Sailpoint IdentityIQ Implementation...7. Implementing Risk in IIQ 8. Policies In IIQ Policies in...

Preview:

Citation preview

Sailpoint IdentityIQ ImplementationCourse Agenda

sales@infosectrain.com | www.infosectrain.com

sales@infosectrain.com | www.infosectrain.com

Index1. IAM Overview -> SailPoint Products

2. SailPoint Product Installation and Patching (version 7.3 and 8.0)

3. IdentityIQ Preview

4. Introduction to Sailpoint Virtual Machine + Exercises Environment

5. Sailpoint Monitoring Piece and Important Configuration Files

6. Application onboarding – Authoritative Application and Non-Author-itative Applications Connectors

7. Implementing Risk in IIQ

8. Policies In IIQ

<8.1> Policies in Compliance and Policies in Provisioning

<8.2 >Handling Policy Violations

9. Certifications in IIQ

10. Roles in IIQ

11. Tools, Debugging and Troubleshooting

12. Rules, Tasks and API

13. Reporting

14. Lifecycle Manager and Components

15. Access Requests

16. Lifecycle Events and Custom Workflow

sales@infosectrain.com | www.infosectrain.com

1. IAM Overview -> SailPoint Products

2. SailPoint Product Installation and Patching (version 7.3 and 8.0)

4. Introduction to Sailpoint Virtual Machine + Exercises Environment

Compliance ManagerLifecycle ManagerSailPoint Modules and Artefacts

3. IdentityIQ Preview

Extended AttributesIIQ PropertiesLog4jAudit ConfigurationSysLogEmail Configuration

5. Sailpoint Monitoring Piece and Important Configuration Files

Delimited Single Object, Multiple ObjectJDBC Applications-Mysql databaseLDAPSpecial case ConnectorsMultiplex and Logical Application

6. Application onboarding - Authoritative Application and Non-Authoritative Applications Connectors

sales@infosectrain.com | www.infosectrain.com

Identity level RiskApplication Level RiskTargeted Monitoring

7. Implementing Risk in IIQ

8. Policies In IIQ

8.1 Policies in Compliance and Policies in Provisioning

8.2 Handling Policy Violations

9. Certifications in IIQ

Identity and Event-Based Certifications

Role Based Access Control

10. Roles in IIQ

SOD Policies – Role Level and Entitlement LevelActivity PolicyAccount PolicyRisk PolicyAdvanced Policy

Manager certificationEntitlement OwnerApplication OwnerAdvanced CertificationMembership CertificationComposition Certification

Event Based Certification

JoinerMoverLeaver

sales@infosectrain.com | www.infosectrain.com

11. Tools, Debugging and Troubleshooting

12. Rules, Tasks and API

13. Reporting

14. Lifecycle Manager and Components

15. Access Requests

16. Lifecycle Events and Custom Workflow

Role Modelling and Mining Activities

Business Role MiningIT Role MiningEntitlement Analysis

Custom Workflow Development mapped to Lifecycle Event

sales@infosectrain.com | www.infosectrain.com

Recommended