{"id":672,"date":"2018-10-07T21:47:01","date_gmt":"2018-10-07T17:17:01","guid":{"rendered":"http:\/\/www.enhisecure.com\/isecureblog\/?p=672"},"modified":"2019-05-21T12:30:37","modified_gmt":"2019-05-21T08:00:37","slug":"integrating-cyberark-with-sailpoint-using-scim","status":"publish","type":"post","link":"https:\/\/www.enhisecure.com\/isecureblog\/2018\/10\/07\/integrating-cyberark-with-sailpoint-using-scim\/","title":{"rendered":"Integrating CyberArk with SailPoint using SCIM"},"content":{"rendered":"<p><a href=\"https:\/\/www.cyberark.com\/blog\/7-types-privileged-accounts-know\/\">Privileged accounts<\/a> are considered to be &#8220;keys to the kingdom&#8221; in any <a href=\"https:\/\/en.wikipedia.org\/wiki\/IT_infrastructure\">IT Infrastructure<\/a>. Almost every <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cyberattack\">cyber attack<\/a> that has ever happened involved compromises at <a href=\"https:\/\/www.cyberark.com\/blog\/7-types-privileged-accounts-know\/\">the privileged account level<\/a>. <a href=\"https:\/\/ipfs.io\/ipfs\/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco\/wiki\/Privileged_identity_management.html\">PAM<\/a> Solutions usually help in managing such accounts, keys or files that would lead to escalated access.<\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/\">CyberArk<\/a> is the global leader in <a href=\"https:\/\/ipfs.io\/ipfs\/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco\/wiki\/Privileged_identity_management.html\">PAM solutions<\/a> with a holistic approach towards <a href=\"https:\/\/ipfs.io\/ipfs\/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco\/wiki\/Privileged_identity_management.html\">privileged account managemen<\/a>t. It covers not only traditional <a href=\"https:\/\/ipfs.io\/ipfs\/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco\/wiki\/Privileged_identity_management.html\">PAM<\/a> problems but also extends its capabilities with various features like managing hard-coded application credentials, analytics, on-demand privileges escalation and managing end-user devices like desktops.<\/p>\n<p>Securing and streamlining <a href=\"https:\/\/en.wikipedia.org\/wiki\/Identity_management\">identity and privileges data<\/a>\u00a0present with such solutions is of very high importance.<\/p>\n<p>In the following presentation, we provide a detailed overview of <a href=\"https:\/\/www.cyberark.com\/\">CyberArk<\/a> integration with <a href=\"https:\/\/www.sailpoint.com\/\">SailPoint<\/a> by integrating <a href=\"https:\/\/www.cyberark.com\/\">Cyberark<\/a> as a <a href=\"https:\/\/www.sailpoint.com\/\">SailPoint&#8217;s<\/a> application.<\/p>\n<p><iframe loading=\"lazy\" title=\"ENH iSecure Integrating CyberArk as Application with Sailpoint IIQ using SCIM\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/_zrk1WljE-E?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>In the following video, we provide a detailed demo of this integration.<\/p>\n<p><iframe loading=\"lazy\" title=\"ENH iSecure Integrating CyberArk as Application with Sailpoint IIQ using SCIM Demo\" width=\"640\" height=\"480\" src=\"https:\/\/www.youtube.com\/embed\/wq7Mb9pdprk?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Privileged accounts are considered to be &#8220;keys to the kingdom&#8221; in any IT Infrastructure. Almost every cyber attack that has ever happened involved compromises at the privileged account level. PAM Solutions usually help in managing such accounts, keys or files that would lead to escalated access. CyberArk is the global leader in PAM solutions with [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18,8,14,16],"tags":[84,10,85,11],"class_list":["post-672","post","type-post","status-publish","format-standard","hentry","category-cyberark","category-identity-governance","category-sailpoint","category-technology","tag-cyberark","tag-identity-iq","tag-integrations","tag-sailpoint"],"_links":{"self":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/comments?post=672"}],"version-history":[{"count":8,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/672\/revisions"}],"predecessor-version":[{"id":680,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/672\/revisions\/680"}],"wp:attachment":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/media?parent=672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/categories?post=672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/tags?post=672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}