teams limit access to specific team-assigned integrations.

    Root Team Access grants users visibility into all LCM policies across every integrated provider, the ability to create Access Reviews and manage system-wide configuration, and access to administrative roles that require platform-wide permissions. This team is essential for users who need comprehensive oversight of lifecycle management operations.

    Non-Root Team Access restricts users to viewing only LCM policies relevant to integrations within their team's scope. These users cannot create Access Reviews or access system-wide administrative features, but they can effectively manage policies and profiles within their designated integration boundaries. Non-root teams are recommended for departmental teams or application-specific access control scenarios.

    Multi-Team Membership allows users to belong to multiple teams simultaneously, with potentially different roles in each team. Users can switch their "active team" context to access different sets of policies, profiles, and data based on each team's integration scope. This supports organizational structures where users need varied access levels across different systems.

    Automated Role Assignment Through SSO

    Organizations using Single Sign-On can streamline user management by automatically assigning Veza roles based on Identity Provider (IdP) group membership. This integration uses SAML/OIDC claims to map IdP groups to specific Veza team and role combinations using the format Team SSO Alias:role name (where Team SSO Alias and role name are placeholders—do not include curly braces).

    For example, the following IdP group-to-role mappings are valid:

    • Root:admin → assigns the "admin" role in the "Root" team

    • Engineering Team:operator → assigns the "operator" role in the "Engineering Team"

    • Finance:viewer → assigns the "viewer" role in the "Finance" team

    Single IdP groups can map to multiple team/role combinations, and administrators can configure default fallback assignments for users without specific group mappings.

    This approach reduces manual user management overhead while ensuring consistent role assignments based on organizational structure. For SSO configuration guidance, see Role Mapping for Single Sign-On.

    Implementation Considerations

    When planning role assignments, consider that policy and Access Profile management requires Administrator privileges, which are restricted to Root team members. The Veza interface automatically adjusts to user permissions—non-administrator users won't see create, edit, or delete options for resources they cannot modify.

    All permissions are enforced consistently across both the web interface and API endpoints, ensuring security regardless of access method. Organizations should carefully plan team structures and role assignments to balance operational efficiency with security requirements, particularly when implementing SSO-based automated role assignment.

    circle-info

    For role descriptions, team management guidance, and SSO integration details, see User Roles and Permissions, Team Management, and User and Team Management APIs.

    View details for the specific identity in question
  • Review the messages field for workflow evaluation details

  • Check which conditions passed/failed

  • Check for Common Issues

    • Condition Mismatch: Identity attributes don't match workflow conditions

    • Policy State: Policy might be in PAUSED or PENDING state

    • Source Data: Identity might not exist in the configured data source

    • Safety Limits: Changes blocked due to a Hard Limit (during processing) or a Predictive Safety Limit (before processing begins). Check the Blocked Tasks page for predictive limit blocks

  • Validate Identity Attributes

    • Verify the identity has the expected attribute values

    • Ensure attribute mappings are configured correctly

    • Check for data quality issues in the source system

  • Policy States

    Policies can be in the following states:

    • INITIAL - Newly created, not yet running

    • RUNNING - Active and processing identities

    • DRY_RUN - Testing mode without making changes

    • PAUSED - Temporarily stopped

    • PENDING - Awaiting configuration or approval

    circle-info

    The Dry Run messages will explicitly state why each workflow did or didn't match.

    Triggers on

    Capability

    What It Enables

    Availability

    Workday, Okta, and Active Directory
    Implementation and Core Concepts
    Managing Identities
    Policies
    Attribute Transformers
    Integrations
    Test policies with dry run
    Disable workflows and actions
    Lifecycle Management Integrations overview

    Lifecycle events (CREATE_IDENTITY, ADD_RELATIONSHIP, etc.)

    {{FirstName}} {{LastName}}
    SPLIT(Email, "@")[1]
    LEFT_PAD({{employee_id}}, "0", 6)

    Password Reset Workflows

    Validate workflow trigger conditions

    Active

    Active

    Primary source (default)

    Inactive

    Inactive

    Primary source (default)

    Full access: Create, edit, delete Access Profiles and types

    System configuration, user management

    Operator

    Generally Available

    Root, Non-root

    Read-only access to policies and workflows

    Read-only access to Access Profiles

    Can create Access Reviews (Root team only)

    Access Reviewer

    Generally Available

    Root only

    Read-only access for assigned review purposes only

    Read-only access for assigned review purposes only

    Limited to assigned review contexts

    SCIM Provisioner

    Generally Available

    Root only

    Read-only access to policies and workflows

    Read-only access to Access Profiles

    SCIM 2.0 user lifecycle management

    Integrations Manager

    Generally Available

    Root, Non-root

    Read-only access to policies and workflows

    Read-only access to Access Profiles

    Integration configuration and management

    Integration Owner

    Generally Available

    Root, Non-root

    Read-only access to understand integration impacts

    Read-only access to profile assignments

    Specific integration ownership and monitoring

    Access Reviews Monitor

    Generally Available

    Root only

    Limited read-only access for monitoring review activities

    Limited read-only access for monitoring purposes

    Access Review progress monitoring without modification

    Viewer

    Early Access

    Root, Non-root

    Read-only access for monitoring

    Read-only access for monitoring

    Requires ROOT_TEAM_VIEWER feature for Root team access

    Watcher

    Early Access

    Root only

    Read-only access for monitoring (cannot make changes)

    Read-only access for monitoring

    View Review Configurations without modification capability

    Auditor

    Early Access

    Root only

    Read-only access for audit and compliance purposes

    Read-only access for audit purposes

    Export audit logs and compliance reporting

    Re-assigner

    Early Access

    Root only

    Read-only access with ability to re-assign review results

    Read-only access with review result re-assignment

    Can reassign Access Review results to different reviewers

    OAA Push

    Early Access

    Root, Non-root

    Read-only access for monitoring

    Read-only access for monitoring

    Upload Open Authorization API (OAA) payloads

    Programmatic Key Manager

    Early Access

    Root, Non-root

    Read-only access for monitoring

    Read-only access for monitoring

    Programmatic API key lifecycle management

    OAA CSV Manager

    Early Access

    Root, Non-root

    Limited access for CSV integration management

    Limited access related to CSV integrations

    Required for CSV Upload integration management

    NHI Security Admin

    Early Access

    Root only

    Read-only access with focus on non-human identity security features

    Read-only access with NHI focus

    Non-Human Identity security dashboards and risk assessments

    spinner

    Transformer Reference

    Reference guide for supported transformation functions and parameters for attribute transformers

    This page includes a comprehensive list of all supported transformer functions and parameters. Some commonly used transformation functions include:

    • Replacing a character with a different one

    • Removing domains from email addresses

    • Transforming to upper, lower, title, sentence, camel, or snake case

    • Using a substring from the original value

    See for configuration details, or for terminology definitions.

    circle-info

    A subset of these functions is also supported in identity mapping template expressions. See for the supported list.

    hashtag
    Reading the Examples

    Each transformer below includes three types of examples:

    1. Basic Usage: Shows the transformer used alone with a simple source attribute

    2. In a Pipeline: Demonstrates chaining multiple transformers together

    3. Example: Provides practical context from Lifecycle Management scenarios

    Copy-paste these examples directly into your attribute transformer configuration, adjusting attribute names to match your source of identity.

    chevron-rightAPPENDhashtag

    hashtag
    APPEND

    This transformer enables string concatenation by appending text to the end of attribute values during identity provisioning workflows.

    Parameter Format

    Characters (STRING, required)

    chevron-rightASCIIhashtag

    hashtag
    ASCII

    Removes non-printable characters and replaces non-ASCII characters with their closest ASCII equivalents. Particularly useful for Active Directory sAMAccountName and other legacy systems with strict character requirements.

    Note: The ASCII transformer performs operations on the base level, not the extended set.

    chevron-rightASSUME_TIME_ZONEhashtag

    hashtag
    ASSUME_TIME_ZONE

    Interprets the incoming time string as if it were in the specified time zone, then converts it to a UTC time. (example: if the input is "1/2/2025 11pm" and the defined time zone is America/Los_Angeles the function will treat "1/2/2025 11pm" as local time in Los Angeles and output the corresponding UTC time "1/3/2025 7am")

    chevron-rightCOUNTRY_CODE_ISO3166hashtag

    hashtag
    COUNTRY_CODE_ISO3166

    Transforms country code to ISO 3166 format.

    defines codes for the representation of country names, dependent territories, and their subdivisions

    chevron-rightDATE_ADJUSThashtag

    hashtag
    DATE_ADJUST

    Adjusts date values based on hour, day, month, and year inputs. Provides full control over all time components for complex date manipulation.

    Parameter Format

    chevron-rightDATE_ADJUST_DAYhashtag

    hashtag
    DATE_ADJUST_DAY

    A convenience transformer that adjusts date values by a specified number of days only. Use this for simple day-based calculations; use DATE_ADJUST for more complex adjustments involving hours, months, or years.

    Parameter Format

    hashtag
    DATE_FORMAT

    Description: Converts a timestamp to a formatted date string using Go time layout syntax.

    Syntax: {attribute | DATE_FORMAT, "layout"} or {attribute | DATE_FORMAT, "output_layout", "input_layout"}

    Parameters:

    Parameter
    Required
    Type
    Description

    Returns: String — the formatted date/time string

    Examples:

    Input
    Expression
    Output
    circle-exclamation

    Go Time Layout Syntax: Unlike most date formatting systems that use patterns like YYYY-MM-DD, Go uses a reference date: Mon Jan 2 15:04:05 MST 2006. Each component of this specific date represents a format element.

    hashtag
    Go date format reference

    The reference date Mon Jan 2 15:04:05 MST 2006 breaks down as:

    Component
    Reference Value
    Meaning

    hashtag
    Common format patterns

    Output Format
    Go Layout String
    Example Output

    hashtag
    Named format aliases

    Instead of Go layout strings, you can use these named aliases (case-insensitive):

    Alias
    Equivalent Layout
    Example Output

    For the full list of named aliases (including kitchen, rfc822, rfc1123, stamp, and others), see Go's standard .

    circle-info

    The win32 format outputs the Windows FILETIME format used by Active Directory for attributes like accountExpires. This represents 100-nanosecond intervals since January 1, 1601 UTC.

    Notes:

    • Input must be a valid timestamp

    • Use with or for timezone handling

    • When parsing non-standard input dates, provide both output and input layouts

    chevron-rightFIRST_Nhashtag

    hashtag
    FIRST_N

    Picks the first N characters of a string. Useful for creating shortened identifiers or initials.

    Parameter Format

    Length (NUMBER, required): Number of characters to return

    chevron-rightFROM_ENTITY_ATTRIBUTEhashtag

    hashtag
    FROM_ENTITY_ATTRIBUTE

    Looks up an entity in the Veza graph by matching an attribute value, then returns a different attribute from that entity. This is useful for cross-referencing related entities, such as finding a manager's email from an employee ID.

    Parameter Format

    chevron-rightFROM_MANY_ENTITIES_ATTRIBUTEhashtag

    hashtag
    FROM_MANY_ENTITIES_ATTRIBUTE

    Looks up multiple entities in the Veza graph by matching an attribute value, then returns a specified attribute from all matching entities as a combined string. Use this when an input value may match multiple entities and you need all their values.

    Parameter Format

    chevron-rightLANGUAGE_RFC5646hashtag

    hashtag
    LANGUAGE_RFC5646

    Transforms language to RFC 5646 format.

    defines "Tags for Identifying Languages." It does not contain a fixed, exhaustive list of language codes within the RFC itself. Instead, it specifies the structure and rules for constructing language tags, which are then built using codes from various external standards and registries.

    chevron-rightLAST_Nhashtag

    hashtag
    LAST_N

    Picks the last N characters of a string, where N is the number of characters to return.

    Parameter Format

    Length (NUMBER, required)

    chevron-rightLEFT_PADhashtag

    hashtag
    LEFT_PAD

    Adds padding characters to the left side of a string until it reaches the specified length. Useful for creating fixed-width identifiers.

    Parameter Format

    Length (NUMBER, required): Target string length Pad (CHARACTER, optional): Character to use for padding (default is space)

    chevron-rightLOOKUPhashtag

    hashtag
    LOOKUP

    Transforms a value using a lookup table defined in your Lifecycle Management policy. Essential for mapping codes to descriptive values or standardizing data across systems.

    Parameter Format

    hashtag
    LOWER

    Description: Converts all characters in a string to lowercase.

    Syntax: {attribute | LOWER}

    Parameters:

    Parameter
    Required
    Type
    Description

    Returns: String — the input value with all characters converted to lowercase

    Examples:

    Input
    Expression
    Output

    Notes: Only affects alphabetic characters. Numbers and special characters pass through unchanged.

    chevron-rightLOWER_SNAKE_CASEhashtag

    hashtag
    LOWER_SNAKE_CASE

    Transforms string to lowercase with underscores.

    Parameter Format

    None (no parameters required)

    chevron-rightLOWER_CAMEL_CASEhashtag

    hashtag
    LOWER_CAMEL_CASE

    Transforms a string to lower camel case (also known as dromedaryCase). The first word is lowercase, and subsequent words are capitalized with no separators.

    Parameter Format

    chevron-rightNEXT_NUMBERhashtag

    hashtag
    NEXT_NUMBER

    Generates a set of alternative values by appending sequential numbers. Essential for handling unique constraint conflicts during user provisioning. Returns an empty string first, then "2", "3", "4", etc.

    Parameter Format

    chevron-rightNEXT_NUMBER Max Lengthhashtag

    hashtag
    NEXT_NUMBER Max Length

    This transformer supports an optional maximum length parameter to simplify complex username generation workflows. It automatically evaluates combined strings (such as {first_name}_{last_name}) and truncates to specified character limits before appending numerical suffixes.

    chevron-rightNOWhashtag

    hashtag
    NOW

    Returns the current time in UTC. An optional argument indicates the outgoing time format; by default, the RFC3339 format.

    Parameter Format

    String (Optional) - Format

    chevron-rightPHONE_NUMBER_E164hashtag

    hashtag
    PHONE_NUMBER_E164

    Transforms a phone number into the E.164 format.

    E. 164 numbers are formatted [+] [country code] [subscriber number including area code] and can have a maximum of fifteen digits. Parameter Format

    chevron-rightPREPENDhashtag

    hashtag
    PREPEND

    Adds text to the beginning of attribute values. Useful for adding prefixes like organization codes or type indicators.

    Parameter Format

    Characters (STRING, required): Text to add at the beginning

    chevron-rightRANDOM_ALPHANUMERIC_GENERATORhashtag

    hashtag
    RANDOM_ALPHANUMERIC_GENERATOR

    Generates a random alphanumeric string.

    Parameter Format

    chevron-rightRANDOM_INTEGERhashtag

    hashtag
    RANDOM_INTEGER

    Generates a random integer value between specified minimum and maximum values (inclusive). Useful for creating unique test IDs or temporary identifiers. Does not require an input value.

    Parameter Format

    chevron-rightRANDOM_NUMBER_GENERATORhashtag

    hashtag
    RANDOM_NUMBER_GENERATOR

    Generates a random number string.

    Parameter Format

    Length (NUMBER, required)

    chevron-rightRANDOM_STRING_GENERATORhashtag

    hashtag
    RANDOM_STRING_GENERATOR

    Generates a random string.

    Parameter Format

    Length (NUMBER, required)

    chevron-rightREMOVE_CHARShashtag

    hashtag
    REMOVE_CHARS

    Removes all instances of specified characters from a string. Useful for cleaning up data and removing unwanted punctuation or special characters.

    Parameter Format

    chevron-rightREMOVE_DIACRITICShashtag

    hashtag
    REMOVE_DIACRITICS

    Removes diacritics (accents, etc.) from input string.

    Parameter Format

    None (no parameters required)

    chevron-rightREMOVE_DOMAINhashtag

    hashtag
    REMOVE_DOMAIN

    Removes the domain portion from an email address, leaving only the username. One of the most frequently used transformers for generating usernames from email addresses.

    Parameter Format

    chevron-rightREMOVE_WHITESPACEhashtag

    hashtag
    REMOVE_WHITESPACE

    Removes all whitespace characters (spaces, tabs, newlines) from a string. Useful for creating compact identifiers and ensuring data consistency.

    Parameter Format

    hashtag
    REPLACE_ALL

    Description: Replaces all occurrences of a substring with a replacement string.

    Syntax: {attribute | REPLACE_ALL, "search", "replacement"}

    Parameters:

    Parameter
    Required
    Type
    Description

    Returns: String — the input with all occurrences of search replaced by replacement

    Examples:

    Input
    Expression
    Output

    Notes:

    • Case-sensitive matching

    • To remove characters, use an empty string as the replacement: REPLACE_ALL, "x", ""

    • For removing multiple different characters, consider instead

    chevron-rightRIGHT_PADhashtag

    hashtag
    RIGHT_PAD

    Right pads a string with a character.

    Parameter Format

    Length (NUMBER, required),

    chevron-rightSENTENCE_CASEhashtag

    hashtag
    SENTENCE_CASE

    Capitalizes only the first non-whitespace character of a string and lowercases the rest. Preserves any leading whitespace. Useful for standardizing sentence-formatted text fields.

    Parameter Format

    chevron-rightSPLIThashtag

    hashtag
    SPLIT

    Splits a string and returns the string at the given index.

    Parameter Format

    Split String (STRING, required), Index (NUMBER, required)

    hashtag
    SUB_STRING

    Description: Extracts a portion of a string starting at a specified position.

    Syntax: {attribute | SUB_STRING, offset, length}

    Parameters:

    Parameter
    Required
    Type
    Description

    Returns: String — the extracted substring

    Examples:

    Input
    Expression
    Output

    Notes:

    • Index is 0-based (first character is position 0)

    • If offset + length exceeds the string length, returns characters up to the end

    • For extracting just the first N characters, consider as a simpler alternative

    chevron-rightTITLE_CASEhashtag

    hashtag
    TITLE_CASE

    Capitalizes the first letter of each word and lowercases the rest. Also handles dot-separated values by capitalizing the first letter of each segment. Useful for formatting names and titles.

    Parameter Format

    chevron-rightTRIMhashtag

    hashtag
    TRIM

    Removes leading and trailing whitespace from a string. Essential for cleaning up data from external systems.

    Parameter Format

    None (no parameters required)

    chevron-rightTRIM_CHARShashtag

    hashtag
    TRIM_CHARS

    Removes all specified characters from both the beginning and end of a string. Useful for removing padding characters or cleaning up formatted data.

    Parameter Format

    Characters (STRING, required): String containing all characters to remove from both ends

    chevron-rightTRIM_CHARS_LEFThashtag

    hashtag
    TRIM_CHARS_LEFT

    Removes all specified characters from the beginning of a string only. Useful for removing leading zeros or prefixes.

    Parameter Format

    Characters (STRING, required): String containing all characters to remove from the beginning

    chevron-rightTRIM_CHARS_RIGHThashtag

    hashtag
    TRIM_CHARS_RIGHT

    Removes all specified characters from the end of a string only. Useful for removing trailing characters or suffixes.

    Parameter Format

    hashtag
    UPPER

    Description: Converts all characters in a string to uppercase.

    Syntax: {attribute | UPPER}

    Parameters:

    Parameter
    Required
    Type
    Description

    Returns: String — the input value with all characters converted to uppercase

    Examples:

    Input
    Expression
    Output

    Notes: Only affects alphabetic characters. Numbers and special characters pass through unchanged.

    chevron-rightUPPER_CAMEL_CASEhashtag

    hashtag
    UPPER_CAMEL_CASE

    Transforms a string to upper camel case.

    Parameter Format

    None (no parameters required)

    chevron-rightUPPER_SNAKE_CASEhashtag

    hashtag
    UPPER_SNAKE_CASE

    Transforms string to uppercase with underscores.

    Parameter Format

    None (no parameters required)

    chevron-rightUTC_TO_TIME_ZONEhashtag

    hashtag
    UTC_TO_TIME_ZONE

    Interprets the incoming time string as if it were in UTC and then converts it to the specified time zone. (example: if the input is "1/2/2025 11pm" and the specified time zone is America/Los_Angeles the function will treat "1/2/2025 11pm" as the UTC time zone and output the corresponding America/Los_Angeles

    chevron-rightUUID_GENERATORhashtag

    hashtag
    UUID_GENERATOR

    Generates a UUID.

    A UUID (Universally Unique Identifier) is a 128-bit identifier used to uniquely identify information in computer systems.

    Parameter Format

    chevron-rightZERO_PADhashtag

    hashtag
    ZERO_PAD

    Adds left zero-padding to numerical string values until they reach the specified length. If the input is non-numeric, it passes through unchanged. If the numeric value is already longer than the specified length, it remains unchanged.

    Parameter Format

    Basic Usage

    • Destination Attribute: email

    • Formatter: {username}

    • Then Apply: | APPEND, "@company.com"

    • Result: If username = john.smith, output is [email protected]

    In a Pipeline

    • Destination Attribute: display_name

    • Formatter: {first_name}

    • Then Apply: | APPEND, " " | APPEND, "{last_name}"

    • Result: If first_name = John and last_name = Smith, output is John Smith

    Example

    • Destination Attribute: user_principal_name

    • Formatter: {first_name}.{last_name}

    • Then Apply: | LOWER | APPEND, "@contoso.com"

    • Use case: Generate standardized email addresses for Azure AD user provisioning

    Parameter Format

    None (no parameters required)

    Basic Usage

    • Destination Attribute: username

    • Formatter: {first_name}

    • Then Apply: | ASCII

    • Result: If first_name = Łukasz, output is Lukasz

    In a Pipeline

    • Destination Attribute: login_name

    • Formatter: {first_name}.{last_name}

    • Then Apply: | ASCII | LOWER | REMOVE_WHITESPACE

    • Result: If first_name = José María, last_name = García, output is josemaria.garcia

    Example

    • Destination Attribute: sAMAccountName

    • Formatter: {first_name}

    • Then Apply: | ASCII | SUB_STRING, 0, 1 | LOWER

    • Use case: Generate Active Directory account names that comply with character restrictions while handling international names (converts "Łukasz" to "l")

    Parameter Format

    String - Time Zone String (Optional) - Format

    Usage Example

    Input:

    {activation_date | ASSUME_TIME_ZONE, "America/Los_Angeles"}

    {activation_date | ASSUME_TIME_ZONE, "America/Los_Angeles", "RFC3339"}

    {activation_date | ASSUME_TIME_ZONE, "-07:00"}

    {activation_date | ASSUME_TIME_ZONE, "-07:00", "RFC3339"}

    Parameter Format

    Format (STRING, optional): [alpha2, alpha3, numeric], defaults to alpha2

    Usage Example

    Input:

    {"US" | COUNTRY_CODE_ISO3166, "alpha3"}

    Output:

    USA

    Parameter
    Type
    Required
    Description

    Hours

    INTEGER

    Yes

    Number of hours to add (use negative values to subtract)

    Days

    INTEGER

    No

    Number of days to add

    Months

    INTEGER

    No

    Usage Example

    Input:

    {activation_date | DATE_ADJUST, +1, 2, 3, -1}

    Adjusts the date by adding 1 hour, 2 days, 3 months, and subtracting 1 year.

    {activation_date | DATE_ADJUST, +1, 2, 3, -1, "RFC3339"}

    {activation_date | DATE_ADJUST, +1, 2, 3, -1, "2006-01-02T15:04:05Z07:00"}

    Example

    If the input date is 2021-01-01 00:00:00 and you apply DATE_ADJUST, +1, 2, 3, -1, the output is 2020-04-03 01:00:00 (added 1 hour, 2 days, 3 months, subtracted 1 year).

    Parameter
    Type
    Required
    Description

    Days

    INTEGER

    Yes

    Number of days to add (use negative values to subtract)

    Format

    STRING

    Usage Example

    Input:

    {activation_date | DATE_ADJUST_DAY, +1}

    Adds 1 day to the activation date.

    {activation_date | DATE_ADJUST_DAY, +1, "RFC3339"}

    {activation_date | DATE_ADJUST_DAY, +1, "2006-01-02T15:04:05Z07:00"}

    Example

    If the input date is 2021-01-01 00:00:00 and you apply DATE_ADJUST_DAY, +1, the output is 2021-01-02 00:00:00.

    Format of the input data (if non-standard)

    {hire_date | DATE_FORMAT, "Jan 2, 2006"}

    Mar 15, 2024

    2024-03-15T14:30:00Z

    {hire_date | DATE_FORMAT, "dateonly"}

    2024-03-15

    03-15-2024

    {start_date | DATE_FORMAT, "2006-01-02", "01-02-2006"}

    2024-03-15

    01

    2-digit month (01-12)

    Month

    1

    1 or 2-digit month (1-12)

    Month

    Jan

    3-letter abbreviation

    Month

    January

    Full month name

    Day

    02

    2-digit day (01-31)

    Day

    2

    1 or 2-digit day (1-31)

    Day

    _2

    Space-padded day

    Hour

    15

    24-hour format (00-23)

    Hour

    03 or 3

    12-hour format (01-12 or 1-12)

    Minute

    04

    Minutes (00-59)

    Second

    05

    Seconds (00-59)

    AM/PM

    PM

    Uppercase AM/PM

    AM/PM

    pm

    Lowercase am/pm

    Timezone

    MST

    Timezone abbreviation

    Timezone

    -0700

    Numeric offset

    Timezone

    Z0700

    Z for UTC, offset otherwise

    02/01/2006

    15/03/2023

    LDAP/AD format

    20060102150405Z

    20230315143025Z

    Human readable

    Jan 2, 2006

    Mar 15, 2023

    Date only

    2006-01-02

    2023-03-15

    2006-01-02 15:04:05

    2023-03-15 14:30:25

    rfc3339

    2006-01-02T15:04:05Z07:00

    2023-03-15T14:30:25-07:00

    win32

    Active Directory FILETIME

    133234218250000000

    Basic Usage
    • Destination Attribute: initial

    • Formatter: {first_name}

    • Then Apply: | FIRST_N, 1

    • Result: If first_name = John, output is J

    In a Pipeline

    • Destination Attribute: username

    • Formatter: {first_name}.{last_name}

    • Then Apply: | FIRST_N, 1 | LOWER

    • Result: If first_name = John, output is j

    Example

    • Destination Attribute: username

    • Formatter: {first_name}

    • Then Apply: | FIRST_N, 1 | LOWER

    • Use case: Create abbreviated usernames in the format "j.smith" by combining first initial with last name

    Parameter
    Type
    Required
    Description

    EntityType

    STRING

    Yes

    The type of graph entity to search (e.g., Employee, OktaUser, ActiveDirectoryUser)

    SourceAttribute

    STRING

    How It Works

    1. The input value (before the |) is used as the search term

    2. The transformer finds an entity of type EntityType where SourceAttribute equals the input value

    3. It returns the TargetAttribute value from that entity

    4. If no entity is found and DefaultValue is provided, the default is returned; otherwise an error occurs

    Special Behaviors

    Scenario
    Behavior

    Empty input value

    Returns empty string "" (no error)

    Input wrapped in brackets [value]

    Brackets are automatically stripped before lookup

    TargetAttribute is id

    Returns the entity's unique graph ID

    circle-info

    When used in sync workflows, this transformer checks previously computed values from the current job before querying the graph cache. This optimization prevents redundant lookups during batch operations.

    Usage Examples

    Example 1: Get manager's name from employee ID

    • Input: 12345 (an employee ID)

    • Finds: An Employee entity where employee_id = 12345

    • Returns: The manager_name attribute from that employee (e.g., Jane Smith)

    Example 2: Get department from email with a default value

    • Input: [email protected]

    • Finds: An OktaUser entity where email = [email protected]

    • Returns: The department attribute, or Unknown if no user is found

    Example 3: Chain with other transformers

    • Takes the employee ID from Workday

    • Looks up the employee's cost center

    • Converts the result to uppercase

    Example 4: Get entity's graph ID

    • Looks up an OktaUser by login

    • Returns the entity's unique graph ID (useful for subsequent lookups)

    Parameter
    Type
    Required
    Description

    EntityType

    STRING

    Yes

    The type of graph entity to search (e.g., Employee, OktaUser)

    SourceAttribute

    STRING

    How It Works

    1. The input value (before the |) is used as the search term

    2. The transformer finds ALL entities of type EntityType where SourceAttribute equals the input value

    3. It collects the TargetAttribute value from each matched entity

    4. Results are joined using the separator (comma by default)

    5. If no entities are found, returns an empty string

    Special Behaviors

    Scenario
    Behavior

    Empty input value

    Returns empty string "" (no error)

    Input wrapped in brackets [value]

    Brackets are automatically stripped before lookup

    No entities found

    Returns empty string "" (no error)

    circle-exclamation

    Unlike FROM_ENTITY_ATTRIBUTE, this transformer does not error when entities are missing the target attribute—it silently skips them. Verify your results include all expected values.

    Usage Examples

    Example 1: Get all group names for a user

    • Input: [email protected]

    • Finds: All OktaGroup entities where member_email = [email protected]

    • Returns: Engineering,Sales,All-Employees (comma-separated group names)

    Example 2: Custom separator for multi-value attributes

    • Input: 12345 (an owner ID)

    • Finds: All Application entities owned by this user

    • Returns: Slack;Salesforce;Jira (semicolon-separated)

    Example 3: Get all entity IDs

    • Finds all employees in the Engineering department

    • Returns their graph IDs as a comma-separated list

    Example 4: Get entity types

    • Looks up all identity nodes with the given email

    • Returns their type names (e.g., OktaUser,ActiveDirectoryUser,WorkdayWorker)

    Parameter Format

    None (no parameters required)

    Usage Example

    Input:

    {"Spanish" | LANGUAGE_RFC5646}

    Output:

    es

    Usage Example

    Input:

    {"helloworld" | LAST_N, 5}

    Output:

    world

    Basic Usage

    • Destination Attribute: employee_id

    • Formatter: {id}

    • Then Apply: | LEFT_PAD, 5, "0"

    • Result: If id = 123, output is 00123

    In a Pipeline

    • Destination Attribute: formatted_code

    • Formatter: {cost_center}

    • Then Apply: | TRIM_CHARS, "0" | LEFT_PAD, 6, "0"

    • Result: If cost_center = 001234, output is 001234 (first removes then re-applies padding)

    Example

    • Destination Attribute: employee_id

    • Formatter: {employee_id}

    • Then Apply: | REMOVE_CHARS, "#" | TRIM_CHARS, "0" | LEFT_PAD, 6, "0"

    • Use case: Standardize employee IDs to 6-digit format (converts "##001234##" to "001234")

    Parameter
    Type
    Required
    Description

    TableName

    STRING

    Yes

    Name or ID of the lookup table

    ColumnName

    STRING

    Yes

    Column to search for the input value

    ReturnColumnName

    STRING

    Yes

    How It Works

    1. The transformer first tries to match TableName against configured lookup table names

    2. If no name match is found, TableName is treated as a table ID

    3. The input value is searched in ColumnName

    4. If found, the corresponding ReturnColumnName value is returned

    5. If not found and DefaultValue is provided, the default is returned

    6. If not found and no default, an error is returned

    circle-exclamation

    Table name matching is case-sensitive. Ensure the table name in your transformer exactly matches the lookup table name defined in your policy, including capitalization.

    Special Behaviors

    Scenario
    Behavior

    Table name not found

    Falls back to treating the parameter as a table ID

    Value not found in table, default provided

    Returns the default value

    Value not found in table, no default

    Returns error with lookup details

    Basic Usage

    • Destination Attribute: city

    • Formatter: {location_code}

    • Then Apply: | LOOKUP, "locationTable", "location_code", "city"

    • Result: If location_code = IL001 and locationTable contains that code, output is Chicago

    With Default Value

    • Destination Attribute: region

    • Formatter: {office_code}

    • Then Apply: | LOOKUP, "regionTable", "code", "region_name", "Unknown Region"

    • Result: Returns mapped region name, or Unknown Region if code not in table

    In a Pipeline

    • Destination Attribute: office_email_domain

    • Formatter: {office_code}

    • Then Apply: | LOOKUP, "officeTable", "code", "domain" | LOWER

    • Result: Looks up domain from table, then converts to lowercase

    Example

    • Destination Attribute: office_location

    • Formatter: {location}

    • Then Apply: | LOOKUP, "locationTable", "location_code", "city"

    • Use case: Convert abbreviated location codes (like "IL001", "CA002") to full city names for user profiles, maintaining consistency across different source systems

    {code | LOWER}

    mixedcase123

    Usage Example

    Input:

    {"Hello World" | LOWER_SNAKE_CASE}

    Output:

    hello_world

    None (no parameters required)

    Basic Usage

    • Destination Attribute: identifier

    • Formatter: {field_name}

    • Then Apply: | LOWER_CAMEL_CASE

    • Result: If field_name = hello world, output is helloWorld

    In a Pipeline

    • Destination Attribute: api_field

    • Formatter: {attribute_name}

    • Then Apply: | TRIM | LOWER_CAMEL_CASE

    • Result: If attribute_name = User Display Name , output is userDisplayName

    Example

    • Destination Attribute: json_property

    • Formatter: {column_name}

    • Then Apply: | LOWER_CAMEL_CASE

    • Use case: Convert database column names or display names to JSON property names following JavaScript/TypeScript conventions

    Start Integer (NUMBER, required): First number in sequence Length (NUMBER, required): How many alternatives to generate

    Basic Usage

    • Destination Attribute: username

    • Formatter: {first_name}.{last_name}

    • Then Apply: | LOWER | NEXT_NUMBER, 2, 3

    • Result: Generates john.smith, john.smith2, john.smith3, john.smith4 as fallback options

    In a Pipeline

    • Destination Attribute: email

    • Formatter: {first_name}{last_name}

    • Then Apply: | LOWER | NEXT_NUMBER, 2, 5 | APPEND, "@company.com"

    • Result: Creates email alternatives: [email protected], [email protected], etc.

    Example

    • Destination Attribute: user_principal_name

    • Formatter: (see conditional example below)

    • Then Apply: N/A (used within IF statement)

    • Use case: Intelligent username generation with length-based fallbacks:

    This handles both name length constraints and uniqueness conflicts automatically.

    Generates a set of integers as strings.

    Parameter Format

    Integer (NUMBER, required), Length (NUMBER, required)

    Usage Example

    Input:

    {"foobar" | NEXT_NUMBER, 1, 12, 4}

    Output:

    foob foo1 foo2 foo3 foo4 foo5 foo6 foo7 foo8 foo9 fo10 fo11 fo12

    Usage Example

    Input:

    {NOW}

    {| NOW, "RFC3339"}

    {NOW, "RFC3339"}

    {NOW, "2006-01-02T15:04:05Z07:00"}

    Region (STRING, optional): ISO 3166-1 alpha-2 format

    Usage Example

    Input:

    {"+1-800-555-1212" | PHONE_NUMBER_E164}

    Output:

    +18005551212

    Basic Usage

    • Destination Attribute: location_code

    • Formatter: {city_code}

    • Then Apply: | PREPEND, "CORP_"

    • Result: If city_code = NYC, output is CORP_NYC

    In a Pipeline

    • Destination Attribute: contractor_username

    • Formatter: {username}

    • Then Apply: | PREPEND, "c-" | LOWER

    • Result: If username = JSmith, output is c-jsmith

    Example

    • Destination Attribute: account_name

    • Formatter: {username}

    • Then Apply: | PREPEND, "c-"

    • Use case: Identify contractor accounts by prefixing their usernames (converts "jsmith" to "c-jsmith" to distinguish from employee accounts)

    Length (NUMBER, required)

    Usage Example

    Input:

    {| RANDOM_ALPHANUMERIC_GENERATOR, 8}

    Output:

    a1B2c3D4

    Note: This transformer generates an alphanumeric string with eight characters.

    Min (NUMBER, required): The minimum value (inclusive) Max (NUMBER, required): The maximum value (inclusive)

    Basic Usage

    • Destination Attribute: test_id

    • Formatter: TEST

    • Then Apply: | RANDOM_INTEGER, 1000, 9999

    • Result: Output is TEST followed by random number like TEST4827

    In a Pipeline

    • Destination Attribute: temp_username

    • Formatter: user

    • Then Apply: | RANDOM_INTEGER, 1, 100 | APPEND, "@temp.local"

    • Result: Output like [email protected]

    Example

    • Destination Attribute: temporary_id

    • Formatter: TEST

    • Then Apply: | RANDOM_INTEGER, 1000, 9999

    • Use case: Generate unique test identifiers for sandbox environments (produces values like "TEST4827", "TEST8391")

    Usage Example

    Input:

    {| RANDOM_NUMBER_GENERATOR, 4}

    Output:

    4829

    Note: This transformer generates a random numeric string with four characters.

    Usage Example

    Input:

    {| RANDOM_STRING_GENERATOR, 6}

    Output:

    uFkLxw

    Note: This transformer generates a random alpha string with six characters.

    Characters (STRING, required): String containing all characters to be removed

    Basic Usage

    • Destination Attribute: username

    • Formatter: {email}

    • Then Apply: | REMOVE_CHARS, "@."

    • Result: If email = [email protected], output is johndoeexamplecom

    In a Pipeline

    • Destination Attribute: phone

    • Formatter: {phone_number}

    • Then Apply: | REMOVE_CHARS, "()- "

    • Result: If phone_number = (123) 456-7890, output is 1234567890

    Example

    • Destination Attribute: user_id

    • Formatter: {email}

    • Then Apply: | REMOVE_CHARS, "-"

    • Use case: Create clean user IDs from email addresses by removing hyphens (converts "" to "")

    Usage Example

    Input:

    {"José" | REMOVE_DIACRITICS}

    Output:

    Jose

    None (no parameters required)

    Basic Usage

    • Destination Attribute: username

    • Formatter: {email}

    • Then Apply: | REMOVE_DOMAIN

    • Result: If email = [email protected], output is john.smith

    In a Pipeline

    • Destination Attribute: login_name

    • Formatter: {email}

    • Then Apply: | REMOVE_DOMAIN | REPLACE_ALL, ".", "_"

    • Result: If email = [email protected], output is john_smith

    Example

    • Destination Attribute: username

    • Formatter: {email}

    • Then Apply: | REMOVE_DOMAIN

    • Use case: Extract usernames for target systems that don't use email-style logins (converts "[email protected]" to "jsmith")

    None (no parameters required)

    Basic Usage

    • Destination Attribute: username

    • Formatter: {display_name}

    • Then Apply: | REMOVE_WHITESPACE

    • Result: If display_name = John A. Doe, output is JohnA.Doe

    In a Pipeline

    • Destination Attribute: tag

    • Formatter: {department}

    • Then Apply: | REMOVE_WHITESPACE | LOWER

    • Result: If department = Human Resources, output is humanresources

    Example

    • Destination Attribute: cost_center_code

    • Formatter: {cost_center}

    • Then Apply: | REMOVE_WHITESPACE

    • Use case: Ensure cost center codes have no embedded spaces for system integration (converts "CC 12345" to "CC12345")

    The string to replace matches with

    {email | REPLACE_ALL, " ", "."}

    [email protected]

    Pad (CHARACTER, optional): Default is space

    Usage Example

    Input:

    {"123" | RIGHT_PAD, 5, "0"}

    Output:

    12300

    None (no parameters required)

    Basic Usage

    • Destination Attribute: description

    • Formatter: {notes}

    • Then Apply: | SENTENCE_CASE

    • Result: If notes = THE QUICK BROWN FOX, output is The quick brown fox

    In a Pipeline

    • Destination Attribute: formatted_notes

    • Formatter: {comment}

    • Then Apply: | TRIM | SENTENCE_CASE

    • Result: If comment = IMPORTANT MESSAGE HERE , output is Important message here

    Example

    • Destination Attribute: job_description

    • Formatter: {job_title}

    • Then Apply: | SENTENCE_CASE

    • Use case: Normalize job descriptions from all-caps source data to sentence case for cleaner display

    Usage Example

    Input:

    {"[email protected]" | SPLIT, "@", 0}

    Output:

    first.last

    Note: This transformer returns the results where the index starts at zero (0).

    Number of characters to extract

    {email | SUB_STRING, 0, 10}

    john.smith

    None (no parameters required)

    Basic Usage

    • Destination Attribute: display_name

    • Formatter: {full_name}

    • Then Apply: | TITLE_CASE

    • Result: If full_name = john doe, output is John Doe

    In a Pipeline

    • Destination Attribute: formatted_name

    • Formatter: {name}

    • Then Apply: | TRIM | TITLE_CASE

    • Result: If name = JANE SMITH , output is Jane Smith

    Example

    • Destination Attribute: display_name

    • Formatter: {username}

    • Then Apply: | TITLE_CASE

    • Use case: Format dot-separated usernames for display (converts "john.doe" to "John.Doe")

    Basic Usage
    • Destination Attribute: username

    • Formatter: {display_name}

    • Then Apply: | TRIM

    • Result: If display_name = " John Doe ", output is John Doe

    In a Pipeline

    • Destination Attribute: email

    • Formatter: {email_address}

    • Then Apply: | TRIM | LOWER

    • Result: If email_address = " [email protected] ", output is [email protected]

    Example

    • Destination Attribute: display_name

    • Formatter: {display_name}

    • Then Apply: | TRIM

    • Use case: Clean up imported user data that may have padding whitespace from CSV files or database fields

    Basic Usage

    • Destination Attribute: employee_id

    • Formatter: {id_number}

    • Then Apply: | TRIM_CHARS, "0."

    • Result: If id_number = 000.123.000, output is 123

    In a Pipeline

    • Destination Attribute: clean_code

    • Formatter: {code}

    • Then Apply: | TRIM_CHARS, "-_" | UPPER

    • Result: If code = ---ABC123___, output is ABC123

    Example

    • Destination Attribute: office_code

    • Formatter: {office_code}

    • Then Apply: | TRIM_CHARS, ".0" | TRIM_CHARS_RIGHT, ".USCA"

    • Use case: Clean up office codes with variable padding (converts "000.8675309.USCA" to "8675309")

    Basic Usage

    • Destination Attribute: cost_center

    • Formatter: {cost_center_code}

    • Then Apply: | TRIM_CHARS_LEFT, "0"

    • Result: If cost_center_code = 00012345, output is 12345

    In a Pipeline

    • Destination Attribute: identifier

    • Formatter: {raw_id}

    • Then Apply: | TRIM_CHARS_LEFT, "x" | UPPER

    • Result: If raw_id = xxxABC123, output is ABC123

    Example

    • Destination Attribute: cost_center

    • Formatter: {cost_center}

    • Then Apply: | TRIM_CHARS_LEFT, "0"

    • Use case: Remove leading zeros from cost center codes while preserving trailing zeros (converts "00012345" to "12345")

    Characters (STRING, required): String containing all characters to remove from the end

    Basic Usage

    • Destination Attribute: office_code

    • Formatter: {raw_office_code}

    • Then Apply: | TRIM_CHARS_RIGHT, "0"

    • Result: If raw_office_code = ABC12300, output is ABC123

    In a Pipeline

    • Destination Attribute: clean_code

    • Formatter: {code}

    • Then Apply: | TRIM_CHARS_RIGHT, "temp" | UPPER

    • Result: If code = ABC123temp, output is ABC123

    Example

    • Destination Attribute: office_code

    • Formatter: {office_code}

    • Then Apply: | TRIM_CHARS_RIGHT, "0"

    • Use case: Remove trailing zeros from office codes while preserving leading zeros (converts "ABC12300" to "ABC123")

    {name | UPPER}

    SMITH

    Usage Example

    Input:

    {"hello world" | UPPER_CAMEL_CASE}

    Output:

    HelloWorld

    Usage Example

    Input:

    {"hello world" | UPPER_SNAKE_CASE}

    Output:

    HELLO_WORLD

    time "1/2/2025 3pm") Note: When using the time zone parameter, a named time zone (
    America/Los_Angeles
    ) accounts for daylight saving time, whereas a time zone offset (
    -07:00
    ) is always calculated from UTC, ignoring daylight saving time.

    Parameter Format

    String - Time Zone String (Optional) - Format

    Usage Example

    Input:

    {activation_date | UTC_TO_TIME_ZONE, "America/Los_Angeles"}

    {activation_date | UTC_TO_TIME_ZONE, "America/Los_Angeles", "RFC3339"}

    {activation_date | UTC_TO_TIME_ZONE, "-07:00"}

    {activation_date | UTC_TO_TIME_ZONE, "-07:00", "RFC3339"}

    None (no parameters required)

    Usage Example

    Input:

    {| UUID_GENERATOR}

    Output:

    123e4567-e89b-12d3-a456-426614174000

    Length (NUMBER, required): Target string length for zero-padding

    Basic Usage

    • Destination Attribute: employee_id

    • Formatter: {id}

    • Then Apply: | ZERO_PAD, 6

    • Result: If id = 1234, output is 001234

    Example

    • Destination Attribute: badge_number

    • Formatter: {badge_id}

    • Then Apply: | ZERO_PAD, 6

    • Use case: Standardize badge numbers to 6-digit format for access control systems (converts "1234" to "001234", leaves "12345678" unchanged, and passes non-numeric values like "admin" through unchanged)

    layout

    Yes

    String

    Go time format layout or named alias (see tables below)

    input_layout

    No

    2024-03-15T14:30:00Z

    {hire_date | DATE_FORMAT, "2006-01-02"}

    2024-03-15

    2024-03-15T14:30:00Z

    {hire_date | DATE_FORMAT, "01/02/2006"}

    03/15/2024

    Year

    2006

    4-digit year

    Year

    06

    2-digit year

    ISO 8601 / RFC3339

    2006-01-02T15:04:05Z07:00

    2023-03-15T14:30:25-07:00

    US date

    01/02/2006

    03/15/2023

    dateonly

    2006-01-02

    2023-03-15

    timeonly

    15:04:05

    14:30:25

    (none)

    —

    —

    This function takes no parameters

    JOHN

    {first_name | LOWER}

    john

    [email protected]

    {email | LOWER}

    [email protected]

    search

    Yes

    String

    The substring to find

    replacement

    Yes

    John Smith

    {display_name | REPLACE_ALL, " ", "_"}

    John_Smith

    EMP-12345

    {employee_id | REPLACE_ALL, "-", ""}

    EMP12345

    offset

    Yes

    Integer

    Starting position (0-based index)

    length

    Yes

    John

    {first_name | SUB_STRING, 0, 1}

    J

    EMP12345

    {employee_id | SUB_STRING, 3, 4}

    1234

    (none)

    —

    —

    This function takes no parameters

    sales

    {department | UPPER}

    SALES

    john smith

    {username | REMOVE_WHITESPACE | UPPER}

    JOHNSMITH

    Attribute Sync and Transformers
    Understanding Conditions and Transformers
    Custom Identity Mappings
    ISO 3166arrow-up-right
    time package constantsarrow-up-right
    ASSUME_TIME_ZONE
    UTC_TO_TIME_ZONE
    RFC 5646arrow-up-right
    REMOVE_CHARS
    FIRST_N

    String

    2024-03-15T14:30:00Z

    Month

    European date

    datetime

    {12345 | FROM_ENTITY_ATTRIBUTE, "Employee", "employee_id", "manager_name"}
    {[email protected] | FROM_ENTITY_ATTRIBUTE, "OktaUser", "email", "department", "Unknown"}
    {$workday.employee_id | FROM_ENTITY_ATTRIBUTE, "Employee", "id", "cost_center" | UPPERCASE}
    {john.smith | FROM_ENTITY_ATTRIBUTE, "OktaUser", "login", "id"}
    {[email protected] | FROM_MANY_ENTITIES_ATTRIBUTE, "OktaGroup", "member_email", "name"}
    {12345 | FROM_MANY_ENTITIES_ATTRIBUTE, "Application", "owner_id", "app_name", ";"}
    {Engineering | FROM_MANY_ENTITIES_ATTRIBUTE, "Employee", "department", "id"}
    {[email protected] | FROM_MANY_ENTITIES_ATTRIBUTE, "Identity", "email", "type"}

    MixedCase123

    IF sys_attr__would_be_value_len le 20
      {first_name | LOWER}.{last_name | LOWER | NEXT_NUMBER, 2, 3}
    ELSE IF sys_attr__would_be_value_len le 30
      {first_name | LOWER}.{last_name | LOWER | FIRST_N, 1 | NEXT_NUMBER, 2, 3}
    ELSE
      {first_name | LOWER | FIRST_N, 1}.{last_name | LOWER | FIRST_N, 1 | NEXT_NUMBER, 2, 3}

    String

    john [email protected]

    Integer

    [email protected]

    Smith

    Number of months to add

    Years

    INTEGER

    No

    Number of years to add

    Format

    STRING

    No

    Output format (defaults to auto-detection)

    No

    Output format (defaults to auto-detection)

    Yes

    The attribute on the entity to match against the input value

    TargetAttribute

    STRING

    Yes

    The attribute to return from the matched entity. Use id or type for built-in entity properties.

    DefaultValue

    STRING

    No

    Value to return if no matching entity is found

    TargetAttribute is type

    Returns the entity's type name

    No entity found, no default

    Returns error with details about the failed lookup

    Target attribute missing on entity

    Returns error (unless default provided)

    Yes

    The attribute on entities to match against the input value

    TargetAttribute

    STRING

    Yes

    The attribute to return from all matched entities. Use id or type for built-in entity properties.

    Separator

    STRING

    No

    Character(s) to join multiple results (defaults to ,)

    Target attribute missing on some entities

    Those entities are skipped (no error logged)

    TargetAttribute is id

    Returns the entity's unique graph ID

    TargetAttribute is type

    Returns the entity's type name

    Result ordering

    Results appear in graph discovery order (not guaranteed to be consistent)

    Column whose value to return

    DefaultValue

    STRING

    No

    Value to return if lookup fails

    Other lookup errors

    Returns error with full context

    [email protected]envelope
    [email protected]envelope