Saturday, 4 March 2017

Overview of SailPoint IdentityIQ

SailPoint Identity IQ ( Identity Management )

Today there are many  products available  in the market providing IDM solution to enterprise applications.Then what is new about the Sailpoint Identity IQ?
The answer lies in its approach to provide the solution.
Existing IDM products are IT focused and their efficiency mostly depends upon the IT helpdesk and the IT technical team.Sailpoint aims at shifting more and more Identity & access processes from the IT technical team to the end users so that the dependency is as less as possible on the technical team. So we can say this product is more of Business focused as compared to other IDM products which are IT focused.It has a single use interface as compared to the existing IDM products having multiple interfaces with multiple contexts.
SAILPOINT IdentityIQ  integrates ‘provisioning and compliance features’ into a single solution.Thus this IDM product is able to address all the needs related to Identity and Access management such as ‘access certifications’ , ‘policy enforcement’,’account provisioning’ and ‘user life-cycle management’.
SAILPOINT IDENTITY IQ consists of 4 major components:
  1. Compliance Manager
  2. Lifecycle Manager
  3. Governance Platform
  4. User Provisioning
 COMPLIANCE MANAGER:
SailPoint IdentityIQ Compliance Manager automates the common auditing, reporting and management activities and integrates identity processes such as Access certification* and Policy enforcement*
Compliance Manager helps to prioritize the most critical compliance activities and focuses controls on the users, resources and access privileges that represent the greatest potential risk.
It proactively detects and prevent inappropriate access and violations of corporate policies
It ensures compliance and better manage risk during mergers and acquisitions
*Access Certifications: The periodic review of user access privileges in order to validate that access privileges align with a user’s job function and conform to policy guidelines. Access certifications are commonly used as an internal control to ensure compliance with regulations.
*Policy Enforcement: The set of preventive and detective controls that automatically ensure that defined policy is followed by the organization.
LIFE CYCLE MANAGER:
SailPoint IdentityIQ Lifecycle Manager allows business users to easily request access and reset passwords themselves from a centralized, business-friendly interface. By applying policy to all user lifecycle processes, IdentityIQ Lifecycle Manager ensures users acquire only the most appropriate levels of access for their job function.
IdentityIQ Lifecycle Manager automates change to user access, resulting from a range of identity lifecycle events (i.e., new hires, transfers, moves or terminations) through integration with authoritative sources, such as HR systems and corporate directories. When a lifecycle event is detected, Lifecycle Manager triggers the required changes by initiating the appropriate business process, including policy checking and approvals.
With Lifecycle Manager, we can:
• Empower business users to independently request and manage access
• Enable business users to proactively change and reset passwords
• Speed delivery of access using automated identity lifecycle events (i.e., hires, transfers, and terminations)
• Centralize access request and change processes
• Streamline IT operations and offload IT and help desk
Self-service access request: Centralized access request management allows managers and end users to conveniently request new access or make changes to existing access privileges within the constraints of your pre-defined identity policy and role models. It also provides an efficient, more accurate way to view existing access and remove access as needed, as well as to create and edit identities.
*Self-Service: The process of allowing users to request access to resources using a self-service interface, which uses workflow to route the request to the appropriate manager(s) for approval.
*Password management: Automation of the process for controlling setting, resetting and synchronizing passwords across systems.
Using the same business-friendly user interface, users and/or their approved delegates can change or reset passwords across target systems. Allowing end-users to proactively manage password changes can significantly reduce help desk calls. Most importantly, centralized password management will enables us to consistently enforce strong password policies, customized for each application.
*Event-based lifecycle management: To further streamline user on-boarding, off-boarding, and other job changes within the enterprise, we can add event-based lifecycle management to automatically trigger access changes based on HR or other authoritative feeds.
GOVERNANCE PLATFORM:
The SailPoint IdentityIQ Governance Platform centralizes identity data, captures business policy, models roles and proactively manages user and resource risk factors. Together, these integrated capabilities allow organizations to build preventive and detective controls that support critical identity business processes, including access certifications, access requests, lifecycle management and provisioning.
With the Governance Platform, we can:
• Centralize technical identity data across resources and transform it into rich, business relevant information
• Create, enforce and verify role-based access across diverse enterprise applications
• Prioritize compliance and security efforts by assessing the risk of each person, application and system resource across the environment
• Define and leverage enterprise access policies for detective and preventive control
USER PROVISIONING:
SailPoint IdentityIQ Provisioning Broker acts as a bridge between compliance and user lifecycle processes, allowing consistent user interfaces and processes at the business layer that are separate from technical processes for implementing change. Provisioning Broker sends access change requests to automated provisioning systems, including IdentityIQ Provisioning Engine or third-party provisioning systems; and can also leverage manual change management processes by creating help desk tickets or manual work items to track progress of all changes requested by the business. This seamless orchestration of changes across access delivery mechanisms unifies policy enforcement, process monitoring and auditing, and gives organizations the flexibility to provision changes to user access in any way they choose.
With User Provisioning, we can:
• Speed the provisioning of access changes to our managed resources
• Improve compliance by implementing changes according to defined policy
• Generate documentation of provisioning changes for auditors
 *Provisioning: The process of granting, changing, or removing user access to systems, applications and databases based on a unique user identity.
Concept of Identity Cubes and Identity Attributes
  • SailPoint IdentityIQ represents users by Identity Cubes.
  • Identity Cubes are a correlated collection of accounts and entitlements that represent a single user in the real world.
  • Identity Cubes are multi-dimensional data models of identity information that offer a single, logical   representation of each managed user.
  • Each Cube contains information about user entitlements, user activity, and associated business context.
  • “Cubes” are built through a discovery process from authoritative sources i.e. by bringing in user account data from Authoritative Applications and are refreshed dynamically or by running a Identity Refresh Task
  • Identity Attributes are used to describe Identity Cubes and hence describe the real-world user.
  • Identity Attributes are created by directly mapping a list of attributes from various sources or derived through rules or mappings.
  • Example of Identity attributes are Name,Email,department etc
 User Discovery
  • A multi-step process by which Identity Cubes are created and updated with account and attribute data from multiple backend systems.
  • One or more “authoritative sources” (HR, Corporate Directory) supply the population of unique identities and start the creation of Identity Cubes.
Connector
  •  An IdentityIQ component which communicates with various targeted platforms, applications and systems to import application and account data. A connector is defined as part of an application. (Example: Delimited File Connector, JDBC, Active Directory, etc.)
  • SailPoint supports many of the industry standard databases as an Authoritative Resources. Few examples of Supported Connectors: Active Directory, DB2, Delimited File, IBM Tivoli Directory Server, IBM Tivoli Identity Manager, JDBC, LDAP, LDIF, Linux, Lotus Notes, Mainframe, MS SQL Server, MS SharePoint, Oracle DB, Oracle Apps, PeopleSoft, RACF,SAP, SAP HR, SAP Portal, Sales force, Solaris, Sun IDM, Sybase and many more.
 Account Aggregation
  • The process by which IdentityIQ creates and updates Identity Cubes with account, attribute and entitlement data accessed through configured Applications.
  • Account Aggregation is very similar to reconciliation within an identity management solution. Tasks are utilized to perform account aggregation.
  • Account Aggregation is achieved through defining and running reusable Account Aggregation tasks.

Provisioning

User provisioning and Account provisioning are same terms and are interchangeably used.
Provisioning can be thought of as
1. The process of granting, changing, or removing user access to systems, applications and databases based on a unique user identity by creation of user accounts on target systems.
2. The process of providing customers or clients with accounts, the appropriate access to those accounts, all the rights associated with those accounts, and all of the resources necessary to manage the accounts.
Types of provisioning include:
1. Automated provisioning – Detecting new user record from the Authoritative Source or HR System and automatically provisioning those users with appropriate access on target applications.
2. Self-service provisioning – allows users to update their profile data and request an account or request an entitlement and manage their own passwords.
3. Workflow-based provisioning – gathers the required approvals from the designated approvers before granting a user access to an application or data.
A provisioning system must, in general, include some or all of the following components:
1. Connectors, to read information about users from integrated systems and applications and to send updates (e.g., create new user, delete user, modify user information) back to those systems and applications.
2. Internal database that tracks user objects and other data from integrated systems and applications.
3. Auto-discovery system, which populates the internal database using the connectors.
4. User interface where users can review the contents of the internal database, make change requests, approve or reject proposed changes, etc.
5. Workflow engine, used primarily to invite users to review and either approve or reject changes.
6. Policy engine, which evaluates both current user information and proposed changes to see if they meet corporate rules and regulations.
7. Reporting engine, which helps organizations extract information from the internal database.

Phases of a Sailpoint IdentityIQ Certification

Certification processes are very important when we speak of Access Governance using Sailpoint IdentityIQ. Generally the concepts remain the same as in any other Access Governance product ,but let us try to gain some more insight into IdentityIQ certifications.
The Certification processes allow reviewers\managers\certifiers to  review and remediate  accesses granted to users on various resources such as applications,entitlements,accounts and roles etc.Based on the type of resources, certifications in IdentiyIQ are divided into categories listed below:
  • Manager Certifications
  • Application Owner Certifications
  • Entitlement Owner Certifications
  • Advanced Certifications
  • Account Group Certifications
  • Role Certifications
  • Identity Certifications
  • Event‐Based Certifications
Although there has been the classification of certifications on basis of functionality,still all the above types of certifications go through same phases during their lifecycle. Some of these phases are optional while others can be mandatory.These 4 phases are:
  1. Generation Phase
  2. Active Phase
  3. Challenge Phase
  4. Sign Off Phase
  5. Remediation\Revocation Phase
  6. End Phase
Generation Phase: This phase includes configuring certification parameters on the Basic, Lifecycle, Notifications, Behavior and Advanced page from the UI. The combination of these parameter values decides which phases would the certification go through.It is in this phase that parameters like Certification owner,certification frequency, notification scenarios and other similar parameters are defined.
Active Phase:
  • It is during the Active phase that the certifiers are required to take their decisions(approve\revoke).
  • Delegations and reassignments,if any, needs to be completed during this phase.
  • The Active period duration is mentioned on the Lifecycle page.
Challenge Phase:
  • The Challenge Phase starts when the Active Period Duration is over.
  • Challenge phase is a phase in which a user whose access is being affected by a reviewers decision can challenge the decision.
  • It is enabled only if the “Enable Challenge Period” option was selected from the Lifecycle page.
Sign-Off Phase:
  • The Sign Off phase starts at the end of Challenge phase.
  • Once the Sign Off button is clicked , no further changes to Access Reviews can be made by reviewers.
Depending upon the parameters selected in the generation phase,next phase can be either Revocation phase or end phase.
Remediation\Revocation Phase:
  • In this phase remediation action(e.g. revocation of access rights) is performed on the source application using the provisioning mechanism(manually or automatically)
  • Remediation generally consists of sending email messages,creating work items for resource owners to take action.
  • When a Revocation Period is enabled, IdentityIQ monitors the status of remediation requests; when it is not enabled, remediation requests are submitted for processing but are not tracked.
End Phase:
  • The Access Review reaches its End Phase when all Phases configured for it have passed their end date or when all actions required for the process (as configured) are complete.
  • If a Certification does not have a Challenge or Revocation Periods enabled, clicking Sign Off initiates the End Phase.
  • If a Revocation Period enabled, End Phase will start only once all remediation requests have been completed or when the Revocation Period’s end date passes.


Types of Certifications in Sailipoint

Certifications in Sailpoint IQ can be divided into two categories.First on the basis of their “Time period of Execution” and second on the basis of their “functionality”.
Lets first discuss their classification on the basis of their “Time period of Execution”
Certifications can be scheduled to run periodically or continuously. Continuous certifications focus on the frequency with which individual items need to be certified while periodic certifications focus on the frequency with which the entire certification needs to be completed.
Certifications can also be configured to run based on events that occur during an identity life-cycle  For example, it might be configured to automatically generate a certification when an identity’s manager changes or any job change event or can be even creation of new identity etc.
Periodic Certification:
Periodic certifications are scheduled to run on a periodic bases, hourly, daily, weekly, monthly, quarterly, and annually. These periodic access reviews provide a snapshot view of the identities, roles, and account groups . Periodic certifications focus on the frequency with which entire entities (identities, roles, account groups) must be certified.
Periodic certifications require the certifier to sign off on a completed access review, an access review in which all of the items (roles, entitlements, violations, account groups) have been acted upon and to confirm those decisions.
Continuous Certification:
Continuous certifications focus on the frequency with which individual items (roles, entitlements, violations) contained within identity‐type certifications need to be certified and not on the frequency with which the entire certification needs to be performed.Continuous certifications do not use the sign off method.
Lets now have a look on their classification on the basis of their “functionality”.
Manager Certifications — certify that your direct reportees have the entitlements they need to do their job
and only the entitlements they need to do their job.
Application Owner Certifications — certify that all identities accessing an application for which an Application Owner is
responsible have the proper entitlements.
Entitlement Owner Certifications — certify that all identities accessing entitlements for which an Entitlement Owner is
responsible are correct.
Advanced Certifications — certify that all identities included in the population associated with that
Advanced Certification have the correct entitlements and roles.
Account Group Certifications — certify that account groups for which an account owner is responsible have the
proper permissions and group membership. Account groups that do not have owners assigned are
certified by the owner of the application on which they reside.
Role Certifications — certify that roles for which a role owner is responsible are composed of the proper roles
and entitlements and that these roles are assigned to the correct identities.
Identity Certifications — certify the entitlement information for the identities selected from the Identity
Risk Score, Identity Search Results, or Policy Violation pages, usually for at risk users.
Event‐Based Certifications — certify the entitlement information for the identities selected based on
events detected within IdentityIQ.


Thanks & Regards

No comments:

Post a Comment