IdentityNow Essentials 1: Setup & Modeling

Course Overview

The IdentityNow Essentials eLearning course series is foundational for acquiring the necessary skills to implement & administer IdentityNow.

Prerequisites

  •  IdentityNow Introduction
  •  General understanding of identity access management & governance concepts
  •  Knowledge of cloud-based solutions, source systems such as Microsoft Active Directory, or databases.

Audience Profile

This course is intended for:

  •  Administrators responsible for a production system
  •  Implementers & developers responsible for configuring & implementing IdentityNow

Learning Objectives:

Upon completion of this course, professionals will be able to:

  • Establish Tenant connectivity & security by configuring & maintaining:
  • Virtual Appliance (VA) status
  •  User & corporate security settings
  •  Authentication methods
  •  Build an Identity foundation by establishing & maintaining:
  •  Connections to authoritative sources
  •  Identity profiles
  •  Identity attribute mappings
  •  Authentication methods
  •  Invitations
  •  User account aggregation & correlation
  •  User entitlements
  •  Procedures for review of
  •  Uncorrelated accounts
  •  Aggregation job monitoring
  •  Correlation monitoring
  •  Identity exceptions monitoring
  •  Define an Access Model by:
  •  Configuring access profiles
  •  Configuring roles
  •  Defining lifecycle states
  •  Managing entitlement metadata

Content Outline

  •  IdentityNow Overview
  •  Tenant Configuration
  •  Identity Model
  •  Extending Identity Model
  •  Access Model

FAQs

IdentityNow simplifies identity governance. From day one, it allows you to automate & control user provisioning, access requests, separation-of-duties policies, access certification for auditors, password management & access to sensitive files.

IdentityNow was created to be a simple yet powerful IDaaS solution that requires little software or hardware to set up. IdentityIQ is best suited for businesses that need to customize and index requests in "role" and "entitlement"-based configurations.

SailPoint IIQ maintains a hierarchical role model consisting of Business Roles, IT Roles, & Entitlements: Business Roles identify affiliations or job functions by which users can be grouped. IT Roles encapsulate sets of system entitlements.

 Ans- Yes, Radiant will provide you most updated high, value-relevant real-time projects & case studies in each training program.

 Ans- Technical issues are unpredictable & might occur with us as well. Participants must ensure access to the required configuration with good internet speed.

Ans- Radiant Techlearning offers training programs on weekdays, weekends & combination of weekdays & weekends. We provide you with complete liberty to choose the schedule that suits your need.

A: Radiant has highly intensive selection criteria for Technology Trainers & Consultants who deliver training programs. Our trainers & consultants undergo rigorous technical & behavioral interview & assessment processes before they are boarded in the company.

Our Technology experts/trainers & consultants carry deep-dive Knowledge in the technical subject & are certified by the OEM.

Our training programs are practically oriented with 70% – 80% hands-on training technology tools. Our training program focuses on one-on-one interaction with each participant, the latest content in the curriculum, real-time projects & case studies during the training program.

Our faculty will provide you with the Knowledge of each course from the fundamental level in an easy way & you are free to ask your doubts any time from your respective faculty.

Our trainers have patience & ability to explain complex concepts simplistically with depth & width of Knowledge.

We provide a support session to ensure quality learning even after the training program.

Send a Message.


  • Enroll