{"id":566,"date":"2018-04-20T11:47:19","date_gmt":"2018-04-20T07:17:19","guid":{"rendered":"http:\/\/www.enhisecure.com\/isecureblog\/?p=566"},"modified":"2019-05-21T12:38:47","modified_gmt":"2019-05-21T08:08:47","slug":"sailpoints-identityiq-integration-with-okta","status":"publish","type":"post","link":"https:\/\/www.enhisecure.com\/isecureblog\/2018\/04\/20\/sailpoints-identityiq-integration-with-okta\/","title":{"rendered":"SailPoint\u2019s IdentityIQ Integration with Okta"},"content":{"rendered":"<p>In the world of Identity Management, securing and monitoring the access for the external users like partners, contractors and customers who have access to organizational resources have always been a challenge for many organizations. To mitigate and help the organizations to secure their resources two big Identity management products partnered together in February 2018. <a href=\"https:\/\/www.okta.com\/\">Okta<\/a> and <a href=\"https:\/\/www.sailpoint.com\/\">SailPoint<\/a> announced a strategic <a href=\"https:\/\/www.sailpoint.com\/news\/sailpoint-okta-partner\/\">partnership<\/a> to provide an end-to-end identity for the enterprise \u2013 helping organizations balance providing simple, secure user access while meeting complex compliance and security requirements.<\/p>\n<h4>Benefits of the Combined Solutions<\/h4>\n<p>\u2022 Effectively manage user identities\u2019 authentication, application assignments, while\u00a0ensuring all governance and compliance requirements are met.<\/p>\n<p>\u2022 Authenticate user access with single sign-on and multi-factor authentication.<\/p>\n<p>\u2022 Ensure that for sensitive applications, only the right user has access,\u00a0authorization policies are enforced, and the process is documented, timestamped and compliant.<\/p>\n<p>\u2022 Automate provisioning throughout the user lifecycle by simplifying processes for\u00a0creating, modifying and revoking access.<\/p>\n<p>\u2022 Automate provisioning of applications adherent to corporate policies.<\/p>\n<p>\u2022 Trigger provisioning workflows from authoritative sources, such as Active Directory\u00a0or HR systems, to ensure consistency and increase efficiency.<\/p>\n<p>Below presentation demonstrates <a href=\"https:\/\/www.okta.com\/\">Okta<\/a>, <a href=\"https:\/\/www.sailpoint.com\/identity-management-software-identityiq\/\">IdentityIQ<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Single_sign-on\">SSO<\/a> Concepts, Importance of <a href=\"https:\/\/www.sailpoint.com\/\">SailPoint<\/a>\u2019s <a href=\"https:\/\/www.sailpoint.com\/identity-management-software-identityiq\/\">IdentityIQ<\/a> integration to achieve SSO. The presentation is followed by a demo.<\/p>\n<h4>Okta and SailPoint IIQ Integration<\/h4>\n<p><iframe loading=\"lazy\" title=\"ENH iSecure: Okta integration with Sailpoint&#039;s Identity IQ\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/3vmkyGzj8f0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<h4>Demo of SailPoint\u2019s IIQ and Okta Integration.<\/h4>\n<p><iframe loading=\"lazy\" title=\"ENH iSecure: Demo - Okta integration with Sailpoint&#039;s Identity IQ\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/h46zErf0Muw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the world of Identity Management, securing and monitoring the access for the external users like partners, contractors and customers who have access to organizational resources have always been a challenge for many organizations. To mitigate and help the organizations to secure their resources two big Identity management products partnered together in February 2018. Okta [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,91,14,16],"tags":[10,85,92,11],"class_list":["post-566","post","type-post","status-publish","format-standard","hentry","category-identity-governance","category-okta","category-sailpoint","category-technology","tag-identity-iq","tag-integrations","tag-okta","tag-sailpoint"],"_links":{"self":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/comments?post=566"}],"version-history":[{"count":6,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/566\/revisions"}],"predecessor-version":[{"id":573,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/566\/revisions\/573"}],"wp:attachment":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/media?parent=566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/categories?post=566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/tags?post=566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}