sailpoint identityiq implementation...7. implementing risk in iiq 8. policies in iiq policies in...
TRANSCRIPT
Sailpoint IdentityIQ ImplementationCourse Agenda
[email protected] | www.infosectrain.com
[email protected] | www.infosectrain.com
Index1. IAM Overview -> SailPoint Products
2. SailPoint Product Installation and Patching (version 7.3 and 8.0)
3. IdentityIQ Preview
4. Introduction to Sailpoint Virtual Machine + Exercises Environment
5. Sailpoint Monitoring Piece and Important Configuration Files
6. Application onboarding – Authoritative Application and Non-Author-itative Applications Connectors
7. Implementing Risk in IIQ
8. Policies In IIQ
<8.1> Policies in Compliance and Policies in Provisioning
<8.2 >Handling Policy Violations
9. Certifications in IIQ
10. Roles in IIQ
11. Tools, Debugging and Troubleshooting
12. Rules, Tasks and API
13. Reporting
14. Lifecycle Manager and Components
15. Access Requests
16. Lifecycle Events and Custom Workflow
[email protected] | www.infosectrain.com
1. IAM Overview -> SailPoint Products
2. SailPoint Product Installation and Patching (version 7.3 and 8.0)
4. Introduction to Sailpoint Virtual Machine + Exercises Environment
Compliance ManagerLifecycle ManagerSailPoint Modules and Artefacts
3. IdentityIQ Preview
Extended AttributesIIQ PropertiesLog4jAudit ConfigurationSysLogEmail Configuration
5. Sailpoint Monitoring Piece and Important Configuration Files
Delimited Single Object, Multiple ObjectJDBC Applications-Mysql databaseLDAPSpecial case ConnectorsMultiplex and Logical Application
6. Application onboarding - Authoritative Application and Non-Authoritative Applications Connectors
[email protected] | www.infosectrain.com
Identity level RiskApplication Level RiskTargeted Monitoring
7. Implementing Risk in IIQ
8. Policies In IIQ
8.1 Policies in Compliance and Policies in Provisioning
8.2 Handling Policy Violations
9. Certifications in IIQ
Identity and Event-Based Certifications
Role Based Access Control
10. Roles in IIQ
SOD Policies – Role Level and Entitlement LevelActivity PolicyAccount PolicyRisk PolicyAdvanced Policy
Manager certificationEntitlement OwnerApplication OwnerAdvanced CertificationMembership CertificationComposition Certification
Event Based Certification
JoinerMoverLeaver
[email protected] | www.infosectrain.com
11. Tools, Debugging and Troubleshooting
12. Rules, Tasks and API
13. Reporting
14. Lifecycle Manager and Components
15. Access Requests
16. Lifecycle Events and Custom Workflow
Role Modelling and Mining Activities
Business Role MiningIT Role MiningEntitlement Analysis
Custom Workflow Development mapped to Lifecycle Event
[email protected] | www.infosectrain.com