{"id":414,"date":"2017-08-10T22:23:04","date_gmt":"2017-08-10T17:53:04","guid":{"rendered":"http:\/\/www.enhisecure.com\/isecureblog\/?p=414"},"modified":"2019-05-21T13:56:38","modified_gmt":"2019-05-21T09:26:38","slug":"sailpoint-identityiq-pass-through-authentication-via-active-directory","status":"publish","type":"post","link":"https:\/\/www.enhisecure.com\/isecureblog\/2017\/08\/10\/sailpoint-identityiq-pass-through-authentication-via-active-directory\/","title":{"rendered":"Sailpoint IdentityIQ Pass through Authentication via Active Directory"},"content":{"rendered":"<p style=\"text-align: justify;\">When working with the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cloud_computing\">Cloud<\/a>, organizations of any scale wish to have common credentials across on-premise applications and the cloud applications. It\u2019s the best user experience as well as the best IT management experience. The overhead of facilitating this can be quite a large endeavor.<\/p>\n<p><a href=\"https:\/\/www.sailpoint.com\">Sailpoint\u2019s <\/a>IIQ provides Pass-through authentication using which a Login into <a href=\"https:\/\/www.sailpoint.com\/identity-management-software-identityiq\/\">IdentityIQ<\/a>\u00a0can be done via an enterprise directory credentials or via SSO credentials.<\/p>\n<p>With pass-through authentication in <a href=\"https:\/\/www.sailpoint.com\/\">Sailpoint <\/a><a href=\"https:\/\/www.sailpoint.com\/identity-management-software-identityiq\/\">IdentityIQ<\/a>, password validation takes place through Application Configured in <a href=\"https:\/\/www.sailpoint.com\/identity-management-software-identityiq\/\">IdenitytIQ<\/a>. What this means is a simple, but effective SSO solution for the end user. The below presentation gives a quick overview of concepts of Pass Through Authentication and how it is implemented in\u00a0<a href=\"https:\/\/www.sailpoint.com\/\">Sailpoint <\/a><a href=\"https:\/\/www.sailpoint.com\/identity-management-software-identityiq\/\">IdentityIQ.<\/a><\/p>\n<p>The presentation\u00a0is followed by different use cases demonstrated.<\/p>\n<p>&nbsp;<\/p>\n<p><iframe loading=\"lazy\" title=\"Sailpoint IdentityIQ Pass through Authentication via Active Directory\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/ZSgBR2CnMTA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p><iframe loading=\"lazy\" title=\"Sailpoint IIQ Passthro Authentication via Active Directory: Requesting Application Account on AD\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/WL7muSE7fGo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<p><iframe loading=\"lazy\" title=\"Sailpoint Identity IQ Passthrough Authentication Use Case: Account Aggregation from AD\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/3AlHDdwqYwg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<p><iframe loading=\"lazy\" title=\"Sailpoint Identity IQ Passthrough Authentication via Active Directory: BirthRight provision to AD\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/z1gv2ptDdDE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When working with the Cloud, organizations of any scale wish to have common credentials across on-premise applications and the cloud applications. It\u2019s the best user experience as well as the best IT management experience. The overhead of facilitating this can be quite a large endeavor. Sailpoint\u2019s IIQ provides Pass-through authentication using which a Login into [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,14,16],"tags":[40,45,10,29,11],"class_list":["post-414","post","type-post","status-publish","format-standard","hentry","category-identity-governance","category-sailpoint","category-technology","tag-active-directory","tag-authentication","tag-identity-iq","tag-iiq","tag-sailpoint"],"_links":{"self":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/comments?post=414"}],"version-history":[{"count":3,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/414\/revisions"}],"predecessor-version":[{"id":416,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/414\/revisions\/416"}],"wp:attachment":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/media?parent=414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/categories?post=414"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/tags?post=414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}