removed files for source account early access event triggers

This commit is contained in:
darrell-thobe-sp
2025-07-09 14:03:30 -04:00
parent ddff157fb6
commit 873b797244
3 changed files with 0 additions and 170 deletions

View File

@@ -1,55 +0,0 @@
---
id: source-account-created
title: Source Account Created
pagination_label: Source Account Created
sidebar_label: Source Account Created
sidebar_class_name: sourceAccountCreated
keywords: ['event', 'trigger', 'source', 'account', 'created', 'early access']
description: Fires after a source account is created.
slug: /extensibility/event-triggers/triggers/source-account-created
tags: ['Event Triggers', 'Early Access Event Triggers', 'Fire and Forget']
---
## Event Context
:::warning
This event trigger has been deprecated, and support will no longer handle requests to enable this trigger. A newer version of this trigger is being developed, and this documentation will be updated once the new trigger is available.
:::
Source Account Created events occur after a new account is detected during an account aggregration and refresh from a source. This trigger cannot determine whether account creation happened on a source or in Identity Security Cloud. It omits events related to Identity Security Cloud accounts, such as the Identity Security Cloud Admin.
Use this event trigger to watch for new accounts with highly privileged access, such as an account created in Active Directory Domain Admins.
This is an example input from this trigger:
```json
{
"uuid": "b7264868-7201-415f-9118-b581d431c688",
"id": "ee769173319b41d19ccec35ba52f237b",
"nativeIdentifier": "E009",
"sourceId": "2c918082814e693601816e09471b29b6",
"sourceName": "Active Directory",
"identityId": "ee769173319b41d19ccec6c235423237b",
"identityName": "john.doe",
"attributes": {
"firstname": "John",
"lastname": "Doe",
"email": "john.doe@gmail.com",
"department": "Sales",
"displayName": "John Doe",
"created": "2020-04-27T16:48:33.597Z",
"employeeNumber": "E009",
"uid": "E009",
"inactive": "true",
"phone": null,
"identificationNumber": "E009"
}
}
```
## Additional information and links
- **Trigger Type**: [FIRE_AND_FORGET](../trigger-types.md#fire-and-forget)
<!-- [Input schema](https://developer.sailpoint.com/apis/beta/#section/Source-Account-Created-Event-Trigger-Input) -->

View File

@@ -1,55 +0,0 @@
---
id: source-account-deleted
title: Source Account Deleted
pagination_label: Source Account Deleted
sidebar_label: Source Account Deleted
sidebar_class_name: sourceAccountDeleted
keywords: ['event', 'trigger', 'source', 'account', 'deleted', 'early access']
description: Fires after a source account is deleted.
slug: /extensibility/event-triggers/triggers/source-account-deleted
tags: ['Event Triggers', 'Early Access Event Triggers', 'Fire and Forget']
---
## Event Context
:::warning
This event trigger has been deprecated, and support will no longer handle requests to enable this trigger. A newer version of this trigger is being developed, and this documentation will be updated once the new trigger is available.
:::
Source Account Deleted events occur whenever an account is deleted from its source during an account aggregation operation. The account may have been manually removed or deleted as the result of a provisioning event. The trigger cannot determine whether the account deletion happened on a source or in Identity Security Cloud. It omits events related to Identity Security Cloud accounts, such as the Identity Security Cloud Admin.
Use this event trigger to watch for deletions of authoritative accounts, such as an account deleted on Workday.
This is an example input from this trigger:
```json
{
"uuid": "b7264868-7201-415f-9118-b581d431c688",
"id": "ee769173319b41d19ccec35ba52f237b",
"nativeIdentifier": "E009",
"sourceId": "2c918082814e693601816e09471b29b6",
"sourceName": "Active Directory",
"identityId": "ee769173319b41d19ccec6c235423237b",
"identityName": "john.doe",
"attributes": {
"firstname": "John",
"lastname": "Doe",
"email": "john.doe@gmail.com",
"department": "Sales",
"displayName": "John Doe",
"created": "2020-04-27T16:48:33.597Z",
"employeeNumber": "E009",
"uid": "E009",
"inactive": "true",
"phone": null,
"identificationNumber": "E009"
}
}
```
## Additional information and links
- **Trigger Type**: [FIRE_AND_FORGET](../trigger-types.md#fire-and-forget)
<!-- [Input schema](https://developer.sailpoint.com/apis/beta/#section/Source-Account-Deleted-Event-Trigger-Input) -->

View File

@@ -1,60 +0,0 @@
---
id: source-account-updated
title: Source Account Updated
pagination_label: Source Account Updated
sidebar_label: Source Account Updated
sidebar_class_name: sourceAccountUpdated
keywords: ['event', 'trigger', 'source', 'account', 'updated', 'early access']
description: Fires after a source account is updated.
slug: /extensibility/event-triggers/triggers/source-account-updated
tags: ['Event Triggers', 'Early Access Event Triggers', 'Fire and Forget']
---
## Event Context
:::warning
This event trigger has been deprecated, and support will no longer handle requests to enable this trigger. A newer version of this trigger is being developed, and this documentation will be updated once the new trigger is available.
:::
Source Account Updated events occur whenever one or more account attributes change on a single account during an account aggregation operation. The trigger cannot determine whether the account update happened on a source or in Identity Security Cloud. It omits events related to Identity Security Cloud accounts, such as the Identity Security Cloud Admin. The following actions are considered updates:
- Update account attributes
- Enable or disable an account
- Lock or unlock source accounts
- Change source account password
Use this event trigger to watch for updates to accounts that add highly privileged access, such as an account that is granted privileged access on a sensitive source.
This is an example input from this trigger:
```json
{
"uuid": "b7264868-7201-415f-9118-b581d431c688",
"id": "ee769173319b41d19ccec35ba52f237b",
"nativeIdentifier": "E009",
"sourceId": "2c918082814e693601816e09471b29b6",
"sourceName": "Active Directory",
"identityId": "ee769173319b41d19ccec6c235423237b",
"identityName": "john.doe",
"attributes": {
"firstname": "John",
"lastname": "Doe",
"email": "john.doe@gmail.com",
"department": "Sales",
"displayName": "John Doe",
"created": "2020-04-27T16:48:33.597Z",
"employeeNumber": "E009",
"uid": "E009",
"inactive": "true",
"phone": null,
"identificationNumber": "E009"
}
}
```
## Additional Information and links
- **Trigger Type**: [FIRE_AND_FORGET](../trigger-types.md#fire-and-forget)
<!-- [Input schema](https://developer.sailpoint.com/apis/beta/#section/Source-Account-Updated-Event-Trigger-Input) -->