Changing SailPoint IdentityNow Source Timeout values

Recently I’ve been assisting a client with a SCIM source that has high latency. This causes a number of issues with health validation as well as aggregation and provisioning events. The default values for health check, provisioning and aggregation were causing a myriad of errors.

Previously I’ve shown how to change the healthCheckTimeout in this post from 2019 for a WorkDay source. That was using the v2 API for Source Configuration. In this post I show how to use the v3 Source API to change timeout values.

SailPoint do have some good guidance for an approach to increase the timeout values for each of the different timeouts.

The three I was needing to update are:

  • aggregateTimeout
  • healthCheckTimeout
  • provisioningTimeout

Get Source Configuration

Using my SailPoint IdentityNow PowerShell Module and the Get-IdentityNowSource cmdlet the configuration of the source can be retrieved. You can get the ID of the Source from the URL when viewing the source in the Portal. Or you can get all sources and query for the source you’re looking to change.

$mySource = Get-IdentityNowSource -V3API -sourceID <yourSourceID>
$mySource

or

$sources = Get-IdentityNowSource -V3API
$mySource = $sources | Where-Object { $_.name -eq "mysourcename" }
$mySource | FL

Updating the Source Timeouts

The v3 APIs take a syntax of Operation, Path and Value for the configuration of changes. If the source is new/default the timeout values may not even exist in the configuration. Therefore our change operation is “add”. If they do exist “add” may still work, but “replace” would be the correct operation time.

The path of the timeout values is under the connectorAttributes object. So our path is connectorAttributes/<timeouttype>. e.g. “/connectorAttributes/aggregateTimeout

And finally the value in seconds of the timeout. Putting that all together as JSON in PowerShell as a raw configuration looks like this to add an aggregation timeout of 2 minutes.

$json = '[
     {
        "op": "add",
        "path": "/connectorAttributes/aggregateTimeout",
        "value": "120"
     }
]'

To make the change then using the Update-IdentityNowSource cmdlet and leveraging the returned Source from the earlier example and the configuration update from above looks like this.

Update-IdentityNowSource -sourceID $mySource.externalId -update $json -V3API

Replace aggregateTimeout with healthCheckTimeout or provisioningTimeout to change those timeouts.

Summary

Knowing the different timeouts that are configurable along with their path, using the SailPoint IdentityNow PowerShell module we can get a troublesome source functional.

Darren Robinson

Bespoke learnings from a Microsoft Identity and Access Management Architect using lots of Microsoft Identity Manager, Azure Active Directory, PowerShell, SailPoint IdentityNow and Lithnet products and services.

Recent Posts

Entra Auth Tracer – A Browser Extension for Deep Inspection of Microsoft Entra Authentication Flows

If you've ever needed to debug a Microsoft Entra (Azure AD) authentication flow, you'll know…

2 weeks ago

Entra Provision On Demand PowerShell Module

It’s 2026 and somehow I keep finding myself back in 2016, integrating heritage applications into…

3 weeks ago

Entra News MCP Server

I’ve just published an MCP server that turns Merill & Joshua’s weekly Entra News newsletter…

4 weeks ago

Entra ECMA2Host Tools PowerShell Module

If you've ever worked with the ECMA2Host for Entra Outbound Provisioning you'll be immediately presented…

4 months ago

PowerShell 7 Support Arrives for the Granfeldt PowerShell Management Agent

For over a decade, the Granfeldt PowerShell Management Agent (PSMA) has been the bedrock for…

6 months ago

PowerShell MCP Azure Function Server

Recently under the experimental Azure Functions build Microsoft Developer Advocates have shown enabling Azure Functions…

7 months ago

This website uses cookies.