A target attribute value needs to be assigned to each of the Verify's attribute. The mapping can be changed by selecting an appropriate value from the drop-down list. IBM Security™ Verify (ISV) enables creating custom attributes. Read further to undertand the details for the following elements in the Attribute Mapping Section
Attributes that are associated with the user profile can be considered as Verify's attributes. The values for an existing user can be viewed from Directory --> Users and groups. Select or search the user and click the View full profile in slide out. The following image shows various user attribute values.
Transformation applies a transformation to the attribute before being passed on to the target account. For example, applying a 'Uppercase' transformation ensures that the attribute value is in uppercase on the target account. The following is a list of built-in transformations available in IBM Security™ Verify.
- Uppercase
- Lowercase
- Base64 Encode
- Base64 Decode
- Encode URI
- Encode URI Component
- Decode URI
- Decode URI Component
- Generate a UUID if no value is evaluated
- Current Time (seconds)
- Current Time (milliseconds)
- SHA 256 Hash
- SHA 512 Hash
Target Attribute
Target attributes imply the attributes for the target account that gets associated with the target application when the user is provisioned.
Read further to understand how the Built-in transformation Uppercase and Lowercase can be used.
Uppercase
For a Salesforce target, the following image is an example that shows the usage of the Uppercase built-in rule. In the attribute mapping, the transformation rule of Uppercase is applied for the 'Department' attribute.
The following image shows that after a user is provisioned or modified, the Department value in the Salesforce target gets updated in uppercase.
Lowercase
Similarly, the Lowercase inbuilt transformation can be used to provision the value in lower case for the selected attribute.
The following image shows that after a user is provisioned or modified, the Department value in the Salesforce target gets updated in lowercase.
Transformation using Custom Attributes and Custom Rules
IBM Security™ Verify provides capabilities to create custom attributes and use custom rules. Read further to see how to use the capability to define custom attributes and add custom rules for these attributes. A rule can be created in two ways.
- Attribute that has a rule. (Custom Attributes)
- Direct Custom rule
Attribute that has a rule. (Custom Attributes)
Custom attributes can be created and used in the Attribute mapping section. Custom Attributes allow a custom rule to be associated with the custom attribute. The rules in turn can be used for adding a custom script to transform the attribute.
Rules allow the user to use functions to reference, transform, and combine attribute values before they are passed for provisioning accounts. Functions can access the user object (in SCIM form) that is stored in Cloud Directory and any external API endpoint. the formalDisplayName attribute can be created as a fixed value attribute and a function can be specified that concatenates the user.name.givenName and user.name.familyName in a specified manner.
Note: The function syntax is C- and JavaScript-like. However, it is based on a single-line expression language, Google Common Expression Language.
To configure advanced rule attributes, in the Admin console go to Directory --> Attributes. Then map these attributes in the application configuration like mapping all other attribute types.
You can specify the name of the attribute as follows:
You can specify the rules as follows
This new custom attribute can now be used in the Attribute Mapping section in the Account Lifecycle Panel. See the following image.
Read further to see how to create a Direct Custom Rule and use it in the attribute mapping section.
Direct Custom Rule
The Direct Custom Rule approach allows the user to configure a rule and corresponding script directly in the Account Lifecyle panel, without having to create a new Custom Attribute. If certain transformation or rules don't need to be shared across multiple applications, this approach can be useful.
Authors
Pratiksha Sonawadekar, IBM Security Verify team.
Abhijit Dusane, IBM Security Verify team.