IAM04 - Deploy and administer the SailPoint IdentityIQ © IGA solution
N° IAM04
CYBERSECURITY
4 DAYS
- Understand the SailPoint IdentityIQ solution and the different features
- Administer the solution on a daily basis: administration console, task tracking, query viewing, rights catalog management, role and SoD management, auditing and traceability...
- Deploy the solution to manage the lifecycle of identities and authorizations
DAY 1: Discovering the SailPoint IdentityIQ solution
Part 1 - Fundamentals :
- Vocabulary
- Basic concept
Part 2 - "User" Interface:
- Consultation of identities
- Editing an identity
- Access consultation
- Consultation of the accounts
- Account password management
- Requests for access
- Follow-up of requests
Part 3 - Research Module
- Certifications
- Approvals
- Manual actions
- Advanced analysis
DAY 2: Administration of the solution
Part 4 - Current administration interface :
- Identity Warehouse
- Tasks
- Administration console
Part 5 - Data exploitation :
- SoD
- Setting up a certification
- Setting up a report
- Audit
Part 6 - Roles and Permissions :
- Role Model in Identity IQ
- Roles configuration
- Types of roles
- Mining role
- Risk score
- Working Group
- Populations
DAY 3: Implementation - Workflows and provisioning
Part 7 - Identity Workflows:
- Triggering worksflows
- Workflow editing and available step types
- Workflows included in the product
Part 8 - Customization :
- Data model and extensions
- Customization of attributes in the interface
- Interface customization
DAY 4: Implementation - Base and source connectors
Part 9 - Creating a connector :
- General configuration
- Principle of aggregation
- Principle of correlation
- Include the risk score
- Provisioning configuration
Part 10 - Versioning and publishing principles :
- Discovery of the development environment
- Using SailPoint's deliverable creation tool: Services Standard Built (SSB)
- Good practices
Part 11 - Standard Installation of the SailPoint IIQ Platform :
- Installation of the solution
- Initialization
- Integrate the "Lifecycle Manager" module
It is necessary to have a general knowledge of the principles related to identity and authorization management, as well as the underlying technologies (LDAP or SQL, basic Java language)
INTENDED PUBLIC:
- Architect
- Security Engineer
- Security Consultant
- Developer
BOOK THE NEXT SESSION OF YOUR CHOICE
Click on the course of your choice
4520€ HT
Inter and Intra-company
Face-to-face or distance learning
Difficulty : All public
PARIS / RENNES