Granting Birthright Access
Birthright access refers to a set of default permissions automatically granted to users using Oracle Access Governance automated policies to ensure new joiners have essential access before or at the start of employment.
- Prehire: Start date is in the future.
- Hire: Start date is now or in the past; not terminated.
| Employee State | AG Status | Status (from Authoritative Source) | Join Date (from Authoritative Source) | Termination Started | Termination Date (from Authoritative Source) |
|---|---|---|---|---|---|
| Prehire | AG Active | Disabled | Greater than today | FALSE | Greater than today |
| Hire | AG Active | Active | Less than or equal to today | FALSE | Greater than today |
Prerequisites
Ensure the following prerequisites to grant birthright access from Oracle Access Governance:
-
- The Authoritative source must include employee attributes, including the official Joining date or Start date
- Create system attribute and global identity attribute to fetch source value.
- The Authoritative source must include termination date or last working date orchestrated system attribute.
- Create a global AG identity attribute
terminated - Set Workforce/Consumer conditions for activation
Step 1: Create System Attribute and Global Identity Attribute for JoinDate
- Create a simple system attribute
joinDateand map it to the joining date source, such asstartDate. See Create System Attribute. - Now, go to the Identity Attributes page and search
joinDatecore identity attribute. Edit the core identity attribute to select the relevant orchestrated system and update the Value source with a single attribute rule, such as:
See Manage Attributes Settings.if (user.getCustomAttributes() != null) { user.getCustomAttributes()['startDate'] }
Step 2: Create a Global Identity Attribute to Exclude Terminated Users
Create an AG Attribute, terminated, for policies that grant birthright access before the joinDate to exclude terminated users from being assigned permissions through these policies. Here terminationDate is the last working date source from the Authoritative source.
-
- Go to the Identity Attributes page and create an internal AG Attribute, terminated, of type Boolean. For details, see Create an Oracle Access Governance Attribute.
- Use the single attribute rule to compare
terminationDatewith today. IfterminationDateis less than or equal to today, it returns true; otherwise, it returns false, such as:if( user.getStatus() == 'Disabled' && user.getCustomAttributes() != null && user.getCustomAttributes()['terminationDate'] != null ) { var currentDate=new Date(); var today = new Date(currentDate.getFullYear(),currentDate.getMonth(),currentDate.getDate(),23,59,59,999); var terminationDate = new Date(user.getCustomAttributes()['terminationDate']); if(terminationDate <= today) { true } else { false } } else { false } - Select appropriate identity flags to include this attributes in the Oracle Access Governance features
Step 3: Configure Workforce/Consumer Activation Rules
- For Active users:
Status In Active Disabled - For Consumer users:
Status Equals Disabled
Birthright Access Workflow
You can configure birthright access from Oracle Access Governance by creating identity collections, packaging permissions in an access bundle, and then configuring policies to ensure new hires have essential access before or at the start of employment.
- Create an Identity Collection based on membership rules. See Create an Identity Collection.
- For users to grant access on or after start date.
Status Equals Active Worker Type Equals Employee - For pre-hires to grant access before the start date
{JoinDate} Number of days before {10} {Terminated} Equals {False}Note
- To grant access on or after the start date, you must add a condition
Status Equals Active. - If you configured the policy using
today(), then each day, an in-house scheduler adds new member who meet the membership criteria. Based on the configuration, the policy is triggered every day at midnight.
- To grant access on or after the start date, you must add a condition
- For users to grant access on or after start date.
- Create an Access Bundle and package access to necessary permissions. For example, access to default collaboration tools. See Create an Access Bundle.
- Create a policy and associate the permissions part of the access bundle with identity collection. See Manage Policies.
Pre-hire Example
Let's understand complete birthright access workflow for pre-hires, where access should be granted before the start date.
Alice is expected to join Acme Corporation on March 20. As an AG_Administrator and AG_AccessControl_Admin, grant the following:
-
- Ensure you configure the prerequisites to activate workforce rules and ingest start date in the joinDate core attribute.
- Create an identity collection with the membership rule:
{JoinDate} Number of days before {10} {Terminated} Equals {False} - Package permissions in an access bundle for the default collaboration or enterprise tools. You can further configure to ensure No one can request this access bundle and should be granted only using policy.
- Create a policy and associate the permissions part of the access bundle with identity collection.
For Alice, if join date is March 20, the policy is triggered on March 10 to grant birthright access.
Validating the Configuration
Verify if the set up is correct.
- From System Administration, select Identity Attributes, and then enable Include in identity details and Include in manage identities flag for the following identity attributes:
status,startDate,joinDate,terminated,terminationDate, andterminationStarted. - From Who has access to what, select Enterprise wide browser, select identities, select Edit list settings, and then add the following attributes to the list settings:
status,startDate,joinDate,terminated,terminationDate, andterminationStarted. - Validate the following for identities loaded from the Authoritative Source system:
- The
startDateandjoinDateattributes must be set to the same value. - Identities with a
startDatein the future and aterminationDatethat's not set or is in the future must have the following values:status=DisabledAG status=ActiveAG subtype=Consumerterminated=false
- Identities with a
startDatein the past and aterminationDatethat's not set or is in the future must have the following values:status=ActiveAG status=ActiveAG subtype=Workforceterminated=false
- Identities with a
terminationDatein the past must have the following values:status=DisabledAG status=ActiveorInactive(depends on how the group is configured; if these are Oracle Access Governance Active identity collections for pre-hire policies, then it must have theterminated=falsecondition)AG subtype=Consumer(if these identities are loaded to Oracle Access Governance, then it must be f type Consumers)terminated=true
- The