Application Onboarding Task
SailPoint finally introduced aCSV file based rapid application onboarding task template, called ApplicationBuilder Task with IIQ 7.3. In this approach, there is no requirement forperforming any additional beanshell scripting. Instead, a CSV file needs to befilled with all the required configuration parameters.
Configuration
Let us see below the involvedconfiguration items –
Task Template
A Task Template with the name Application Builderwill be available out of the box from which new tasks can be created. Belowmentioned operations can be performed using this task –
- Create
- Update
- Read
Apart from creating multipleapplications, this task is useful for updating applications in bulk as well, incase of server migration. The Read operation reads the attribute map of theexisting application(s), to gather the data to export into a CSV, which can beutilized as a model, with updated contents, for the Create and Updateoperation.
This task provides additionaloptions, such as –
- Preparinga CSV file as template for reference and save it in the physical server
- Performingtest connection for the applications created
- Creatingaggregation task for the created applications and running them afterward asseparate threads
Rule
Even though Application Buildertask is not of Run Rule type, yet it will refer to a rule that is available inthe object editor. Rule name is Application Builder. This rule holds the core logic in theBeanshell script. Based on the project requirement, performance of the task canbe modified.
Considerations
- Atleast one application of the desired type must be created to generate thetemplate CSV file for that type
- Tocreate application with different schema and provisioning policy Form, aseparate column needs to be included in the exported CSV file. Otherwise, p1patch needs to be applied on IIQ 7.3
Logiplex Connector
Logiplex connector is an upgradedform of Logical connector, with a flavor of multiplex. Logical connector hasbeen available ever since the beginning, but it did not have the capability ofautomated generation. So, each logical application definitions required to beconfigured manually. Now, with Logiplex, which has been made available throughSSD 6.0, application definitions with behavior like Logical, can be createdautomatically. Application on-boarding process is very similar to Multiplexapplication, thus, the name.
Differences it has with Logicalapplication are –
- Derivedsub-accounts can be based upon only one tier application
- Applicationcreation along with aggregation will be automated
- Logiplexsub-applications will also hold provisioning policy Form. Like Multiplexing,that Policy Form can be varied, if required, using another rule option calledproxyGeneratorRule
Differences it has withMultiplexing are –
- MultipleResourceObjects can be generated and returned from a single entry in source.That leads to multiple derived accounts, spread over multiple sub-applications,from one single account in the physical application
Configuration

Let us see below the involveditems for implementation of Logiplex connector squad –
Master Application
Here, the tier application of theLogical application, i.e. the actual single source feed has been termed asMaster application. Before setting Logiplex connector application definition,Master application must be in a functioning condition.
Main Application
This is the applicationdefinition, we will create, is going to have the connector type as Logiplex. Masterapplication name must be mentioned as part of the configuration. Main applicationuses the connector information of the Master application to aggregate accountsfrom the physical source and performs everything of the Logiplexing. As aconfiguration step, provisioning forms needs to be added manually through XMLeditor by copying it from the Master application.
Sub-Applications
These are the applications thatperform the logical grouping of the entitlements or accounts and will bederived from the Main application Aggregation task. A Sub Application will havethe Main application defined as a Proxy. These applications will also copy the provisioningform and schema from the Main application as well. But Sub-applications, ifrequired, these applications can be modified using proxyGeneratorRule.
Logiplex Split Rule
This Rule will be used with thesimilar functionality of the Customization Rule in Multiplexing. Instead ofadding entries to the ResourceObject, here, a HashMap will be generated with sub-applicationsas its keys and the respective ResourceObjects as their values. So, the single ResourceObjectprepared from the data pulled from the source feed, will be cloned and tweakedas per the requirement, for each of the sub-applications.
Input Arguments | ResourceObject Object & name of the Main applicationHashMap to returnLogiplex Util – A Utility class comes along with the Logiplex connector |
Output | HashMap of sub-application names and respective ResourceObjects |
Modes of Logiplexing
Logiplexing can be implemented intwo modes –
Classic Mode
Above described three tier(Master application àMain application àSub-application) setup is the classic mode.
Adapter Mode
In this mode, we can do away with the Main application, and make the Mater Application itself behave like Main application as well. To implement, few manual changes in the XML structure are required. For critical applications, modifying the Master application into a Logiplex connector should be performed with utmost care. But if done correctly, implementation of Adapter mode will increase efficiency especially for the application with huge number of user accounts and groups. In this mode, as Main application

Considerations before Implementation
Logiplex connector does not comealong with identityiq.war file, instead it is being shipped with SSD package –
- In most of the company, IIQ project is managedthrough SSD only. If the identityiq .war file is generated through SSD,Logiplex connector will get included in it automatically
- If SSD is not being used, in that case each ofthe files for Logiplex connector, such as XHTMLs, class files, and theConnector-Registry XML must be collected from the SSD and deployed in therunning identityiq folder structure manually. Server must be restarted afterdeployment
In the next part we will compare all these three native approaches for rapid application on-boarding. To read please click here.
Advertisement
Privacy Settings
FAQs
How do I onboard an application in SailPoint? ›
1. Requester fills out and submit the Group and Role Management Request Form under the SailPoint IdentityIQ service page. 2a. The IAM Team will review the request form and schedule an interview to confirm understanding of application and gather initial requirements.
What is the difference between IdentityNow and IIQ? ›SailPoint IdentityIQ is a fully governance-based Identity and Access Management solution that provides rapid, convenient access that keeps business users productive, and their business safe by using access controls whereas SailPoint IdentityNow is an open identity platform which gives enterprises the potential to scale ...
What does IIQ stand for in SailPoint? ›IdentityIQ (IIQ), by SailPoint, is a third-party Identity Governance Administration (IGA) solution.
What is the difference between IDN and IIQ? ›IdentityIQ can be deployed on-premises, on a cloud platform through AWS or Azure, or on a cloud managed service. IdentityNow is a SaaS deployment, only requiring the setup of Virtual Appliance (VA) clusters on-premises.
How do I onboard an application? ›- Emphasize Your Value Proposition. ...
- Highlight Core Features. ...
- Only Ask For What You Need. ...
- Don't Overwhelm Users & Keep It Quick. ...
- Avoid the Obvious. ...
- Make it Easy to Sign Up. ...
- End With a CTA.
Application onboarding is a key layer in an identity and access management (IAM) strategy. It gives security managers the visibility they need to oversee enterprise systems and identify which accounts and privileges users have throughout the organization.
How many types of role are there in SailPoint? ›There are two types of roles can be created in Sail Point, they are. What is Native Identity? Native Identity is the one which are directly created in the IIQ rather than source or target systems.
Which components are not required for SailPoint IIQ? ›Web Server is not a mandatory component but can be used to proxy application server instead of exposing application server directly.
Is Okta better than SailPoint? ›OKTA vs SailPoint: Which One Is the Best
Also, SailPoint is only used by large companies. Thus, OKTA is a better and more effective tool to use as: It Offers a comprehensive identity management solution, such as improved security and compliance and integration with more than 5000 cloud applications.
SailPoint's approach is to define the steps to quickly and efficiently onboard systems in a uniform process. To build effective application onboarding, we will help create the information gathering, development and integration steps to speed up your interactions with application teams. Application Prioritization.
What is workflow in SailPoint IIQ? ›
A workflow is a set of steps that are completed every time a specific event occurs. Workflows do work for you, automatically performing a series of actions within IdentityNow that you can configure in response to a trigger.
What is rules in SailPoint IIQ? ›A rule is a code-based configuration that provides additional flexibility where needed. For example, rules can be used to calculate complex identity attributes, modify provisioning instructions, or interact with a connector.
How to configure SSO in SailPoint IIQ? ›To access the SAML configuration page in IIQ, choose Global Settings>Login Configuration>SSO Configuration. Then enable SAML Based Single Sign-on (SSO).
What is the difference between identity and account in SailPoint? ›An identity will contain many user accounts, but there will only be one, single identity record per user. A typical enterprise will look at their Active Directory (AD) as the system-of-record for identities, but AD also controls and maintains user accounts.
Is SailPoint an IAM? ›SailPoint is a leader in integrating PAM and IAM systems, helping organizations manage both privileged and standard accounts.
What is the 4 step onboarding process? ›Phase 1: Pre-Onboarding. Phase 2: Welcoming New Hires. Phase 3: Job-Specific Training. Phase 4: Ease of Transition to the New Hire's New Role.
How do I fill out an onboarding checklist? ›- Recruitment process.
- Role of the employee.
- Goal setting.
- Job training.
- Introduction to company culture.
- Dates for check-ins.
- Meeting with other employees or superiors.
- Documentation.
App onboarding is a set of screens leading users through your app's benefits and features. Onboarding process is necessary because it shows users the app's benefits, educates them about the functions and gathers profile information to deliver personalized content and notifications.
What is the difference between virtual onboarding and onboarding? ›Virtual Onboarding vs Traditional Onboarding
You can still introduce new hires to your company culture, guide them through the technology, hold one-on-one meetings, and assign an onboarding buddy as you do during the traditional onboarding process — the difference is that all these activities are performed online.
What is Onboarding Software? Onboarding software is an HR tool that allows you to automate and track where new employees are within their onboarding process. There are often many steps to an onboarding program and sometimes it can feel overwhelming.
Is SailPoint IAM or Pam? ›
SailPoint is a leader in integrating PAM and IAM systems, helping organizations manage both privileged and standard accounts.
What is SSO in SailPoint? ›What is single sign-on? Single sign-on, sometimes referred to as SSO, is a type of authentication that allows users to use a single set of login credentials (e.g., username and password) to access multiple applications, websites, or services.
What are lifecycle events in SailPoint? ›- Maximize Day 1 productivity with automated provisioning of access to apps and data.
- Automatically adjust access as users change roles, take on new projects or leave the organization.
- Provide users with self-service access requests and automated actions built from identity-based policies.
SailPoint sets the industry standard on PAM and API integration for Identity and Access Management systems, allowing your organization to centrally manage access to both privileged and standard accounts—with ease.
Which programming language is used in SailPoint? ›The BeanShell language is based on Java and can use all Java classes that are available to IdentityIQ, including custom code.
What database does SailPoint use? ›SailPoint Oracle Database integration is capable of end-to-end user administration with provisioning and password management capabilities of Oracle database, helping provide rich governance and control experience to the enterprise.
Who is a competitor of SailPoint? ›We have compiled a list of solutions that reviewers voted as the best overall alternatives and competitors to SailPoint, including Microsoft Azure Active Directory, Okta Workforce Identity, JumpCloud, and Oracle Identity Management. Have you used SailPoint before?
Does SailPoint pay well? ›The average SailPoint Technologies salary ranges from approximately $53,000 per year for Administrative Coordinator to $207,000 per year for Principal Product Manager.
Does SailPoint use SAML? ›Configure SSO in SailPoint
Select the Login Configuration option in the Global Settings screen. Select the Enable SAML Based Single Sign-On (SSO) checkbox. In the Login Configuration page, select the tab SSO Configuration and use following values in respective attributes to set up SailPoint as SP. Click Save.
SailPoint IdentityIQ is designed to provide a unified identity governance approach that will link all access requests, compliance controls, and compliance events. It will help organizations minimize identity risk and identify risk indicators. SailPoint IdentityIQ provides an end-to-end identity governance solution.
What is the salary of TCS SailPoint? ›
Experience in years | Salary Range per annum |
---|---|
4 - 6 | ₹ 10.0Lakhs - ₹ 12.0Lakhs |
6 - 8 | ₹ 13.0Lakhs - ₹ 16.0Lakhs |
8 - 10 | ₹ 18.0Lakhs - ₹ 20.0Lakhs |
- Self-service: Users manage some aspects of user provisioning on their own; for example, password updates.
- Discretionary: Users are granted access to data and applications by an administrator.
The three basic components of a workflow are Input, Process, and Output.
What is schema in SailPoint? ›Each source supports a variety of details about each user who has an account, such as their name, email address, and other information. These pieces of data are known as attributes. The set of account attributes each source stores and how they're organized is known as the account's schema.
What is connector in SailPoint IIQ? ›The SailPoint's JDBC Connector is used for Read/Write operations on the data of JDBC- enabled database engines.
What is risk score in SailPoint? ›Base risk scores are set on each role, entitlement, and policy defined. This type of score ranges from 0 (lowest risk) to 1000 (highest risk). The account weight assigned to any additional entitlements that are assigned to an identity also have an impact base risk scores.
What is exclusion rule in SailPoint IIQ? ›The Exclusion Rule iterates over the items in a certification and removes items based on logic built within the rule. The matching items are removed from the “active list” and added to a list of items to be excluded (these items can be saved for future analysis).
What are tasks in SailPoint? ›Task are used to automate the processes which build, update, and maintain the information contained within IdentityIQ. Use the basic tasks provide by SailPoint, or create and customize the task to meet the needs of your organization.
How to use LDAP for SSO? ›- Log into Harness, mouseover Continuous Security, and then click Access Management.
- From the resulting Access Management page, click Authentication Settings.
- From the Authentication Settings page, click Add SSO Providers, then click LDAP.
OAuth focuses on that trusted relationship allowing user identity information to be shared across the domains. OpenID Connect (OIDC) is an authentication layer that was built on top of OAuth 2.0 to provide Single Sign-on functionality.
How do I enable SSO for an application? ›
- Select Register in the upper right corner of the page.
- For Email, enter the email address of the user that will access the application. Ensure that the user account is already assigned to the application.
- Enter a Password and confirm it.
- Select Register.
- Open the identity profile you want to edit and select the Mappings tab. ...
- To change or set the source attribute mapping for an identity attribute: ...
- If an identity attribute cannot be set directly from a source attribute, you can use a transform or rule to calculate the attribute value.
- Select Request Center from the navigation menu.
- Select the Applications, Roles, or Entitlements tab depending on the access you want to request. ...
- Select Request in the corner of the card or in the details menu. ...
- If your request requires an access profile, select an access profile in the new window.
Refresh identity tasks scan all identities to ensure that all identity information is up-to-date and accurate. Refresh identity scans are also used to detect and report on policy violations and launch event certifications.
Does SailPoint use AWS? ›The SailPoint Identity Platform is a multi-tenant software-as-a-service (SaaS) solution natively platformed on AWS that operates as the core of a modern identity security strategy.
What is the basics of SailPoint? ›SailPoint IdentityNow is an identity and access management (IAM) solution that enables you to control user identities and access to cloud-based resources such as data, applications, and resources. You can automate identity management procedures, enhance security and compliance, and lower IT expenses.
How do I terminate a user in SailPoint? ›Go to Admin > Identities > Identity List. Select the name of the user you want to disable.
How do you trigger joiner in SailPoint? ›Hi @tharshini - you'll want to go to 'Setup'->'LifeCycle Events' . This will show you all the existing LCE's in your environment, as well as add new ones. Clicking on one of the existing will show you the details, including a 'Event Type' which indicates what is going to trigger the flow.
What are the connectors in SailPoint? ›Name | Application Type |
---|---|
Amazon Web Services | Infrastructure-as-a-Service |
Asana | Collaboration & Productivity |
Assetic | IT Operations |
Atlassian | Collaboration & Productivity |
- Log in to SailPoint IdentityIQ.
- Click the gear icon at the top of the screen and select Global Settings.
- On the Global Settings page, click Import from File.
- On the Import from File page under Import Objects, click Choose File and navigate to the edited XML file.
- Click Import.
What are the 3 types of provisioning? ›
3) In a traditional telecommunications environment, there are three separate types of provisioning: circuit provisioning, service provisioning, and switch provisioning.
What is batch request in SailPoint? ›Batch Requests enable you to generate specific types of access requests for more than one user at a time. The required data is gathered from a prepared comma-delimited file for each request type. The batch files require comma-delimited data that represents the individual requests.
How do I enable SSO in SailPoint? ›Configure SSO in SailPoint
After logging in successfully, Click the Global Settings option by clicking the gear symbol in the top right hand corner of the screen. Select the Login Configuration option in the Global Settings screen. Select the Enable SAML Based Single Sign-On (SSO) checkbox.
- I/O Connectors.
- IC Sockets.
- Mil-Spec.
- Modular Jacks & Plugs.
- Other Connectors, Pins and Terminals.
- Peripheral Connectors.
- USB-C (Apple Thunderbolt-3) Connection. ...
- HDMI V 1.2 and V 1.3 Connection. ...
- DisplayPort Connection. ...
- DVI Connector. ...
- Mini DVI Connector. ...
- VGA Connector.
The BeanShell language is based on Java and can use all Java classes that are available to IdentityIQ, including custom code.
What is lifecycle in SailPoint? ›Lifecycle Manager leverages the IdentityIQ Governance Platform to enhance compliance performance, improve security, and reduce risk. SailPoint uses a combination of roles, policy, and risk to provide a framework for evaluating all requests for changes to access against predefined business policies.
What are detected roles in SailPoint? ›Roles are detected when an Identity Refresh task runs with the Refresh assigned, detected roles and promote additional entitlements option is selected. In role detection, IdentityIQ compares the entitlement profiles of each role to the entitlements held by each Identity.