IAM - Group Membership Update
IAM Pack.#
This Playbook is part of theUpdates user permissions in apps according to their group memberships in Okta.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooksThis playbook does not use any sub-playbooks.
#
IntegrationsThis playbook does not use any integrations.
#
Scripts- Set
- PrintErrorEntry
- DeleteContext
- AssignAnalystToIncident
#
Commands- okta-get-app-user-assignment
- findIndicators
- iam-update-user
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
UserRoleToAssignForFailures | The Cortex XSOAR role from which to assign users to the incident when a CRUD operation fails. This can be left empty to assign users from all roles. | Optional | |
UserAssignmentMethod | Determines the way in which user assignments will be decided in Cortex XSOAR for the failed incidents. Can be one of the following: "random", "machine-learning", "top-user", "less-busy-user", "online", "current". If left empty, users will be assigned randomly. | Optional | |
AssignOnlyOnCall | Determines whether to assign only users that are currently on a shift to failed incidents. Set to "true" to assign only users that are currently working, or set to "false" or leave empty to assign any user. | Optional | |
AdminEmail | The email address of the admin that approves group membership changes. | Optional |
#
Playbook OutputsThere are no outputs for this playbook.