6
Sailpoint IdentityIQ Implementation Course Agenda [email protected] | www.infosectrain.com

Sailpoint IdentityIQ Implementation...7. Implementing Risk in IIQ 8. Policies In IIQ Policies in Compliance and Policies in Provisioning Handling Policy Violations

  • Upload
    others

  • View
    18

  • Download
    3

Embed Size (px)

Citation preview

Page 1: Sailpoint IdentityIQ Implementation...7. Implementing Risk in IIQ 8. Policies In IIQ  Policies in Compliance and Policies in Provisioning Handling Policy Violations

Sailpoint IdentityIQ ImplementationCourse Agenda

[email protected] | www.infosectrain.com

Page 2: Sailpoint IdentityIQ Implementation...7. Implementing Risk in IIQ 8. Policies In IIQ  Policies in Compliance and Policies in Provisioning Handling Policy Violations

[email protected] | www.infosectrain.com

Index1. IAM Overview -> SailPoint Products

2. SailPoint Product Installation and Patching (version 7.3 and 8.0)

3. IdentityIQ Preview

4. Introduction to Sailpoint Virtual Machine + Exercises Environment

5. Sailpoint Monitoring Piece and Important Configuration Files

6. Application onboarding – Authoritative Application and Non-Author-itative Applications Connectors

7. Implementing Risk in IIQ

8. Policies In IIQ

<8.1> Policies in Compliance and Policies in Provisioning

<8.2 >Handling Policy Violations

9. Certifications in IIQ

10. Roles in IIQ

11. Tools, Debugging and Troubleshooting

12. Rules, Tasks and API

13. Reporting

14. Lifecycle Manager and Components

15. Access Requests

16. Lifecycle Events and Custom Workflow

Page 3: Sailpoint IdentityIQ Implementation...7. Implementing Risk in IIQ 8. Policies In IIQ  Policies in Compliance and Policies in Provisioning Handling Policy Violations

[email protected] | www.infosectrain.com

1. IAM Overview -> SailPoint Products

2. SailPoint Product Installation and Patching (version 7.3 and 8.0)

4. Introduction to Sailpoint Virtual Machine + Exercises Environment

Compliance ManagerLifecycle ManagerSailPoint Modules and Artefacts

3. IdentityIQ Preview

Extended AttributesIIQ PropertiesLog4jAudit ConfigurationSysLogEmail Configuration

5. Sailpoint Monitoring Piece and Important Configuration Files

Delimited Single Object, Multiple ObjectJDBC Applications-Mysql databaseLDAPSpecial case ConnectorsMultiplex and Logical Application

6. Application onboarding - Authoritative Application and Non-Authoritative Applications Connectors

Page 4: Sailpoint IdentityIQ Implementation...7. Implementing Risk in IIQ 8. Policies In IIQ  Policies in Compliance and Policies in Provisioning Handling Policy Violations

[email protected] | www.infosectrain.com

Identity level RiskApplication Level RiskTargeted Monitoring

7. Implementing Risk in IIQ

8. Policies In IIQ

8.1 Policies in Compliance and Policies in Provisioning

8.2 Handling Policy Violations

9. Certifications in IIQ

Identity and Event-Based Certifications

Role Based Access Control

10. Roles in IIQ

SOD Policies – Role Level and Entitlement LevelActivity PolicyAccount PolicyRisk PolicyAdvanced Policy

Manager certificationEntitlement OwnerApplication OwnerAdvanced CertificationMembership CertificationComposition Certification

Event Based Certification

JoinerMoverLeaver

Page 5: Sailpoint IdentityIQ Implementation...7. Implementing Risk in IIQ 8. Policies In IIQ  Policies in Compliance and Policies in Provisioning Handling Policy Violations

[email protected] | www.infosectrain.com

11. Tools, Debugging and Troubleshooting

12. Rules, Tasks and API

13. Reporting

14. Lifecycle Manager and Components

15. Access Requests

16. Lifecycle Events and Custom Workflow

Role Modelling and Mining Activities

Business Role MiningIT Role MiningEntitlement Analysis

Custom Workflow Development mapped to Lifecycle Event

Page 6: Sailpoint IdentityIQ Implementation...7. Implementing Risk in IIQ 8. Policies In IIQ  Policies in Compliance and Policies in Provisioning Handling Policy Violations

[email protected] | www.infosectrain.com