• Home

EnH iSecure Blog

Tag: Policies

In the world of business, these are called Toxic Combinations.

Any combination of accesses that lead to a potential security risk/breach is called Toxic combinations.

Identity Governance products implement policies which can detect and eradicate/proactively avoid such conflicts.

Rules in Identity IQ

Posted on August 12, 2016August 17, 2016 by Sandilya Krovvidi in Identity Governance, Sailpoint

The rules in Sailpoint’s Identity IQ are plugin points to customize the default behaviour. In this video, we spoke about various rules that are present in Identity IQ.

 

The video is extensive and it covers almost all the rules, it is suggested that we skim through the video. For convinience , an index is provided in the current blogpost after the video

 

The video comprises of various rules related to :

  1. Applications configuration – 6 rules
  2. Delimited file or similar kind of applications – 7 rules
  3. Activity configuration –  2 rules
  4. Provisioning –  1rule
  5. Composite application – 2 rules
  6. Certification – 9 rules
  7. Roles – 2 rules
  8. Identity mapping – 2 rules
  9. Workflows – 7 rules
  10.  Scopes – 2 rules
  11. Work Items –  3 rules
  12. Tasks – 2 rules
  13. Groups – 1 rule
  14. Forms – 6 rules
  15. Policies – 2 rules
  16. Account mappings – 2 rules

 

 

Tagged Account mappings, Application configuration rules, Forms, Identity IQ, Identity mapping, IIQ, Policies, Roles, Rules, SailPoint, Tasks Leave a comment

Categories

  • BYO
  • Cyber Security
  • CyberArk
  • Frauds
  • Identity Governance
  • implementation-problems
  • Okta
  • Oracle
  • PlainID
  • Sailpoint
  • Social Engineering
  • Technology
  • Uncategorized

Tags

#IdentityNow Access Management Active Directory Application configuration rules Architecture Authentication Best Practices Cloud Connector CyberArk EBusiness Suite ENH iSecure ERP IAM Identity Identity and access management Identity Governance Identity IQ IdentityIQ Identity Management Identity mapping IdentityNow Identity Security Identity Security Cloud IdentitySecurityCloud IIQ IntegrationConfig Integrations MFA Okta PAM Pass Through Authentication Provisioning Refresh Identity Cube Rest APIs Roles Rules SailPoint Sailpoint IdentityIQ SAP SAP ERP Service Now SS0 SSO Workflows

Follow Us on Twitter

Tweets by @EnHcorp

Recent Posts

  • Streamlining Access to Multiple Zoho Applications with Okta SSO Integration
  • SailPoint IdentityIQ Prod Architectures
  • Password Management for Okta Administrators using CyberArk PVWA 
  • Integrating SailPoint IIQ with Okta
  • Okta Custom Login URL and Branding 

Copyrights © 2016. All rights Reserved to ENH.