{"id":178,"date":"2016-08-12T16:01:59","date_gmt":"2016-08-12T11:31:59","guid":{"rendered":"http:\/\/www.enhisecure.com\/isecureblog\/?p=178"},"modified":"2016-08-17T12:53:10","modified_gmt":"2016-08-17T08:23:10","slug":"rules-in-identity-iq","status":"publish","type":"post","link":"https:\/\/www.enhisecure.com\/isecureblog\/2016\/08\/12\/rules-in-identity-iq\/","title":{"rendered":"Rules in Identity IQ"},"content":{"rendered":"<p>\nThe rules in <a href=\"https:\/\/www.sailpoint.com\/\">Sailpoint&#8217;s <\/a><a href=\"https:\/\/www.sailpoint.com\/products\/identityiq\/\">Identity IQ<\/a> are plugin points to customize the default behaviour. In this video, we spoke about various rules that are present in<a href=\"https:\/\/www.sailpoint.com\/products\/identityiq\/\"> Identity IQ.<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>The video is extensive and it covers almost all the rules, it is suggested that we skim through the video. For convinience , an index is provided in the current blogpost after the video<\/p>\n<p>&nbsp;<\/p>\n<p>The video comprises of various rules related to :<\/p>\n<ol>\n<li>Applications configuration \u2013 6 rules<\/li>\n<li>Delimited file or similar kind of applications \u2013 7 rules<\/li>\n<li>Activity configuration &#8211;\u00a0 2 rules<\/li>\n<li>Provisioning &#8211;\u00a0 1rule<\/li>\n<li>Composite application \u2013 2 rules<\/li>\n<li>Certification \u2013 9 rules<\/li>\n<li>Roles \u2013 2 rules<\/li>\n<li>Identity mapping \u2013 2 rules<\/li>\n<li>Workflows \u2013 7 rules<\/li>\n<li>\u00a0Scopes \u2013 2 rules<\/li>\n<li>Work Items &#8211;\u00a0 3 rules<\/li>\n<li>Tasks \u2013 2 rules<\/li>\n<li>Groups \u2013 1 rule<\/li>\n<li>Forms \u2013 6 rules<\/li>\n<li>Policies \u2013 2 rules<\/li>\n<li>Account mappings \u2013 2 rules<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><iframe loading=\"lazy\" title=\"Sailpoint IIQ&#039;s Rules\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/gkxcKaDyk0Y?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The rules in Sailpoint&#8217;s Identity IQ are plugin points to customize the default behaviour. In this video, we spoke about various rules that are present in Identity IQ. &nbsp; The video is extensive and it covers almost all the rules, it is suggested that we skim through the video. For convinience , an index is [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,14],"tags":[27,28,25,10,22,29,26,21,19,11,24],"class_list":["post-178","post","type-post","status-publish","format-standard","hentry","category-identity-governance","category-sailpoint","tag-account-mappings","tag-application-configuration-rules","tag-forms","tag-identity-iq","tag-identity-mapping","tag-iiq","tag-policies","tag-roles","tag-rules","tag-sailpoint","tag-tasks"],"_links":{"self":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/comments?post=178"}],"version-history":[{"count":4,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/178\/revisions"}],"predecessor-version":[{"id":180,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/178\/revisions\/180"}],"wp:attachment":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/media?parent=178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/categories?post=178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/tags?post=178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}