IdentityIQ Implementation & Administration: Essentials v8.0

Course Overview

Upon completing this course, students should be able to implement & configure common IdentityIQ use cases & support a standard implementation of IdentityIQ. Using Accelerator Pack, students learn best practices for onboarding & configuring application interactions, such as joiner/mover/leaver, & access requests. Students will also be able to explain, configure & administer the standard ongoing processes to load & maintain the IdentityIQ data, & use the tools available for monitoring & troubleshooting the system.

 

Prerequisites

 IdentityIQ Introduction course

  •  It is helpful for attendees with technical responsibilities to have a background in XML, Java, Application Servers & Databases

Audience Profile

This course is intended for:

  • Technical implementers 
  • System administrators
  • Business analysts

Learning Objectives:

Upon completion of this course, professionals will be able to:

  •  Configure & administer IdentityIQ to support compliance & provisioning activity
  •  Create application definitions that enable IdentityIQ to communicate (aggregate & provision) with corporate systems
  •  Configure application business behaviors for provisioning activities (for example, joiner/mover/leaver, approvers, & more)
  •  Configure connectors (for example, delimited file, JDBC, LDAP, Active Directory)
  •  Construct identity & account schemas that include custom attributes specific to the organization
  •  Define parameters for classification of accounts & entitlements (locked, disabled, privileged, birthright) during aggregation 
  •  Create identities in IdentityIQ
  •  Load account & entitlement data into IdentityIQ & correlate accounts to the appropriate account owner
  •  Monitor the status of aggregation & provisioning actions
  •  Organize personnel within IdentityIQ based on their IdentityIQ responsibilities & access needs
  •  Evaluate data quality using IdentityIQ reporting & searching functionality
  •  Explain the process for using IdentityIQ to support corporate electronic access policies
  •  Explain the process for supporting IdentityIQ certification campaigns 
  •  Explain the st&ard IdentityIQ two-tier role model 
  •  Explain the difference between birthright & business roles
  •  Configure, run, & monitor Lifecycle Events, including how to specify triggers, & designate provisioning actions for each event
  •  Configure & monitor access requests – specify which access items are requestable & the appropriate approval processes
  •  Explain the relationship between Quicklink Populations & Quicklinks
  •  Explain how IdentityIQ supports requests for password reset
  •  Identify & utilize tools available for onboarding, troubleshooting, & working with SailPoint Support (Administrator Console, Advanced Analytics, IdentityIQ Console, Debug pages)

Content Outline

  •  Course Introduction 
  •  IdentityIQ Technical Overview 
  •  IdentityIQ Functional Elements 
  •  IdentityIQ Implementation Overview 
  •  Product Architecture 
  •  Deployment 
  •  IdentityIQ Installation 
  •  Creating Identity Cubes 
  •  Identity Attributes & Tasks 
  •  Authentication & User Rights 
  •  Organizing Identities 
  •  Onboarding Applications 
  •  IdentityIQ Connectors
  •  Data Maintenance 
  •  Introduction to Policies 
  •  Introduction to Certifications
  •  Task Management 
  •  Troubleshooting 
  •  Logging 
  •  Provisioning Overview 
  •  Monitoring Provisioning 
  •  Introduction to Roles 
  •  Lifecycle Manager Quicklinks 
  •  Manage User Access 
  •  Manage User Access Configuration 
  •  Additional Access Request Options
  •  Additional Lifecycle Manager Quicklinks 
  •  User-Driven Changes 
  •  Lifecycle Events 
  •  Automated Provisioning 

FAQs

IdentityNow was created to be a simple yet powerful IDaaS solution that requires little software or hardware to set up. IdentityIQ is best suited for businesses that need to customize and index requests in "role" and "entitlement"-based configurations.

 

A: This course is intended for:

  • Technical implementers 
  • System administrators
  •  Business analysts

SailPoint IdentityIQ is an identity & access management solution for enterprise customers that delivers various IAM processes, including automated access certifications, policy management, access request & provisioning, password management, & identity intelligence.

A: Upon successfully completing this course, students should be able to implement & configure common IdentityIQ use cases & support a standard implementation of IdentityIQ. Using Accelerator Pack, students learn best practices for onboarding & configuring application interactions, such as joiner/mover/leaver, & access requests

 

A: We recommend you attend the live session to practice & clarify the doubts instantly & get more value from your investment. However, if, due to some contingency if you have to skip the class, Radiant Tech learning will help you with the recorded session of 


 

That particular day. However, those recorded sessions are not meant only for personal consumption & NOT for distribution or commercial use.

 

A: Radiant Tech learning has a data center containing the Virtual Training environment for participant h&-on-practice. Participants can easily access these labs over Cloud with the help of a remote desktop connection. Radiant virtual labs allow you to learn from anywhere in the world & in any time zone. 

 

A: The learners will be enthralled as we engage them the real-world & Oriented industry projects during the training program. These projects will improve your skills & knowledge, & you will gain a better experience. These real-time projects will help you a lot in your future tasks & assignments.

 

A: You can request a refund if you do not wish to enroll in the course.

 

A: Yes, you can.

 

Send a Message.


  • Enroll