Check status of the separation of duties request(s)

post

/access-governance/access-controls/20250331/separationOfDuties/status

Returns the current status for one or more separation of duties requests.

Request

Header Parameters
  • For optimistic concurrency control. In the PUT or DELETE call for a resource, set the `if-match` parameter to the value of the etag from a previous GET or POST response for that resource. The resource will be updated or deleted only if the etag you provide matches the resource's current etag value.
  • The client request ID for tracing. The only valid characters for request IDs are letters, numbers, underscore, and dash.
  • Minimum Length: 1
    Maximum Length: 64
    A token that uniquely identifies a request so it can be retried in case of a timeout or server error without risk of executing that same action again. Retry tokens expire after 24 hours, but can be invalidated before then due to conflicting operations. For example, if a resource has been deleted and purged from the system, then a retry of the original creation request might be rejected.
Body ()
Separation of duties request IDs.
Root Schema : CheckSeparationOfDutiesStatusDetails
Type: object
List of request statuses per Request ID.
Show Source
Nested Schema : items
Type: array
List of request statuses.
Show Source
Nested Schema : CheckSeparationOfDutiesRequestStatus
Type: object
Request status.
Show Source
Nested Schema : events
Type: array
Separation of Duties Events.
Show Source
Nested Schema : SeparationOfDutiesEvent
Type: object
Separation Of Duties Event.
Show Source
Nested Schema : RequestPayload
Type: object
Represents the payload for a request.
Show Source
Nested Schema : violationSummary
Type: array
Separation Of Duties Violation Summary.
Show Source
Nested Schema : AccountData
Type: object
Information about the user account.
Show Source
Nested Schema : childAssignmentData
Type: array
List of child assignment data.
Show Source
Nested Schema : SeparationOfDutiesAnalysisDetails
Type: object
Details for performing Separation of Duties analysis.
Show Source
Nested Schema : UserData
Type: object
Data of the User associated to a Separation of Duties event.
Show Source
Nested Schema : attributes
Type: array
Account attributes.
Show Source
Nested Schema : Attribute
Type: object
Attribute of the account.
Show Source
Nested Schema : additionalAttributes
Type: array
Additional attributes.
Show Source
Nested Schema : attributes
Type: array
Attributes.
Show Source
Nested Schema : value
Type: array
Value of the attribute.
Show Source
Nested Schema : AdditionalAttribute
Type: object
Additional Attribute.
Show Source
Nested Schema : value
Type: array
Value of the attribute.
Show Source
Nested Schema : ChildAssignmentData
Type: object
Entitlement attributes.
Show Source
Nested Schema : attributes
Type: array
Entitlement attributes.
Show Source
Nested Schema : permissionAssignments
Type: array
Permissions to be analyzed along with the account.
Show Source
Nested Schema : AccountPermission
Type: object
Permission to be scanned.
Show Source
Nested Schema : attributes
Type: array
Account attributes.
Show Source
Nested Schema : attributes
Type: array
User attributes.
Show Source
Nested Schema : SeparationOfDutiesViolationSummary
Type: object
A Separation of Duties violation.
Show Source
Nested Schema : existingRoles
Type: array
Roles already granted to an identity.
Show Source
Nested Schema : requestedRoles
Type: array
Roles requested for an identity.
Show Source
Nested Schema : RoleInfo
Type: object
Identifying information for a role.
Show Source
Nested Schema : accessPoints
Type: array
Access points of the role.
Show Source
Back to Top

Response

Supported Media Types

200 Response

Separation of duties request statuses.
Headers
  • For optimistic concurrency control. See `if-match`.
  • Unique Oracle-assigned identifier for the request. If you need to contact Oracle about a particular request, please provide the request ID.
Body ()
Root Schema : SeparationOfDutiesStatusResponse
Type: object
Current status of one or more separation of duties requests.
Show Source
Nested Schema : items
Type: array
List of request status.
Show Source
Nested Schema : SeparationOfDutiesStatus
Type: object
Separation of Duties status.
Show Source
Nested Schema : sodEvents
Type: array
One or more separation of duties events.
Show Source
Nested Schema : SeparationOfDutiesEvent
Type: object
Separation Of Duties Event.
Show Source
Nested Schema : RequestPayload
Type: object
Represents the payload for a request.
Show Source
Nested Schema : violationSummary
Type: array
Separation Of Duties Violation Summary.
Show Source
Nested Schema : AccountData
Type: object
Information about the user account.
Show Source
Nested Schema : childAssignmentData
Type: array
List of child assignment data.
Show Source
Nested Schema : SeparationOfDutiesAnalysisDetails
Type: object
Details for performing Separation of Duties analysis.
Show Source
Nested Schema : UserData
Type: object
Data of the User associated to a Separation of Duties event.
Show Source
Nested Schema : attributes
Type: array
Account attributes.
Show Source
Nested Schema : Attribute
Type: object
Attribute of the account.
Show Source
Nested Schema : additionalAttributes
Type: array
Additional attributes.
Show Source
Nested Schema : attributes
Type: array
Attributes.
Show Source
Nested Schema : value
Type: array
Value of the attribute.
Show Source
Nested Schema : AdditionalAttribute
Type: object
Additional Attribute.
Show Source
Nested Schema : value
Type: array
Value of the attribute.
Show Source
Nested Schema : ChildAssignmentData
Type: object
Entitlement attributes.
Show Source
Nested Schema : attributes
Type: array
Entitlement attributes.
Show Source
Nested Schema : permissionAssignments
Type: array
Permissions to be analyzed along with the account.
Show Source
Nested Schema : AccountPermission
Type: object
Permission to be scanned.
Show Source
Nested Schema : attributes
Type: array
Account attributes.
Show Source
Nested Schema : attributes
Type: array
User attributes.
Show Source
Nested Schema : SeparationOfDutiesViolationSummary
Type: object
A Separation of Duties violation.
Show Source
Nested Schema : existingRoles
Type: array
Roles already granted to an identity.
Show Source
Nested Schema : requestedRoles
Type: array
Roles requested for an identity.
Show Source
Nested Schema : RoleInfo
Type: object
Identifying information for a role.
Show Source
Nested Schema : accessPoints
Type: array
Access points of the role.
Show Source

400 Response

Bad Request
Headers
  • Unique Oracle-assigned identifier for the request. If you need to contact Oracle about a particular request, please provide the request ID.
Body ()
Root Schema : Error
Type: object
Error Information.
Show Source

401 Response

Unauthorized
Headers
  • Unique Oracle-assigned identifier for the request. If you need to contact Oracle about a particular request, please provide the request ID.
Body ()
Root Schema : Error
Type: object
Error Information.
Show Source

404 Response

Not Found
Headers
  • Unique Oracle-assigned identifier for the request. If you need to contact Oracle about a particular request, please provide the request ID.
Body ()
Root Schema : Error
Type: object
Error Information.
Show Source

409 Response

Conflict
Headers
  • Unique Oracle-assigned identifier for the request. If you need to contact Oracle about a particular request, please provide the request ID.
Body ()
Root Schema : Error
Type: object
Error Information.
Show Source

412 Response

Precondition failed
Headers
  • Unique Oracle-assigned identifier for the request. If you need to contact Oracle about a particular request, please provide the request ID.
Body ()
Root Schema : Error
Type: object
Error Information.
Show Source

429 Response

Too Many Requests
Headers
  • Unique Oracle-assigned identifier for the request. If you need to contact Oracle about a particular request, please provide the request ID.
Body ()
Root Schema : Error
Type: object
Error Information.
Show Source

500 Response

Internal Server Error
Headers
  • Unique Oracle-assigned identifier for the request. If you need to contact Oracle about a particular request, please provide the request ID.
Body ()
Root Schema : Error
Type: object
Error Information.
Show Source

Default Response

Unknown Error
Headers
  • Unique Oracle-assigned identifier for the request. If you need to contact Oracle about a particular request, please provide the request ID.
Body ()
Root Schema : Error
Type: object
Error Information.
Show Source
Back to Top

Examples

The following example shows how to check status of SoD flagged requests.

cURL Request Example

curl -i -X POST \
   -H "Authorization:Bearer <your-access-token>" \
   -H "Content-Type:application/json" \
   -d \
'{
    "requestIds": [
        "001673a9955b43fc97aedcdxxx71e14f2",
        "f334fbba4e1b41b1a2fc21345xxd73e729"
    ]
}'\
 '<${service-instance-url}/access-governance/access-controls/${versionId}/separationOfDuties/actions/status>'

Example Request Payload

{
    "requestIds": [
        "001673a9955b43fc97aedcdxxx71e14f2",
        "f334fbba4e1b41b1a2fc21345xxd73e729"
    ]
}

Example of the Response Code

You'll receive 200 OK response along with the following response body:

{
    "items": [
        {
            "requestId": "001673a9955b43fc97aedc93571e14f2",
            "requestStatus": "SUCCESS",
            "timeRequested": "2025-11-12T16:51:55.000Z",
            "timeRequestCompletion": "2025-11-12T16:55:01.227Z",
            "requestedBy": "88b9690ece344653953570480031e7d0",
            "sodEvents": [
                {
                    "id": "b582216225204201b011a09d59df46e0",
                    "status": "SUCCESS",
                    "createdBy": "88b9690ece344653953570480031e7d0",
                    "timeCreated": "2025-11-12T16:51:55.000Z",
                    "timeProcessingStarted": "2025-11-12T16:51:57.282Z",
                    "timeProcessingEnded": "2025-11-12T16:55:01.227Z",
                    "hasConflict": true,
                    "provider": "FA_RMCS",
                    "violations": [
                        {
                            "controlName": "10103: Sensitive Joint Venture Stakeholder Privileges",
                            "violation": [
                                {
                                    "conflictingRole": "Application Implementation Consultant",
                                    "accessPoint": "Manage Joint Venture Definition"
                                }
                            ]
                        }
                    ]
                }
            ]
        },
        {
            "requestId": "f334fbba4e1b41b1a2fc2135cd73e729",
            "requestStatus": "FAILED",
            "timeRequested": "2025-11-12T16:51:57.000Z",
            "timeRequestCompletion": "2025-11-12T16:52:37.853Z",
            "requestedBy": "88b9690ece344653953570480031e7d0",
            "sodEvents": [
                {
                    "id": "20b2884487674888960c83320212bdd2",
                    "status": "FAILED",
                    "createdBy": "88b9690ece344653953570480031e7d0",
                    "timeCreated": "2025-11-12T16:51:57.000Z",
                    "timeProcessingStarted": "2025-11-12T16:52:18.772Z",
                    "timeProcessingEnded": "2025-11-12T16:52:37.853Z",
                    "hasConflict": false,
                    "provider": "FA_RMCS",
                    "violations": []
                }
            ]
        }
    ]
}
Back to Top