Juniper Tech Solutions Inc.

Juniper Tech Solutions Inc.Juniper Tech Solutions Inc.Juniper Tech Solutions Inc.

Juniper Tech Solutions Inc.

Juniper Tech Solutions Inc.Juniper Tech Solutions Inc.Juniper Tech Solutions Inc.
  • Home
  • Our Services
    • Cyber Security
    • IAM-Identity Access Mgt
    • Software Testing (QA)
    • Software Solutions
    • IT Resources
  • FAQ
  • Contact Us
  • More
    • Home
    • Our Services
      • Cyber Security
      • IAM-Identity Access Mgt
      • Software Testing (QA)
      • Software Solutions
      • IT Resources
    • FAQ
    • Contact Us
  • Home
  • Our Services
    • Cyber Security
    • IAM-Identity Access Mgt
    • Software Testing (QA)
    • Software Solutions
    • IT Resources
  • FAQ
  • Contact Us

IAM - Identity Access Management

Installation of Sailpoint IdentityIQ

  • Finalizing the supported platforms for installation
  • Downloading the IdentityIQ installation files
  • Detailed installation steps
  • Patching
  • Further Sailpoint IdentityIQ version upgrade


Application Onboarding 

  • High Level Steps for Application Onboarding
  • Level of Effort Estimations by Application Category
  • Application 

Installation of Sailpoint IdentityIQ

  • Finalizing the supported platforms for installation
  • Downloading the IdentityIQ installation files
  • Detailed installation steps
  • Patching
  • Further Sailpoint IdentityIQ version upgrade


Application Onboarding 

  • High Level Steps for Application Onboarding
  • Level of Effort Estimations by Application Category
  • Application Onboarding detailed SOP Processes
  • Application Onboarding Analysis
  • Application Onboarding Development
  • Application Onboarding: Delimited File, JDBC, Active Directory, Servicenow, SAP, LDAP, WebService, Workday etc
  • Application Schema


Policy / RBAC

  • Creating Provisioning Policy
  • Provisioning policy
  • Provisioning rules
  • Account Aggregation
  • Aggregation rules
  • Identity Mapping (source / target)
  • Manager Correlation
  • Identity Refresh
  • Correlation Rule and Customization Rule
  •  Provisioning Policy Form
  • Role based access control


Life Cycle Events

  • Joiner, Mover, Leaver, Manager
  •  Transfer,Enable, Dis

Policy / RBAC

  • Creating Provisioning Policy
  • Provisioning policy
  • Provisioning rules
  • Account Aggregation
  • Aggregation rules
  • Identity Mapping (source / target)
  • Manager Correlation
  • Identity Refresh
  • Correlation Rule and Customization Rule
  •  Provisioning Policy Form
  • Role based access control


Life Cycle Events

  • Joiner, Mover, Leaver, Manager
  •  Transfer,Enable, Disable etc.


Roles in IdentityIQ

  • Organizational role
  • Business role
  • It role
  • Role creation
  • Role modification


Certification Campaign

  • Different stages of cortication
  • Manager certification
  • Application owner certification
  • Entitlement owner certification
  • Role membership certification
  • Role composition certification
  • Advances certification
  • Targeted certification
  • Custom certification
  • Schedule Certification


Reports in IdentityIQ

  • Inbuilt reports
  • Custom reports


Roles in 

Certification Campaign

  • Different stages of cortication
  • Manager certification
  • Application owner certification
  • Entitlement owner certification
  • Role membership certification
  • Role composition certification
  • Advances certification
  • Targeted certification
  • Custom certification
  • Schedule Certification


Reports in IdentityIQ

  • Inbuilt reports
  • Custom reports


Roles in IdentityIQ

  • Organizational role
  • Business role
  • It role
  • Role creation
  • Role modification


Different tabs and Quicklinks

  • Home
  • My Work
  • Identities
  • Applications
  • Intelligence
  • Setup

HOME

IAM tools

Single-Sign On (SSO)


  • Microsoft Azure AD
  • ForgeRock OpenAM
  • PingFederate 



Directory Services


  • Oracle Directory Services (OUD ODSEE, Proxy server)
  • Radiant Logic (VDS)
  • PingDirectory
  • ForgeRock OpenDJ

 Privilege Access Management (PAM)


  • BeyondTrust PasswordSafe
  • CyberArk 

HOME

Copyright © 2023 Cyber Security ~ Software Development ~ IT Resources - All Rights Reserved.



Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept