Posted in:

What is Sailpoint

In today’s world, securing your business information and solution is a challenging task. If the spammers get access to your corporate data, it will seriously impact your business. However, the developers have developed Sailpoint cloud, a cutting-edge platform that combines machine learning and AI to minimize this situation. The company can use it effectively to avoid unwanted user access and reduce the risk of crucial data leakage. This blog unveils the idea of what is Sailpoint and will explore the key concepts of SailPoint.

Sailpoint introduction:

Sailpoint is an automatic version of identity management that reduces the expense and difficulty of identity management for users while allowing access. It is also referred to as an identity management solution because it gives more functions than identity management. Sailpoint provides IdentityIQ, and it is also known as the IdentityIQ war–file. Various program modules are included in this war file.

In today’s market, data-driven context is a challenging task requiring much more from identity and Access Management (IAM) technologies than ever before. In the area of IAM, Sailpoint is considered a market leader. The businesses are now placed IAM at the front for their security and IT policy by using IdentityIQ and Open Identity platform, which allows them to view and rule access through the business, including on-premises and cloud system applications. 

Nowadays, Sailpoint is holding its credibility as a pioneer as it offers security, compliance, and productivity from adequate identity controls. Sailpoint IdentityIQ is a progressive identity management system that cuts the expenses and worries of complying with regulations while supplying users with access. 

On the other hand, IdentityIQ provides a unique solution that depends on a shared identity governance system. It helps access related practices systematically implemented through business, security policy, risk, and rules models.  Learn More about here: Sailpoint online training

Sailpoint IdentityIQ:

In the market, there are various solutions available that include an IDM solution for business applications. So, what’s new about Sailpoint IdentityIQ? The key to this method is providing a solution. The present IDM solutions are IT-centric, and their impacts largely depend on the IT helpdesk and technical team. 

Sailpoint need to transfer as many identities and accessing procedures as possible from the IT technical team to end-users to reduce the technical team dependence. Ultimately we may claim that this software is more business-oriented rather than IDM products are more oriented. The current IDM products have various interfaces with different meanings, and it has a single – user interface.

Sailpoint IdentityIQ is a single method that blends the enforcement and provisioning capabilities. This IDM product will handle all the aspects of identity and access management, including “access certification,” “account provisioning,” “user life – cycle management, and “policy enforcement.”

Components of Sailpoint IdentityIQ:

It is made up of four components: 

1. Compliance Manager:

Sailpoint IdentityIQ Compliance Manager blends identity procedures such as Access Certification and policy Enforcement, automatic standard auditing, maintenance practices, and monitoring. 

The Compliance Manager comes in the priority for most crucial compliance work and imposes restrictions on the users, equipment, and allowed rights that have considerable risk.

  • During acquisition and merger, it ensures compliance and better handles risks.
  • It maintains and prevents unauthorized access and policy breaches in real-time.

2. Governance Platform

The IdentityIQ Governance structures from Sailpoint combine identity data, model ranks, gather corporate policies, and constructively manage user and resource risk factors. This advanced functioning helps the companies enforce the protective and detective controls for necessary identity business processes like access requests, provisioning, lifecycle management, and access certifications.

We are using these Governance platforms to:

  • Analyze the risk of each user, program, and device resource within the ecosystem to prioritize enforcement and protection efforts.
  • Centralize technical identification information from multiple sources and modified into rich, business-relevant data.
  • Role-based access can be developed, approved, and implemented through a range of business applications.

3. Lifecycle Manager

From the primary, user–friendly interface, Sailpoint IdentityIQ lifecycle manager allows business users to ask about entry and passwords. IdentityIQ lifecycle manager ensures that users have the most reliable access rules for job roles by applying policies on all customer lifecycle processes. 

IdentityIQ lifecycle manager combines traditional channels such as business directories and HR applications to ease the changes to user access that arise from a variety of identity lifecycle activities (i.e., new hiring, moves, terminations, and transfers). 

We are using this Lifecycle manager to:

  • Provided automatic identity lifecycle activities that will help you to get fast control.
  • Allows the business users to change and restore passwords daily.
  • Offload IT and support desk activities to manage IT tasks.
  • Enable the business user to request and handle access on their own
  • It would help if you centralized the process of demanding and modifying the entry

4. User Provisioning

The Sailpoint IdentityIQ Provisioning broker performs as a medium between enforcement and customer lifecycle processes that allow for the constant user interfaces and methods at the business tier different from technological change processes. The provisioning broker sends the access update requests to automatic provisioning systems, like IdentityIQ provisioning Engine or third-party provisioning systems. It may also use a manual change control procedure to check the growth of any changes required by the company by generating help desk tickets or manual work products. 

This smooth orchestration of improvements through an access management system unifies policy compliance, auditing, work management, allowing the companies the freedom to change user access in a manner that is feasible for them.

We are using this User Provisioning to:

  • Provide the audit report with provisioning changes
  • Accelerate the pace at which allows the modification to our controlled services are enforced
  • Increase the enforcement by enacting changes in line with the present policies.

Sailpoint IdentityIQ Certification phases:

These certification processes allow the testers, certifiers, administrators to check and correct the user access with different tools like applications, profiles, functions, entitlements, etc. This Certification in IdentityIQ is divided into groups, and it is based on the form of resources:

  • Advanced Certification
  • Identity Certification
  • Role Certification
  • Entitlement Owner Certification
  • Event-based Certification
  • Application owner certification
  • Account group certifications
  • Manager certifications

However, these certifications are graded on their functionality, and all the categories mentioned above of certificates are going through the same processes during their lifecycle. Many of them are optional while others are compulsory. Here are six phases:

1. Generation Phase:

Configuring certification criteria on the normal, notifications, behavior, lifestyle, and advanced pages of UI is part of this phase. The blend of these parameters values decides the certification phase. The parameters are notification seen, certification owner and frequency, and other related parameters mentioned during this process.

2. Active Phase: 

  • The period of the active phase is mentioned on the Lifecycle page.
  • The certifiers are expected to make their decision while the Active process approves or revokes.
  • If there are any reassignments and delegations are required, they must complete within this phase. 

3. Challenge Phase:

  • After the Active phase ends, it begins the Challenge phase.
  • It is only allowed if the “Enable Challenge Period” option is selected on the Lifecycle page.
  • The user whose access is affected by a reviewer can appeal for the decision during the Challenge phase. 

4. Sign Off Phase:

  • After the Challenge phase ends, it begins the Sign off stage.
  • The reviewers are not allowed to make changes to Access reviews after selecting the Sign off button.

5. Revocation or Remediation Phase:

  • Mainly, remediation allows writing emails or generating work items for resource owners to take action.
  • By using the provisioning process, remediation activities (such as cancellation of access rights) are done on the source application during this process.
  • When a revocation period is allowed, IdentityIQ maintains a record of the status remediation request; when it is not, remediation requests are sent for processing but are not checked.

6. End Phase:

  • When all phases configured for the access review have reached expiration dates, or all the activities needed for the procedure have been completed, the Access review enters its End Phase.
  • By selecting the End Phase if Certification does not have a challenge or revocation period enabled.
  • End Phase starts when the remediation requests have been completed or when the revocation period ends and the revocation period is activated.

Types of Sailpoint Certification:

There are two types of Sailpoint IdentityIQ certification are available.

  • Time Period of Execution
  • Functionality

1. Time of Period Execution:

Certifications may run continuously or on an ongoing basis. The periodic Certification focuses on the frequency on which the complete credential must perform, while continuous certifications concentrate on the frequency of which particular products must be accredited.

The Certification may also be set up to conduct in response to events that occur during the life cycle of an identity. 

  • Periodic Certification:

The hourly, weekly, quarterly, daily, and annual certifications are set to run continuously. These analyses include the image of identities, roles, and account groups regularly. The Periodic certifications are concerned with the multiple times (identities, position, and account groups) that must be accredited.

  • Continuous Certification:

Continuous Certifications are concerned with the frequency for particular objects (roles, violations, and entitlements) within the identification category certification must be accredited rather than the frequency with which the whole credential must conduct. The Sign off method is not used in continuous certifications.

2. Functionality:

  • Role Certification:

Ensure that the rank for which a role owner is responsible is essential roles and entitlements and allocated to the true identities.

  • Application Owner Certifications:

It assures all the identities using an application for that application owner are responsible and have all the necessary permissions.

  • Advanced Certification:

It ensures all the identities in the populations are linked with the advanced Certification that has all the necessary responsibilities and entitlements.

  • Event-based Certifications:

Certify entitlement information for the identities selected primarily based totally on IdentityIQ events.

  • Manager Certification:

Ensure that the candid reviews have the privileges they want to do their jobs and simply the privileges they want to do their jobs.

  • Account group Certification:

Ensure the account groups for which an account consumer is liable to have the specified approvals and membership. The owner of the software on which they live certifies account organizations that don’t have owners assigned.


Identity governance has always placed utmost importance on ensuring safe and compliant user access. However, an identity inspires many companies more than ever before due to the added intelligence of AI and machine learning. Predictive Identity from Sailpoint permits people to do their first-class work. Sailpoint Identification handles the emotional safety and enforcement problems, from provisioning customers on Day 1 to automating the help desk requests, so your people can function freely even as your programs are stable.

Author Bio:

I’m Sudheer Kuragayala, an enthusiastic Digital Marketer and content writer working at I wrote articles on trending IT-related topics such as  Artificial intelligence, Cloud Technologies, Business Tools, and Softwares. You can reach me on Linkedin: Sudheer Kuragayala