How to configure and use alternate manager lookups for access review auto-assignment.
Alternate manager lookups provide enhanced review auto-assignment by allowing Veza to identify managers from multiple sources of identity metadata. This is particularly useful if your organization has complex identity structures with more than one identity provider (IdP).
You may need to configure an alternate identity provider for manager assignments to enable:
Automatic manager assignment for contractors tracked in a separate IdP (e.g., a custom OAA IdP) with managers from a primary IdP (e.g., Okta).
Auto-assigning access reviews involving users in the main IdP (e.g., Okta Users), when manager information is maintained in another system (e.g., Oracle HCM).
By supporting cross-source manager lookups, Veza ensures consistent and accurate access review assignments, regardless of where user or manager identities are maintained.
Alternate lookups are intended for situations where you have a primary identity provider and additional sources of identity in another system. For example, you might import identity data for contractors via a custom CSV, and want to have their access reviewed by managers who are Okta users. In this case, you want to ensure that:
Contractor access reviews are assigned to their actual managers (who are Okta users).
Even if the contractor identity lacks a direct manager attribute in the custom IdP, Veza can still identify the correct manager from Okta.
With an alternate manager lookup, you can configure Okta as a primary IdP, and a the imported CSV provider as the secondary IdP. When a contractor's access is reviewed, the system will first check if they have a linked user in Okta. If no linked user or manager is found, it uses the alternate lookup settings to find the appropriate manager in Okta.
When creating an Access Review, administrators can choose to auto-assign rows to individual managers. Veza will identify managers using one or more identity providers.
For auto-assignment to function:
Users in the review must be linked to an identity, either in the main IdP, or one of the alternate lookups. This connection is made based on the attribute mapping in your Global IdP settings.
The connected identities must have an attribute that contains one or more identifiers used to look up each user's manager(s). The attribute could be managers
or any other attribute configured in your settings (manager_identity_property
). The value in this attribute must match the value of the main IdP's user_identity_property
.
Veza supports looking up managers from both primary and alternate identity providers:
Alternate Manager Lookup Settings: When the primary lookup fails, the system can use one or more alternate IdP settings to find managers.
The lookup settings configuration includes:
User Type: The type of user in the alternate IdP User, e.g., OAA.Oracle HCM.HRISEmployee
User Identity Property: The property used to identify users across systems, e.g., customprop_manager_employee_number
Manager Identity Property: The property containing the manager reference, e.g., customprop_manager_employee_number
Instance Id Property: The property containing the instance ID, e.g., datasource_id
Instance Id: The ID of the alternate IdP instance, e.g., 05bbc13d-bf25-45f2-ba09-03e5625a3b66
Order matters when configuring more than one alternate source of identity. Veza will check the primary IdP first, then the first alternate lookup, then the second, and so on, until a manager is found or all options are exhausted.
Notes:
For reviews initiated using the main IdP (e.g., Okta), the system will look up managers from alternate sources (e.g., Oracle HCM).
The system will also try alternate lookup methods if the primary lookup fails.
The manager identity property can contain a single value or a list of values.
Currently, identity providers for review auto-assignment are managed using a private/
API request. Your Veza support representative can help configure this global setting.
PUT /api/private/workflows/access/global_settings/idp_settings
GET /api/private/workflows/access/global_settings/idp_settings
The global IdP settings request takes an idp
settings object for the primary IdP configuration, and one or more secondary IdPs defined in alternate_manager_lookup_settings
For example:
Integrating with an Identity Provider enables single sign on and auto-assignment for Access Reviews.
For organizations with many users and access reviewers, enabling a global Identity Provider (IdP) eliminates the need to manually specify additional reviewers by email, or create additional Veza user accounts for reviewers. When enabled:
Administrators and Operators can create reviews and assign reviews for any IdP user in a domain.
Typically, Veza support will make the API calls required to customize global IdP settings. See the following sections for prerequisites and the request format.
The authorization graph must contain entities for an integrated provider data source. See the integration guides for:
Use Query Builder to search for a user from your identity provider, and retrieve the provider’s datasource_id
.
Single Sign-On should be enabled to allow external users to log in to Veza.
Veza support will supply an auth_provider_id
for the Veza SSO connection.
PUT workflows/access/global_settings/idp_settings
Enable Veza to suggest reviewers from the graph, by specifying the SSO auth provider id
and the identity provider data source instance id
:
`user_identity_property` should be a globally unique value. Setting this to a name or email should be avoided as a best practice.
Notes:
auth_provider_id
identifies users with entries in the local user database and will also map correlated graph entities.
There can be several instances of an identity provider for a given user_type
.
instance_id
ensures the user info is pulled from the correct instance and domain.
Veza will populate the user list by searching for nodes of type user_type
with instance_id_property
equal to instance_id
.
Setting "instance_id_property": "datasource_id"
will typically achieve the correct behavior.
Okta:
Microsoft Azure AD:
Custom Identity Provider:
You can confirm changes are working as intended by starting a review and selecting reviewers:
If the user_type
, instance_id
, and instance_id_property
are correct, identities from the graph will appear in the suggestions.
If auth_provider_id
is correct, SSO users should only appear once in the scenario above. The local user entry is filtered from the list. Only the user record from the graph entity will appear.
Primary IdP Lookup: The default method uses the main (e.g., Okta) to find managers based on configured manager properties.
You can also use an administrator to call the endpoints below:
Any IdP user able to log in to Veza with single sign-on (SSO) can authenticate without the need to provision an account beforehand. See to enable SSO.
can be auto-assigned as reviewers.
can be used to assign reviews when you have multiple sources of employee records (e.g., contractors in one system, managers in another).
enabled
Set true
to enable the provider as a Global IdP.
auth_provider_id
Internal UID for the single sign-on provider instance.
user_type
Graph entity type to search for users, such as CustomIDPUser
or OktaUser
.
instance_id
The UID for a provider in the data catalog.
user_identity_property
Unique entity property used to identify the IdP, typically idp_unique_id
.
instance_id_property
The user entity property used to identify the IdP instance (e.g. instance_id
).
manager_identity_property
The user entity property used to identify the manager.
active_user_conditions
Filter string for identifying inactive users e.g. {"fn": "EQ", "property": "is_active", "value": true}