{"id":249,"date":"2017-02-27T18:44:11","date_gmt":"2017-02-27T14:14:11","guid":{"rendered":"http:\/\/www.enhisecure.com\/isecureblog\/?p=249"},"modified":"2019-05-21T14:04:19","modified_gmt":"2019-05-21T09:34:19","slug":"identityiq-parallel-and-serial-approvals","status":"publish","type":"post","link":"https:\/\/www.enhisecure.com\/isecureblog\/2017\/02\/27\/identityiq-parallel-and-serial-approvals\/","title":{"rendered":"IdentityIQ parallel and serial approvals"},"content":{"rendered":"<h3>\u00a0Introduction<\/h3>\n<p>Out of the box <a href=\"https:\/\/www.sailpoint.com\/\">Sailpoint&#8217;s <\/a><a href=\"https:\/\/www.sailpoint.com\/identity-management-software-identityiq\/\">IdentityIQ <\/a>provides numerous workflows for provisioning, we can implement our custom workflows according to the necessity. Similarly, parallel and serial approvals are workflows used in an enterprise to manage the access of the user.<\/p>\n<h3>Requirement<\/h3>\n<p>In the world of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Identity_management\">IAM<\/a>, one thing every developer should remember is that &#8220;<strong>Right thing must be accessed by the Right user at a Right time<\/strong>&#8220;, from the above sentence we can say that an access must be rightfully distributed to the user.<\/p>\n<p>In this requirement a user in an enterprise requested an entitlement or role using <a href=\"https:\/\/www.sailpoint.com\/identity-management-software-identityiq\/\">IdentityIQ <\/a>then that access must be approved by the work groups which are maintaining that privilege.<\/p>\n<h3><strong>Understanding parallel and serial approvals in IdentityIQ<\/strong><\/h3>\n<p>The following video illustrates\u00a0about parallel and serial approvals.<\/p>\n<p><iframe loading=\"lazy\" title=\"Sailpoint IIQ Parallel and Serial Approval Presentation\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/jUkSvM4KqLw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<h3><strong>Working demo of parallel and serial approvals<\/strong><\/h3>\n<p>The following video demonstrates how parallel and serial approvals accomplishes.<\/p>\n<p><iframe loading=\"lazy\" title=\"Sailpoint IIQ Parallel and Serial Approval Demo\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/1X1C6g_idVo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0Introduction Out of the box Sailpoint&#8217;s IdentityIQ provides numerous workflows for provisioning, we can implement our custom workflows according to the necessity. Similarly, parallel and serial approvals are workflows used in an enterprise to manage the access of the user. Requirement In the world of IAM, one thing every developer should remember is that &#8220;Right [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"aside","meta":{"footnotes":""},"categories":[8,14,16],"tags":[10,22,57,11,12],"class_list":["post-249","post","type-post","status-publish","format-aside","hentry","category-identity-governance","category-sailpoint","category-technology","tag-identity-iq","tag-identity-mapping","tag-parallel-and-serial-approvals","tag-sailpoint","tag-workflows","post_format-post-format-aside"],"_links":{"self":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/comments?post=249"}],"version-history":[{"count":12,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/249\/revisions"}],"predecessor-version":[{"id":320,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/249\/revisions\/320"}],"wp:attachment":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/media?parent=249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/categories?post=249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/tags?post=249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}