It is up to organizations to decide that how do they want Sailpoint IdentityIQ to be used for their business requirements. Generally there can be two scenarios. First, requirement can be only to perform User Access Reviews so that the users access to applications are assessed on a regular basis and also so that the […]
There can be many architectural patterns followed during a IdentityIQ implementation but the one shown below is a generic way as most of the organizations have a mixed set of applications which are to be integrated with IIQ as connected applications(using direct connectors) and disconnected applications(using Read-Only connectors).
A few months back we saw that Sailpoint released their 6.0 and then 6.1 versions of IdentityIQ. Still in many of the ongoing implementations around the world many organizations are still using IdentityIQ 5.5 version. Talking about connectors, what’s that we have been missing in version 5.5 and what’s new that we have got in […]
User provisioning and Account provisioning are same terms and are interchangeably used. Provisioning can be thought of as 1. The process of granting, changing, or removing user access to systems, applications and databases based on a unique user identity by creation of user accounts on target systems. 2. The process of providing customers or clients […]
Certification processes are very important when we speak of Access Governance using Sailpoint IdentityIQ. Generally the concepts remain the same as in any other Access Governance product ,but let us try to gain some more insight into IdentityIQ certifications. The Certification processes allow reviewersmanagerscertifiers to review and remediate accesses granted to users on various resources […]