As mentioned in one of the earlier post, few organizations have carried out IdentityIQ implementations in such a way that application data (access and permissions) are fetched in form of csv files using read-only delimited file connector.The greatest negative aspect of such type of architectural pattern is that the organization has to depend upon application support teams (manual process) for decisions to be […]
It is up to organizations to decide that how do they want Sailpoint IdentityIQ to be used for their business requirements. Generally there can be two scenarios. First, requirement can be only to perform User Access Reviews so that the users access to applications are assessed on a regular basis and also so that the […]
There can be many architectural patterns followed during a IdentityIQ implementation but the one shown below is a generic way as most of the organizations have a mixed set of applications which are to be integrated with IIQ as connected applications(using direct connectors) and disconnected applications(using Read-Only connectors).