IAM05 - Deploy and administer the Sailpoint IdentityNow © solution
N° IAM05
CYBERSECURITY
3 DAYS
Objectives:
- Understand the SailPoint IdentityNow SaaS solution and the different
features - Administer the solution on a daily basis: administration console, tracking
of tasks, visualization of requests, management of the rights catalog,
management of roles and SoD, audit and traceability... - Configure and monitor the solution to manage the life cycle of
identities and authorizations
PROGRAM:
DAY 1: Discovering SailPoint IdentityNow
Part 1 - Introduction :
- IdentityNow Overview
- IdentityNow Architecture
- Microservices Architecture
- Virtual appliance
- IQService component
Part 2 - Identities and Access :
- Identity model
- Data sources
- Rights model
- Access requests and approvals
- Governance groups
- Provisioning
Part 3 - Password Management :
- Management principle
- Password change
- Password policy
- Self-Service" interfaces and functionalities made available
- Synchronization of passwords
- Notification templates
DAY 2: Using the compliance features
Part 4 - Research and Reports :
- Using the search module
- Definition of custom search rules
- Using the reporting module
Part 5 - Certification :
- Presentation of the module
- Preparation of a certification
- Configuration of the certification campaign
- Campaign form
- Reassignment of a certification task
- Security
- Key steps in a campaign
- Monitoring
Part 6 - Policies in IDN:
- General presentation
- Definition of SoD segregation of duties policies
- Creation of general policies
- Policy execution
DAY 3: Advanced use of IdentityNow
Part 7 - APIs:
- REST API principles
- IdentityNow Endpoints
- Token creation
Part 8 - Transformation rules :
- Definition
- Use in IdentityNow
- Primitive operation
- Implicit/Explicit input
- Good practices
Part 9 - Advanced rules :
- Definition
- Types of rules
- Deployment of a Connector Rule
Part 10 - System Settings :
- System Settings
- Security Settings
- Email Template
- Personal settings
It is necessary to have a general knowledge of the principles related to identity and authorization management, as well as the underlying technologies (LDAP or SQL, basic Java language)
Intended audience:
- Architect
- Security Engineer
- Security Consultant
- Developer
BOOK THE NEXT SESSION OF YOUR CHOICE
Click on the course of your choice
3490€ HT
Inter and Intra-company
Face-to-face or distance learning
Difficulty : All public
PARIS / RENNES