Sailpont Tutorials , Sailpoint Online Training Tutorials for Beginners
SailPoint Training Course Topics |
Description of Hands-on Coverage |
|
|
1. Identity
IQ Preview |
|
Identity IQ Business Purpose |
Basic Understanding - Overview Session |
Identity IQ Overview |
Basic Understanding - Overview Session |
Identity IQ Common Components |
Basic Understanding - Overview Session |
Overview of an IdentityIQ Project |
Basic Understanding - Overview Session |
|
|
2. Product
Architecture – Installation – Deployment |
|
Understanding the Product Architecture |
Practical Steps - Instalation and Configuration |
Understanding the Installation Procedure for Identity IQ |
Practical Steps - Instalation and Configuration |
|
|
Exercise 1-
Overview and Product Architecture |
3. Identity
cubes: Practical demonstration and Exercise |
|
Identity Cube Overview |
Practical demonstration and Exercise |
Applications/Connectors |
Practical demonstration and Exercise |
Identity Mappings |
Use Cases - HR Application, Contractor Application, PAM, JDBC(Trakk, PRISM) LDAP |
Aggregation of Data |
Use Cases - HR Application, Contractor Application, PAM, JDBC(Trakk, PRISM) LDAP |
Capabilities/Scoping/Workgroups |
Practical demonstration and Exercise |
|
|
4. Application On-boarding, Correlation |
|
On-boarding Applications |
Use Cases - HR Application, Contractor Application, PAM, JDBC(Trakk, PRISM) LDAP |
Account co-relation |
Use Cases - HR Application, Contractor Application, PAM, JDBC(Trakk, PRISM) LDAP |
Application Configuration |
Use Cases - HR Application, Contractor Application, PAM, JDBC(Trakk, PRISM) LDAP |
|
|
Exercise – 2
Application On-boarding, Correlation |
5. Risks and
Policies : Use Case - Entitlement SOD Policy, Account Policy and Custom Logic
Policy |
|
Identity IQ Policy Overview |
Use Case - Entitlement SOD Policy, Account Policy and Custom Logic Policy |
Policy Types |
Use Case - Entitlement SOD Policy, Account Policy and Custom Logic Policy |
Defining Policies |
Use Case - Entitlement SOD Policy, Account Policy and Custom Logic Policy |
Discovering and Handling Policy Violations |
Use Case - Entitlement SOD Policy, Account Policy and Custom Logic Policy |
Identity Risk Model |
Use Case - Entitlements, Policy Volatioon and Certification Risk Configuration |
Refreshing and Interaction with Risk scores |
Use Case - Entitlements, Policy Volatioon and Certification Risk Configuration |
|
|
Exercise – 3 Risks and Policies |
6.Certifications : Use
Case - PAM Application Access Review Certification, Manager Application
Certfication, Group Pwner Certification |
|
Certifications and Access Reviews |
Use Case - PAM Application Access Review Certification, Manager Application Certfication, Group Pwner Certification |
Types of Certifications |
Use Case - PAM Application Access Review Certification, Manager Application Certfication, Group Pwner Certification |
Certification Lifecycle |
Use Case - PAM Application Access Review Certification, Manager Application Certfication, Group Pwner Certification |
Certification Configuration |
Use Case - PAM Application Access Review Certification, Manager Application Certfication, Group Pwner Certification |
Making Certification Decisions |
Use Case - PAM Application Access Review Certification, Manager Application Certfication, Group Pwner Certification |
Certification Decisions |
Use Case - PAM Application Access Review Certification, Manager Application Certfication, Group Pwner Certification |
|
|
Exercise – 4
Certifications |
7. Roles : Use Case -
TRAKK Application Role Management, Business Role Creation, IT Role
Createtion, Role Herrachy and Role Based Provisioning |
|
Role Definition |
Use Case - TRAKK Application Role Management, Business Role Creation, IT Role Createtion, Role Herrachy and Role Based Provisioning |
Role Management Benefits |
Use Case - TRAKK Application Role Management, Business Role Creation, IT Role Createtion, Role Herrachy and Role Based Provisioning |
Role Model Overview |
Use Case - TRAKK Application Role Management, Business Role Creation, IT Role Createtion, Role Herrachy and Role Based Provisioning |
Role Mining |
Use Case - TRAKK Application Role Management, Business Role Creation, IT Role Createtion, Role Herrachy and Role Based Provisioning |
Role Management Pointers |
Use Case - TRAKK Application Role Management, Business Role Creation, IT Role Createtion, Role Herrachy and Role Based Provisioning |
|
|
Exercise – 5
Roles |
8. Troubleshooting, Debug, Console |
|
Factors in successful Troubleshooting and Debugging |
Use Case - Logging and Trouble Shooting Demonstartion and Exercise - beneral |
Logging, Options and Configuration |
Use Case - Logging and Trouble Shooting Demonstartion and Exercise - beneral |
Debug Page |
Use Case - Logging and Trouble Shooting Demonstartion and Exercise - beneral |
Best Practices |
Use Case - Logging and Trouble Shooting Demonstartion and Exercise - beneral |
|
|
Exercise 6– Troubleshooting, Debug, Console |
9. Reporting : Use Case - Creating a capability Report and
Customising Capability Report |
|
Reporting Architecture of SailPoint IIQ |
Use Case - Creating a capability Report and Customising Capability Report |
Defining Data Sources |
Use Case - Creating a capability Report and Customising Capability Report |
Report Column Configuration |
Use Case - Creating a capability Report and Customising Capability Report |
Query Configuration |
Use Case - Creating a capability Report and Customising Capability Report |
|
|
Exercise 7– Reporting |
10. Lifecycle Manager :
Use Case - LCM Configuration, and Access Control , Provisioning Policy ,
Access Provisioning to LDAP and Life Cycle Events (Mover, Leaver, Joiner) |
|
Change Lifecycle |
Use Case - LCM
Configuration, and Access Control , Provisioning Policy ,
Access Provisioning to LDAP and Life Cycle Events (Mover, Leaver, Joiner) |
Key feature and
Considerations |
Use Case - LCM
Configuration, and Access Control , Provisioning Policy ,
Access Provisioning to LDAP and Life Cycle Events (Mover, Leaver, Joiner) |
Access Request Process |
Use Case - LCM Configuration, and Access
Control , Provisioning Policy ,
Access Provisioning to LDAP and Life Cycle Events (Mover, Leaver, Joiner) |
Addition Access and Identity Management Options |
Use Case - LCM
Configuration, and Access Control , Provisioning Policy ,
Access Provisioning to LDAP and Life Cycle Events (Mover, Leaver, Joiner) |
LCM Configuration |
Use Case - LCM
Configuration, and Access Control , Provisioning Policy ,
Access Provisioning to LDAP and Life Cycle Events (Mover, Leaver, Joiner) |
Additional LCM
functionality |
Use Case - LCM
Configuration, and Access Control , Provisioning Policy ,
Access Provisioning to LDAP and Life Cycle Events (Mover, Leaver, Joiner) |
|
|
Exercise 8– Lifecycle
Manager Exercise |
11. Workflow : Use Case -
Custom Workflow Creation for starting automatic certfication process upon
department change |
|
What is a Workflow? |
Use Case - Custom Workflow Creation for starting automatic certfication process upon department change |
Workflows in Identity IQ |
Use Case - Custom Workflow Creation for starting automatic certfication process upon department change |
Key Workflow Concepts |
Use Case - Custom Workflow Creation for starting automatic certfication process upon department change |
Workflow case, variables, steps and approvals |
Use Case - Custom Workflow Creation for starting automatic certfication process upon department change |
Workflow Troubleshooting |
Use Case - Custom Workflow Creation for starting automatic certfication process upon department change |
|
|
Exercise 9– Workflow |
Comments
Post a Comment