Logical grouping of IDs, that is, groups, do not exist in CA-ACF2 as independent entities as in other security products. In CA-ACF2, groups are implemented by using the UID (User Identification) string.
The UID string is a set of user-defined Logonid fields that are concatenated together in sequence. The UID string is used for access evaluation during rule interpretation. The maximum length of the UID is 24 characters.
The LID (Logon Identifier) is the 1 to 8 character identifier of a user or task. The LID usually resides in the UID (but not always) and usually is the last field of the UID.
When defining CA-ACF2 rules (permissions), the UID is used to describe the relevant users who are granted access with this rule. The rule's UID refers to multiple users - all users whose UID matches the rule's UID.
The CA-ACF2 Connector automatically defines the site's groups based on the CA-ACF2 rules UIDs. Any Rule's UID which potentially refers to a group of users, is defined in the CA-ACF2 Connector's internal Group Database (GDB) as a group. This is done each time Group Aggregation is done.
If targetAggregation is done, each CA-ACF2 rule's permission is assigned to the relevant group or relevant account in IdentityIQ.
This fix, implemented by FSD0056 and FSD0057, if activated by the user, implements the above CA-ACF2 Connector Implementation.
This fix:
Note: Group Aggregation must be done before Account Aggregation.