Files
developer.sailpoint.com/docs/tools/sdk/python/Reference/V2024/Methods/SODViolationsApi.md
2025-02-20 13:59:30 -05:00

8.7 KiB

id, title, pagination_label, sidebar_label, sidebar_class_name, keywords, slug, tags
id title pagination_label sidebar_label sidebar_class_name keywords slug tags
v2024-sod-violations SOD_Violations SOD_Violations SOD_Violations pythonsdk
python
Python
sdk
SOD_Violations
V2024SOD_Violations
/tools/sdk/python/v2024/methods/sod-violations
SDK
Software Development Kit
SOD_Violations
V2024SOD_Violations

sailpoint.v2024.SODViolationsApi

Use this API to check for current "separation of duties" (SOD) policy violations as well as potential future SOD policy violations. With SOD violation functionality in place, administrators can get information about current SOD policy violations and predict whether an access change will trigger new violations, which helps to prevent them from occurring at all.

"Separation of duties" refers to the concept that people shouldn't have conflicting sets of access - all their access should be configured in a way that protects your organization's assets and data.
For example, people who record monetary transactions shouldn't be able to issue payment for those transactions. Any changes to major system configurations should be approved by someone other than the person requesting the change.

Organizations can use "separation of duties" (SOD) policies to enforce and track their internal security rules throughout their tenants. These SOD policies limit each user's involvement in important processes and protects the organization from individuals gaining excessive access.

Once a SOD policy is in place, if an identity has conflicting access items, a SOD violation will trigger. These violations are included in SOD violation reports that other users will see in emails at regular intervals if they're subscribed to the SOD policy. The other users can then better help to enforce these SOD policies.

Administrators can use the SOD violations APIs to check a set of identities for any current SOD violations, and they can use them to check whether adding an access item would potentially trigger a SOD violation. This second option is a good way to prevent SOD violations from triggering at all.

Refer to Handling Policy Violations for more information about SOD policy violations.

All URIs are relative to https://sailpoint.api.identitynow.com/v2024

Method HTTP request Description
start-predict-sod-violations POST /sod-violations/predict Predict SOD violations for identity.
start-violation-check POST /sod-violations/check Check SOD violations

start-predict-sod-violations

Predict SOD violations for identity. This API is used to check if granting some additional accesses would cause the subject to be in violation of any SOD policies. Returns the violations that would be caused.

API Spec

Parameters

Param Type Name Data Type Required Description
Body identity_with_new_access IdentityWithNewAccess True

Return type

ViolationPrediction

Responses

Code Description Data Type Response headers
200 Violation Contexts ViolationPrediction -
400 Client Error - Returned if the request body is invalid. ErrorResponseDto -
401 Unauthorized - Returned if there is no authorization header, or if the JWT token is expired. ListAccessProfiles401Response -
403 Forbidden - Returned if the user you are running as, doesn't have access to this end-point. ErrorResponseDto -
404 Not Found - returned if the request URL refers to a resource or object that does not exist ErrorResponseDto -
429 Too Many Requests - Returned in response to too many requests in a given period of time - rate limited. The Retry-After header in the response includes how long to wait before trying again. ListAccessProfiles429Response -
500 Internal Server Error - Returned if there is an unexpected error. ErrorResponseDto -

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

Example

import sailpoint.v2024
from sailpoint.v2024.models.identity_with_new_access import IdentityWithNewAccess
from sailpoint.v2024.models.violation_prediction import ViolationPrediction
from sailpoint.v2024.rest import ApiException
from pprint import pprint

    identity_with_new_access = {
          "identityId" : "2c91808568c529c60168cca6f90c1313",
          "accessRefs" : [ {
            "type" : "ENTITLEMENT",
            "id" : "2c918087682f9a86016839c050861ab1",
            "name" : "CN=Information Access,OU=test,OU=test-service,DC=TestAD,DC=local"
          }, {
            "type" : "ENTITLEMENT",
            "id" : "2c918087682f9a86016839c0509c1ab2",
            "name" : "CN=Information Technology,OU=test,OU=test-service,DC=TestAD,DC=local"
          } ]
        } # IdentityWithNewAccess | 

    try:
        # Predict SOD violations for identity.
        Result = identity_with_new_access.from_json(identity_with_new_access)
        api_response = api_instance.start_predict_sod_violations(Result)
        
        # Below is a request that includes all optional parameters
        # api_response = api_instance.start_predict_sod_violations(Result)
        print("The response of SODViolationsApi->start_predict_sod_violations:\n")
        pprint(api_response)
    except Exception as e:
        print("Exception when calling SODViolationsApi->start_predict_sod_violations: %s\n" % e)

[Back to top]

start-violation-check

Check SOD violations This API initiates a SOD policy verification asynchronously.

API Spec

Parameters

Param Type Name Data Type Required Description
Body identity_with_new_access1 IdentityWithNewAccess1 True

Return type

SodViolationCheck

Responses

Code Description Data Type Response headers
202 Request ID with a timestamp. SodViolationCheck -
400 Client Error - Returned if the request body is invalid. ErrorResponseDto -
401 Unauthorized - Returned if there is no authorization header, or if the JWT token is expired. ListAccessProfiles401Response -
403 Forbidden - Returned if the user you are running as, doesn't have access to this end-point. ErrorResponseDto -
404 Not Found - returned if the request URL refers to a resource or object that does not exist ErrorResponseDto -
429 Too Many Requests - Returned in response to too many requests in a given period of time - rate limited. The Retry-After header in the response includes how long to wait before trying again. ListAccessProfiles429Response -
500 Internal Server Error - Returned if there is an unexpected error. ErrorResponseDto -

HTTP request headers

  • Content-Type: application/json
  • Accept: application/json

Example

import sailpoint.v2024
from sailpoint.v2024.models.identity_with_new_access1 import IdentityWithNewAccess1
from sailpoint.v2024.models.sod_violation_check import SodViolationCheck
from sailpoint.v2024.rest import ApiException
from pprint import pprint

    identity_with_new_access1 = {identityId=2c91808568c529c60168cca6f90c1313, accessRefs=[{type=ENTITLEMENT, id=2c918087682f9a86016839c050861ab1, name=CN=Information Access,OU=test,OU=test-service,DC=TestAD,DC=local}, {type=ENTITLEMENT, id=2c918087682f9a86016839c0509c1ab2, name=CN=Information Technology,OU=test,OU=test-service,DC=TestAD,DC=local}], clientMetadata={additionalProp1=string, additionalProp2=string, additionalProp3=string}} # IdentityWithNewAccess1 | 

    try:
        # Check SOD violations
        Result = identity_with_new_access1.from_json(identity_with_new_access1)
        api_response = api_instance.start_violation_check(Result)
        
        # Below is a request that includes all optional parameters
        # api_response = api_instance.start_violation_check(Result)
        print("The response of SODViolationsApi->start_violation_check:\n")
        pprint(api_response)
    except Exception as e:
        print("Exception when calling SODViolationsApi->start_violation_check: %s\n" % e)

[Back to top]