<div dir="ltr">Thank you for the response, and this works so I am starting to figure out what's going on a little bit.  My concern is that every group inside openldap would then have to entitle the user to openldap.  I was initially thinking of controlling account creation in openldap through 3 roles (depending on placement).  I can condense this into one role using account naming standards (our vendor accounts always start with v_ etc).  I am not really concerned with a user having an openldap account anytime they get placed in a group that is entitled to openldap.<div><br></div><div>My concern though, and this is probably just a lack of understanding of Midpoint.  If the user is placed in say 15 different openldap groups, and each of those groups are granting an entitlement to the user, does this cause any type of performance or scaling issue with the user having those 15 openldap entitlements?</div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Mon, Oct 11, 2021 at 10:35 AM Joshua Williams <<a href="mailto:jwilliams%2Blist@globalnaz.org">jwilliams+list@globalnaz.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div style="overflow-wrap: break-word;">Hi Keith,<div>I am fairly new to midPoint, so I may be a little off base.  However, I have a Role that is similar to yours.  </div><div><br></div><div>To make the Metarole assign the account to the LDAP Posix Group, I have to use <assignment> for the Metarole and <inducement> for writing the LDAP account and attributes.</div><div><br></div><div><div>    <assignment></div><div>      <!-- This assigns the LDAP Group Metarole --></div><div>         <targetRef oid="10000000-0000-0000-0000-000000000003</div><span><span></span></span><div>    </assignment></div><div>   </div><div>   <inducement></div><div>     <!-- Sends the job to the appropriate resource --></div><div>      <construction></div><div>         <resourceRef oid="10000000-0000-0000-0000-000000000004"</div><div>                      relation="org:default"</div><div>                      type="c:ResourceType"></resourceRef> </div><div>        <attribute></div><div>            <c:ref>ri:authServices</c:ref></div><div>            <outbound></div><div>               <strength>strong</strength></div><div>               <expression></div><div>                  <value xmlns:xsd="<a href="http://www.w3.org/2001/XMLSchema" target="_blank">http://www.w3.org/2001/XMLSchema</a>"</div><div>                         xmlns:xsi="<a href="http://www.w3.org/2001/XMLSchema-instance" target="_blank">http://www.w3.org/2001/XMLSchema-instance</a>"</div><div>                         xsi:type="xsd:string”>attribute</value></div><div>               </expression></div><div>            </outbound></div><div>         </attribute>  </div><div>      </construction> </div><div><br></div><div>   </inducement></div><div><br></div><div>The Metarole I assign is basically this one:  <a href="https://github.com/Evolveum/midpoint/blob/master/testing/story/src/test/resources/unix/role-meta-unix-group.xml" target="_blank">https://github.com/Evolveum/midpoint/blob/master/testing/story/src/test/resources/unix/role-meta-unix-group.xml</a></div><div><br></div><div>Josh</div><div><br><blockquote type="cite"><div>On Oct 11, 2021, at 7:45 AM, Keith LeValley via midPoint <<a href="mailto:midpoint@lists.evolveum.com" target="_blank">midpoint@lists.evolveum.com</a>> wrote:</div><br><div><div dir="ltr"><div>I was hoping someone might be able to explain the interaction with inducements using associations.</div><div><br></div><div>I am using the example from the demo site, the meta role used to grant group entitlements to openldap.  Below is the xml of that inducements</div><div><br></div><div><inducement id="2"><br>        <construction><br>            <resourceRef oid="2917a607-56a5-46cd-86a6-e8979bec7d31" relation="org:default" type="c:ResourceType"><br>                <!-- openldap --><br>            </resourceRef><br>            <kind>entitlement</kind><br>            <intent>group</intent><br>        </construction><br>    </inducement><br>    <inducement id="3"><br>        <construction><br>            <resourceRef oid="2917a607-56a5-46cd-86a6-e8979bec7d31" relation="org:default" type="c:ResourceType"><br>                <!-- openldap --><br>            </resourceRef><br>            <kind>account</kind><br>            <intent>default</intent><br>            <association id="3"><br>                <ref>ri:group</ref><br>                <outbound><br>                    <expression><br>                        <associationFromLink xmlns:xsi="<a href="http://www.w3.org/2001/XMLSchema-instance" target="_blank">http://www.w3.org/2001/XMLSchema-instance</a>" xsi:type="c:AssociationFromLinkExpressionEvaluatorType"><br>                            <projectionDiscriminator xmlns:xsi="<a href="http://www.w3.org/2001/XMLSchema-instance" target="_blank">http://www.w3.org/2001/XMLSchema-instance</a>" xsi:type="c:ShadowDiscriminatorType"><br>                                <kind>entitlement</kind><br>                                <intent>group</intent><br>                            </projectionDiscriminator><br>                        </associationFromLink><br>                    </expression><br>                </outbound><br>            </association><br>        </construction><br>        <order>2</order><br>    </inducement><br></div><div><br></div><div>This works, when I assign a user to a group, assign that group to the meta role the user gets the openldap inducement and will be added to the group in openldap also.</div><div><br></div><div>Unfortunately this won't work for my setup, I need to split the inducement to openldap and to the group.  The group and the user still get created but the association doesn't seem to work, the user is not assigned to the group.  Below is the inducement to the group that entitles the user with the association</div><div><br></div><div><inducement id="2"><br>        <construction><br>            <resourceRef oid="2917a607-56a5-46cd-86a6-e8979bec7d31" relation="org:default" type="c:ResourceType"><br>                <!-- openldap --><br>            </resourceRef><br>            <kind>account</kind><br>            <intent>default</intent><br>            <association id="9"><br>                <ref>ri:group</ref><br>                <outbound><br>                    <expression><br>                        <associationFromLink xmlns:xsi="<a href="http://www.w3.org/2001/XMLSchema-instance" target="_blank">http://www.w3.org/2001/XMLSchema-instance</a>" xsi:type="c:AssociationFromLinkExpressionEvaluatorType"><br>                            <projectionDiscriminator xmlns:xsi="<a href="http://www.w3.org/2001/XMLSchema-instance" target="_blank">http://www.w3.org/2001/XMLSchema-instance</a>" xsi:type="c:ShadowDiscriminatorType"><br>                                <kind>entitlement</kind><br>                                <intent>group</intent><br>                            </projectionDiscriminator><br>                        </associationFromLink><br>                    </expression><br>                </outbound><br>            </association><br>        </construction><br>    </inducement><br></div><div><br></div><div>Below is the inducement used to entitle the group</div><div><br></div><div><inducement id="2"><br>        <construction><br>            <resourceRef oid="2917a607-56a5-46cd-86a6-e8979bec7d31" relation="org:default" type="c:ResourceType"><br>                <!-- openldap --><br>            </resourceRef><br>            <kind>entitlement</kind><br>            <intent>group</intent><br>        </construction><br>    </inducement></div><div><br></div><div>This to me looks like it should work?  The user still has the same inducements; it's just spread between two different roles instead of on a single meta role.</div><div><br></div><div><br></div><div><br></div>-- <br><div dir="ltr"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr">Keith LeValley<br><div><font face="arial, helvetica, sans-serif">Identity Services Architect</font>, Davenport University</div><div>phone:  (616) 732-1102</div><div><a href="mailto:klevalley2@davenport.edu" target="_blank">klevalley2@davenport.edu<br></a></div></div></div></div></div></div></div></div></div></div>
_______________________________________________<br>midPoint mailing list<br><a href="mailto:midPoint@lists.evolveum.com" target="_blank">midPoint@lists.evolveum.com</a><br><a href="https://lists.evolveum.com/mailman/listinfo/midpoint" target="_blank">https://lists.evolveum.com/mailman/listinfo/midpoint</a><br></div></blockquote></div><br></div></div></blockquote></div><br clear="all"><div><br></div>-- <br><div dir="ltr" class="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr">Keith LeValley<br><div><font face="arial, helvetica, sans-serif">Identity Services Architect</font>, Davenport University</div><div>phone:  (616) 732-1102</div><div><a href="mailto:klevalley2@davenport.edu" target="_blank">klevalley2@davenport.edu<br></a></div></div></div></div></div></div></div></div></div>