sailpoint identityiq implementation...7. implementing risk in iiq 8. policies in iiq policies in...

6
Sailpoint IdentityIQ Implementation Course Agenda [email protected] | www.infosectrain.com

Upload: others

Post on 04-Mar-2021

13 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Sailpoint IdentityIQ Implementation...7. Implementing Risk in IIQ 8. Policies In IIQ  Policies in Compliance and Policies in Provisioning Handling Policy Violations

Sailpoint IdentityIQ ImplementationCourse Agenda

[email protected] | www.infosectrain.com

Page 2: Sailpoint IdentityIQ Implementation...7. Implementing Risk in IIQ 8. Policies In IIQ  Policies in Compliance and Policies in Provisioning Handling Policy Violations

[email protected] | www.infosectrain.com

Index1. IAM Overview -> SailPoint Products

2. SailPoint Product Installation and Patching (version 7.3 and 8.0)

3. IdentityIQ Preview

4. Introduction to Sailpoint Virtual Machine + Exercises Environment

5. Sailpoint Monitoring Piece and Important Configuration Files

6. Application onboarding – Authoritative Application and Non-Author-itative Applications Connectors

7. Implementing Risk in IIQ

8. Policies In IIQ

<8.1> Policies in Compliance and Policies in Provisioning

<8.2 >Handling Policy Violations

9. Certifications in IIQ

10. Roles in IIQ

11. Tools, Debugging and Troubleshooting

12. Rules, Tasks and API

13. Reporting

14. Lifecycle Manager and Components

15. Access Requests

16. Lifecycle Events and Custom Workflow

Page 3: Sailpoint IdentityIQ Implementation...7. Implementing Risk in IIQ 8. Policies In IIQ  Policies in Compliance and Policies in Provisioning Handling Policy Violations

[email protected] | www.infosectrain.com

1. IAM Overview -> SailPoint Products

2. SailPoint Product Installation and Patching (version 7.3 and 8.0)

4. Introduction to Sailpoint Virtual Machine + Exercises Environment

Compliance ManagerLifecycle ManagerSailPoint Modules and Artefacts

3. IdentityIQ Preview

Extended AttributesIIQ PropertiesLog4jAudit ConfigurationSysLogEmail Configuration

5. Sailpoint Monitoring Piece and Important Configuration Files

Delimited Single Object, Multiple ObjectJDBC Applications-Mysql databaseLDAPSpecial case ConnectorsMultiplex and Logical Application

6. Application onboarding - Authoritative Application and Non-Authoritative Applications Connectors

Page 4: Sailpoint IdentityIQ Implementation...7. Implementing Risk in IIQ 8. Policies In IIQ  Policies in Compliance and Policies in Provisioning Handling Policy Violations

[email protected] | www.infosectrain.com

Identity level RiskApplication Level RiskTargeted Monitoring

7. Implementing Risk in IIQ

8. Policies In IIQ

8.1 Policies in Compliance and Policies in Provisioning

8.2 Handling Policy Violations

9. Certifications in IIQ

Identity and Event-Based Certifications

Role Based Access Control

10. Roles in IIQ

SOD Policies – Role Level and Entitlement LevelActivity PolicyAccount PolicyRisk PolicyAdvanced Policy

Manager certificationEntitlement OwnerApplication OwnerAdvanced CertificationMembership CertificationComposition Certification

Event Based Certification

JoinerMoverLeaver

Page 5: Sailpoint IdentityIQ Implementation...7. Implementing Risk in IIQ 8. Policies In IIQ  Policies in Compliance and Policies in Provisioning Handling Policy Violations

[email protected] | www.infosectrain.com

11. Tools, Debugging and Troubleshooting

12. Rules, Tasks and API

13. Reporting

14. Lifecycle Manager and Components

15. Access Requests

16. Lifecycle Events and Custom Workflow

Role Modelling and Mining Activities

Business Role MiningIT Role MiningEntitlement Analysis

Custom Workflow Development mapped to Lifecycle Event

Page 6: Sailpoint IdentityIQ Implementation...7. Implementing Risk in IIQ 8. Policies In IIQ  Policies in Compliance and Policies in Provisioning Handling Policy Violations

[email protected] | www.infosectrain.com