Sailpont Tutorials , Sailpoint Online Training Tutorials for Beginners
|
SailPoint Training Course Topics |
Description of Hands-on Coverage |
|
|
|
|
1. Identity
IQ Preview |
|
|
Identity IQ Business Purpose |
Basic Understanding - Overview Session |
|
Identity IQ Overview |
Basic Understanding - Overview Session |
|
Identity IQ Common Components |
Basic Understanding - Overview Session |
|
Overview of an IdentityIQ Project |
Basic Understanding - Overview Session |
|
|
|
|
2. Product
Architecture – Installation – Deployment |
|
|
Understanding the Product Architecture |
Practical Steps - Instalation and Configuration |
|
Understanding the Installation Procedure for Identity IQ |
Practical Steps - Instalation and Configuration |
|
|
|
|
Exercise 1-
Overview and Product Architecture |
|
|
3. Identity
cubes: Practical demonstration and Exercise |
|
|
Identity Cube Overview |
Practical demonstration and Exercise |
|
Applications/Connectors |
Practical demonstration and Exercise |
|
Identity Mappings |
Use Cases - HR Application, Contractor Application, PAM, JDBC(Trakk, PRISM) LDAP |
|
Aggregation of Data |
Use Cases - HR Application, Contractor Application, PAM, JDBC(Trakk, PRISM) LDAP |
|
Capabilities/Scoping/Workgroups |
Practical demonstration and Exercise |
|
|
|
|
4. Application On-boarding, Correlation |
|
|
On-boarding Applications |
Use Cases - HR Application, Contractor Application, PAM, JDBC(Trakk, PRISM) LDAP |
|
Account co-relation |
Use Cases - HR Application, Contractor Application, PAM, JDBC(Trakk, PRISM) LDAP |
|
Application Configuration |
Use Cases - HR Application, Contractor Application, PAM, JDBC(Trakk, PRISM) LDAP |
|
|
|
|
Exercise – 2
Application On-boarding, Correlation |
|
|
5. Risks and
Policies : Use Case - Entitlement SOD Policy, Account Policy and Custom Logic
Policy |
|
|
Identity IQ Policy Overview |
Use Case - Entitlement SOD Policy, Account Policy and Custom Logic Policy |
|
Policy Types |
Use Case - Entitlement SOD Policy, Account Policy and Custom Logic Policy |
|
Defining Policies |
Use Case - Entitlement SOD Policy, Account Policy and Custom Logic Policy |
|
Discovering and Handling Policy Violations |
Use Case - Entitlement SOD Policy, Account Policy and Custom Logic Policy |
|
Identity Risk Model |
Use Case - Entitlements, Policy Volatioon and Certification Risk Configuration |
|
Refreshing and Interaction with Risk scores |
Use Case - Entitlements, Policy Volatioon and Certification Risk Configuration |
|
|
|
|
Exercise – 3 Risks and Policies |
|
|
6.Certifications : Use
Case - PAM Application Access Review Certification, Manager Application
Certfication, Group Pwner Certification |
|
|
Certifications and Access Reviews |
Use Case - PAM Application Access Review Certification, Manager Application Certfication, Group Pwner Certification |
|
Types of Certifications |
Use Case - PAM Application Access Review Certification, Manager Application Certfication, Group Pwner Certification |
|
Certification Lifecycle |
Use Case - PAM Application Access Review Certification, Manager Application Certfication, Group Pwner Certification |
|
Certification Configuration |
Use Case - PAM Application Access Review Certification, Manager Application Certfication, Group Pwner Certification |
|
Making Certification Decisions |
Use Case - PAM Application Access Review Certification, Manager Application Certfication, Group Pwner Certification |
|
Certification Decisions |
Use Case - PAM Application Access Review Certification, Manager Application Certfication, Group Pwner Certification |
|
|
|
|
Exercise – 4
Certifications |
|
|
7. Roles : Use Case -
TRAKK Application Role Management, Business Role Creation, IT Role
Createtion, Role Herrachy and Role Based Provisioning |
|
|
Role Definition |
Use Case - TRAKK Application Role Management, Business Role Creation, IT Role Createtion, Role Herrachy and Role Based Provisioning |
|
Role Management Benefits |
Use Case - TRAKK Application Role Management, Business Role Creation, IT Role Createtion, Role Herrachy and Role Based Provisioning |
|
Role Model Overview |
Use Case - TRAKK Application Role Management, Business Role Creation, IT Role Createtion, Role Herrachy and Role Based Provisioning |
|
Role Mining |
Use Case - TRAKK Application Role Management, Business Role Creation, IT Role Createtion, Role Herrachy and Role Based Provisioning |
|
Role Management Pointers |
Use Case - TRAKK Application Role Management, Business Role Creation, IT Role Createtion, Role Herrachy and Role Based Provisioning |
|
|
|
|
Exercise – 5
Roles |
|
|
8. Troubleshooting, Debug, Console |
|
|
Factors in successful Troubleshooting and Debugging |
Use Case - Logging and Trouble Shooting Demonstartion and Exercise - beneral |
|
Logging, Options and Configuration |
Use Case - Logging and Trouble Shooting Demonstartion and Exercise - beneral |
|
Debug Page |
Use Case - Logging and Trouble Shooting Demonstartion and Exercise - beneral |
|
Best Practices |
Use Case - Logging and Trouble Shooting Demonstartion and Exercise - beneral |
|
|
|
|
Exercise 6– Troubleshooting, Debug, Console |
|
|
9. Reporting : Use Case - Creating a capability Report and
Customising Capability Report |
|
|
Reporting Architecture of SailPoint IIQ |
Use Case - Creating a capability Report and Customising Capability Report |
|
Defining Data Sources |
Use Case - Creating a capability Report and Customising Capability Report |
|
Report Column Configuration |
Use Case - Creating a capability Report and Customising Capability Report |
|
Query Configuration |
Use Case - Creating a capability Report and Customising Capability Report |
|
|
|
|
Exercise 7– Reporting |
|
|
10. Lifecycle Manager :
Use Case - LCM Configuration, and Access Control , Provisioning Policy ,
Access Provisioning to LDAP and Life Cycle Events (Mover, Leaver, Joiner) |
|
|
Change Lifecycle |
Use Case - LCM
Configuration, and Access Control , Provisioning Policy ,
Access Provisioning to LDAP and Life Cycle Events (Mover, Leaver, Joiner) |
|
Key feature and
Considerations |
Use Case - LCM
Configuration, and Access Control , Provisioning Policy ,
Access Provisioning to LDAP and Life Cycle Events (Mover, Leaver, Joiner) |
|
Access Request Process |
Use Case - LCM Configuration, and Access
Control , Provisioning Policy ,
Access Provisioning to LDAP and Life Cycle Events (Mover, Leaver, Joiner) |
|
Addition Access and Identity Management Options |
Use Case - LCM
Configuration, and Access Control , Provisioning Policy ,
Access Provisioning to LDAP and Life Cycle Events (Mover, Leaver, Joiner) |
|
LCM Configuration |
Use Case - LCM
Configuration, and Access Control , Provisioning Policy ,
Access Provisioning to LDAP and Life Cycle Events (Mover, Leaver, Joiner) |
|
Additional LCM
functionality |
Use Case - LCM
Configuration, and Access Control , Provisioning Policy ,
Access Provisioning to LDAP and Life Cycle Events (Mover, Leaver, Joiner) |
|
|
|
|
Exercise 8– Lifecycle
Manager Exercise |
|
|
11. Workflow : Use Case -
Custom Workflow Creation for starting automatic certfication process upon
department change |
|
|
What is a Workflow? |
Use Case - Custom Workflow Creation for starting automatic certfication process upon department change |
|
Workflows in Identity IQ |
Use Case - Custom Workflow Creation for starting automatic certfication process upon department change |
|
Key Workflow Concepts |
Use Case - Custom Workflow Creation for starting automatic certfication process upon department change |
|
Workflow case, variables, steps and approvals |
Use Case - Custom Workflow Creation for starting automatic certfication process upon department change |
|
Workflow Troubleshooting |
Use Case - Custom Workflow Creation for starting automatic certfication process upon department change |
|
|
|
|
Exercise 9– Workflow |
|
Comments
Post a Comment