The Identity Manager Entitlement collectors are for users who want to use OpenText Identity Governance to provision or revoke accounts and permissions. The entitlement collectors collect accounts and permissions from OpenText Identity Manager using IDM drivers that support entitlements such as Azure, Workday, and SCIM drivers. Like the other OpenText Identity Governance collectors, the entitlement collectors map accounts and permissions to identities by association or other attributes. To successfully collect accounts and permissions:
You must have collected identities from OpenText Identity Manager, and
All supported drivers must be running
NOTE:For the list of supported drivers, see OpenText Identity Governance Quick Start.
You can use the account collectors to collect accounts and the permission collectors to collect permissions and their assignments. For example, the permission collector can collect the building access permission (list of buildings) and assignments (who can access the building).
In addition to IDM credentials, the LDAP distinguished name of the entitlement in the IDM driver is also a mandatory field for the entitlement collectors.
Typically, attribute mappings are preconfigured and have built-in fallback options. For example, by default, the collector maps the account or permission name to the IDM display name. If the collection process does not find the display name, the collector automatically maps the account or permission name to other available attributes such as the description. However, you do need to change the default Account-User Mapping value GUID to Object GUID and the default Permission-Account or User Mapping value association to Account ID from source.