{"id":734,"date":"2019-04-01T15:01:06","date_gmt":"2019-04-01T10:31:06","guid":{"rendered":"http:\/\/www.enhisecure.com\/isecureblog\/?p=734"},"modified":"2019-05-21T12:21:26","modified_gmt":"2019-05-21T07:51:26","slug":"rule-library-in-sailpoint-identityiq","status":"publish","type":"post","link":"https:\/\/www.enhisecure.com\/isecureblog\/2019\/04\/01\/rule-library-in-sailpoint-identityiq\/","title":{"rendered":"Rule Library in SailPoint IdentityIQ"},"content":{"rendered":"\n<p>Rule is an XML object with fully programmable java-based implementation hooks (<a href=\"https:\/\/en.wikipedia.org\/wiki\/BeanShell\">Bean Shell<\/a>). Rules can capture pieces of business-logic.<a href=\"https:\/\/www.sailpoint.com\/\">SailPoint<\/a> <a href=\"https:\/\/www.sailpoint.com\/products\/identityiq\/\">IdentityIQ<\/a> is very much Rule-Driven, and thus very flexible.<\/p>\n\n\n\n<p>Rules can reference other Rules! Helpful with creating Rule Libraries.<\/p>\n\n\n\n<p>Rule Libraries are collections of methods that have been grouped together and stored in <a href=\"https:\/\/www.sailpoint.com\/products\/identityiq\/\">IdentityIQ<\/a> as a Rule object. They contain a set of related but unconnected methods that can be invoked directly by workflow steps or other rules.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>In this presentation, we will be discussing on complete rule library importance, creation of rule library and also referencing the created library in other rules, implementation in validation scripts and finally different types of referencing. <\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"ENH iSecure Sailpoint IdentityIQ Rule Libraries Presentation\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/smNC-ajQ5Zk?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><figcaption>Rule Library &#8211; SailPoint IdentityIQ<br \/><\/figcaption><\/figure>\n\n\n\n<p>In the following demo, we will cover the creation of rule library and referencing the created library in other required rules with expected results.<\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"ENH iSecure Sailpoint IdentityIQ Rule Libraries Demo\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/qHYc6NrlcI4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><figcaption>Demo &#8211; Rule Library<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Rule is an XML object with fully programmable java-based implementation hooks (Bean Shell). Rules can capture pieces of business-logic.SailPoint IdentityIQ is very much Rule-Driven, and thus very flexible. Rules can reference other Rules! Helpful with creating Rule Libraries. Rule Libraries are collections of methods that have been grouped together and stored in IdentityIQ as a [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,14,16],"tags":[79,10,11],"class_list":["post-734","post","type-post","status-publish","format-standard","hentry","category-identity-governance","category-sailpoint","category-technology","tag-best-practices","tag-identity-iq","tag-sailpoint"],"_links":{"self":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/comments?post=734"}],"version-history":[{"count":4,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/734\/revisions"}],"predecessor-version":[{"id":754,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/734\/revisions\/754"}],"wp:attachment":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/media?parent=734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/categories?post=734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/tags?post=734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}