Blog

SailPoint Interview Questions

17 November, 2020

Related Blogs

SailPoint Interview Questions

In this fast-paced and competitive world, you need to upgrade yourselves with new and booming technologies that make you stand out from a group of competitors. So here one of the trending Cloud technology “Sailpoint.” 

There are wonderful opportunities for Sailpoint developers in many reputed companies with a handful of packages. If you appear for an interview based on Sailpoint and you’re confused about preparing for the Sailpoint Interview. No worries! Our experts make your task easier by compiling Top 50 Sailpoint Interview Questions for Freshers and Experienced candidates. Our SailPoint Certification questions will help you crack the interview, and also you can clear the certification exam.

The following are some of the most frequently asked SailPoint interview questions in the interview, here are the answers for them.

Q1) What is a Governance Platform?

Ans: Governance Platform is centralized identity data, roles, business policy, and risk modeling to support compliance initiatives and user lifecycle.

Q2) What is the Compliance Manager?

Ans: Compliance Manager is streamlines compliance controls and improves audit performance through automated access certifications and policy enforcement.

Q3) How to Extend Identity Management from the Data Center to the Cloud?

Ans: IdentityIQ helps organizations to quickly and easily integrate cloud-based applications into their existing identity management program without impacting business users or processes. This provides a consistent user experience for common identity business processes, such as requesting access, provisioning accounts, managing passwords, and certifying user access – across all IT resources, regardless of where an application is hosted.

IdentityIQ provides two components that work together to quickly extend compliance and provisioning activities beyond the data center to cloud-based applications.

  • SaaS Connectors seamlessly integrate user access data from SaaS applications such as Google Apps and Salesforce CRM into IdentityIQ to manage access certification, policy enforcement, access request, and provisioning processes.
  • Cloud Identity Bridge extends identity governance and provisioning into public and private cloud environments, providing a secure and reliable link between IdentityIQ and cloud-based resources.

Q4) What is Identity Intelligence?

Ans: Identity Intelligence is transforming technical identity data scattered across multiple enterprise systems into centralized, easily understood, and business-relevant information including dashboards, reports, and advanced.

Q5) What is Audit Configuration?

Ans: Use the Audit Configuration page to specify the actions that are collected for audit logs. Since collecting event information and storing it in the audit logs affects performance, a system administrator must specify the actions that are audited. Before any data is collected by the audit logs for use in an audit search, IdentityIQ must be configured for auditing.

The Audit Configuration page contains the following types of actions:

  • General Actions — typical action performed while using IdentityIQ. For example, running a task and signing off on certification are general actions.
  • Link Attribute Changes — changes made to any assigned link attributes.
  • Identity Attribute Changes — changes to assigned roles, capabilities, authorized scopes, and controlled scopes, and changes to the password. This list might also include extended identity attributes.
  • Class Actions — action taken on the underlying classes used to configure the way in which IdentityIQ operates. For example, editing a role, creating a policy, and specifying the default email templates are class actions.

Q6) What is the Identity Warehouse?

Ans: The Identity Warehouse is at the core of the Governance Platform serving as the central repository for identity and access data across all enterprise IT applications in the data center and the cloud. The warehouse is populated by importing user data from any authoritative source (e.g., HRMS) and user account and entitlement data from business applications, databases, platforms, and other systems. It is designed to scale and rapidly import access data from large numbers of applications and users by leveraging out-of-the-box connectors or via flat files.

Q7) What is a Role Modeler?

Ans: IdentityIQ automates the creation,  enforcement, and verification of role-based access across enterprise applications. Organizations can quickly define roles that fit the unique requirements of their environment using IdentityIQ’s adaptive role model. More importantly, IdentityIQ enables organizations to create roles that enforce “least-privilege” access while controlling role proliferation. To speed the combination of top-down, business-oriented role modeling and bottom-up  IT role mining, IdentityIQ enables cross-functional participation in the role-modeling process and makes it easy for both business and technical users to create roles that accurately reflect the organization’s business and IT  needs.

Q8) Why SailPoint? Innovations in Identity Management?

Ans: Only SailPoint brings a unique combination of strengths to bear on every aspect of the new challenges of identity management. With innovative, industry-proven technology, a strong heritage in identity and access management, and a laser-like focus on identity governance, SailPoint is best equipped to help any organization run a successful identity management program with the following industry innovations.

  • Risk-based approach - Only SailPoint offers 360° visibility into identity and access data and applies a risk model that makes it easy to promptly identify specific business risks before they pose a threat to security or compliance.
  • Unified architecture - SailPoint is the only identity provider that has built identity governance and provisioning solution from the ground up to deliver all the capabilities that organizations require to address today’s risk, compliance, and lifecycle management needs.
  • Flexible last-mile provisioning approach - IdentityIQ integrates easily with whatever identity technologies, tools, and processes are established or preferred. With SailPoint, the customer decides how changes are fulfilled to the resources across the organization.
  • High performance and scalability - SailPoint meets the performance and scalability requirements of some of the world’s largest customers. IdentityIQ is designed to scale horizontally, vertically, and functionally, making it possible for SailPoint to manage hundreds of thousands of users, thousands of applications, and millions of entitlements.
  • Centralized governance across datacenter and cloud environments - IdentityIQ is designed to handle access to all data, applications, and other resources throughout the organization, from the datacenter to the cloud.

Q9) What are the Provisioning Integration Modules?

Ans: SailPoint recognizes that many organizations have significant investments in legacy provisioning systems. To maximize existing investments in these systems, IdentityIQ can leverage existing connectivity through alternative provisioning systems to connect to enterprise resources and pull user account data into its Identity Warehouse to support compliance and identity lifecycle management activities. IdentityIQ can also be configured to push changes resulting from day-to-day identity business processes down to the provisioning solution to implement account changes in target IT systems. SailPoint offers Provisioning Integration Modules (PIMs) for numerous legacy user provisioning solutions, including BMC Identity Manager, IBM Tivoli Identity Manager, Novell Identity Manager, Oracle Identity Manager, and Sun Identity Manager (Oracle Waveset).

Q10) What is the Lifecycle Manager?

Ans: IdentityIQ Lifecycle Manager delivers a business-oriented solution to deliver access securely and cost-effectively, through:

  • Self-Service Access Request
  • Automated Provisioning

Q11) How to Create a Service Account Using Simple Mapping?

Ans: In this example, if IdentityIQ finds an attribute named Service that has a value of true on the application DB Application it is marked as a service account. For this case the database connector has already provided an attribute value to reflect the service state, so a simple mapping is all that is required.

Note: After configuring these attributes you must‐aggregate or refresh the identity cubes to set the values.

To configure the mapping:

1. Access the Account Attributes page.

Click the System Setup tab and select Account Mappings from the table.

2. Click Add New Attribute to display the Edit Account Attribute page.

3. Specify the following values:

  • Attribute Name — service
  • Display Name — Service Account
  • Edit Mode — Read Only
  • Attribute Type — boolean
  • Searchable — Read Only
  • Multi‐Valued — this is not a multi‐valued attribute so do not select this field.

4. Click Add Source Mapping to display the Add a source to the attribute dialog.

5. Map the attribute:

  • Select Application Attribute.
  • Select DB Application from the Application drop‐down list.
  • Select Service from the Attribute drop‐down list.

6. Click Add.

Q12) How to Add or Edit Extended Attributes?

Ans: 

1.Click New Attribute or click on an existing attribute to display the Edit Extended Attribute page.

2. Enter or change the attribute name and an intuitive display name.

Note: You cannot define an extended attribute with the same name as an application attribute that is provided by a connector.

Note: If you define an extended attribute with the same name as an application attribute, the value of the extended attribute overwrites the value of the connector attribute.

3. Select the attribute type from the drop‐down list, String, Integer, Boolean, Date, Rule, or Identity.

4. Optional: Enter a description of the additional attribute.

5. Optional: Select a category for the attribute.

6. Optional: Activate the Searchable check‐box to enable this attribute for searching throughout the product.

7. Optional: Activate the Editable check‐box to enable this attribute for editing from other pages within the product.

8. Optional: Mark the attribute as required. For string, type attributes only.

9. Optional: Enter allowed values for the attribute. For string, type attributes only.

10. Optional: Specify a default value.

11. Click Save to save your changes and return to the Edit Application Configuration page.

Q13) How to Add or Edit Extended Entitlement Attributes?

Ans:

1. Click New Attribute or click on an existing attribute to display the Edit Extended Attribute page.

2. Enter or change the attribute name and an intuitive display name.

Note: You cannot define an extended attribute with the same name as an application attribute that is provided by a connector.

3. Select the attribute type from the drop‐down list, String, Integer, Boolean, Date, Rule, or Identity.

4. Optional: Enter a description of the additional attribute.

5. Optional: Select a category for the attribute.

6. Optional: Activate the Searchable check‐box to enable this attribute for searching throughout the product.

7. Optional: Activate the Editable check‐box to enable this attribute for editing from other pages within the product.

8. Optional: Mark the attribute as required. For string, type attributes only.

9. Optional: Enter allowed values for the attribute. For string, type attributes only.

10. Optional: Specify a default value.

11. Click Save to save your changes and return to the Edit Entitlement Catalog Configuration page.

Q14) Define Role Configuration?

Ans: Role Configuration page to define custom extended role attributes and role types. The extended attributes are displayed with the rest of the role information throughout the product. An example of an extended role attribute might be role status. Role type is used to configure rules to perform different functions within your business model. For example, the type might be used to control inheritance or automatic assignment of roles.

Q15) How to Add or Edit Role Types?

Ans:

1.Click New Type or click on an existing type to display the Edit Role Type Definition page.

2. Enter or change the name and display name.

3. Enter an icon path to link to the iconic image associated with roles of this type in the Role Modeler.

To assign an icon to a role type, do the following:

a. Add two icon imagesto iiq_home/images/icons folder of yourIdentityIQ installation, one for the role and one for the role as it is undergoing analysis or approval. For example, .itIcon { background-image: url("../images/icons/modeler_application_16.png") !important; background-repeat: no-repeat; .itIconPendingbusiness process { background-image: url("../images/icons/ modeler_application_approval_16.png") !important; background-repeat: no-repeat;

b. Reference the images from the iiq-custom.css file in the iiq_home/css directory.

4. Optional: Select configuration options for the role type.

5. Click Save to save your changes and return to the Edit Role Configuration page.

Q16) How to create Direct Links to IdentityIQ?

Ans: Creating Direct Links to IdentityIQ

  • Lifecycle Manager enables you to create direct links into IdentityIQpagesfrom outside of the product from places such as emails, forms, or a portal. These direct links can either use your single-sign-on solution or require users to login to IdentityIQ as an intermediate step. Direct links can also use a number of filtering options enabling users to go directly to specific pages using specific filtering criteria.
  • The most common use of the direct link is a direct link to the IdentityIQ shopping cart with a pre‐selected set of roles and entitlements based on a user's access level and group membership.

Q17) What is Application Re‐configuration?

Ans: The application re‐configuration option enables you to change the application type without losing the history associated with the application or having to create a new application. For example, if you first deployed your instance of IdentityIQ using a flat-file connection, but now want to use some of the more advanced features, such as provisioning. The type defines the way in which IdentityIQ connects to the application. Application types that have the same value format for identity and group attributes in the original and re‐configure target are best suited for re‐configuration.

The following application types can be re‐configured:

  • Delimited file to the corresponding direct connector (Delimited File to Active Directory ‐ Direct)
  • JDBC connector to corresponding direct connector (JDBC to Oracle Applications ‐ Direct)
  • Agent-based connector to direct connector (Active Directory ‐ Full to Active Directory ‐ Direct)
  • To a rewritten connector for better performance or more functional support (Google Apps ‐ Direct)

Q18) How to Approve Role Changes?

Ans: When roles are created or edited, they might require approval from the designated owner before they become active. Work items are created and sent to the owners when approval is necessary. Use this procedure to review and approve or reject role changes. Role analysis and role approval are an important part of the overall role life‐cycle management. Role analytics and approval, both for new or modified roles are controlled through business processes configured for your implementation of IdentityIQ.

Procedure

1. Click an approval work item in your Inbox on the Dashboard to display the Approval page.

2. Review the summary information of the work item.

3. Review the comments associate with the work item and, optionally, add comments.

4. Review the details sections.

  • Modification approvals — review the changes in the Modified Role or Modified Profile table and make a decision.
  • Creation approvals — review the information in the New Role or New Profile panel, make the necessary modifications, and make a decision. Some of the information is read-only.

5. Click Review Pending Changes to display the Role Editor and review the changes proposed for the role.

6. Make a decision.

  • Approve — approve the creation or modification. Add comments if needed and confirm the approval on the Approval Comments dialog.
  • Reject — reject the request for approval on the creation or modification. Add comments if needed and confirm the rejection of the Rejection Comments dialog.
  • Forward — forward the approval work item to another user. Entering the first few letters of a name displays a select list of valid users with names starting with those letters. Select a name from the list. Add comments if needed.
  • Cancel — cancel the work you have done on the work item and return to the Dashboard.

Sailpoint Interview Questions for Freshers

Q19) What is meant by Sailpoint?

Ans: SailPoint is an open-source Identity Governance stage that engages the association to make an identity enabled firm setup by Device, integrity data, and Applications in a single oriented stream. 

Q20) Explain about the Sailpoint IIQ(Identity Iq)?

Ans: Sailpoint IdentityIQ® may be a comprehensive firm based IAM arrangement that provides quick, beneficial access that keeps business users productive and access to control and guard the business. IdentityIQ incorporates compliance management and provisioning in an integrated kind of arrangement that generally uses an identity governance framework.

Q21) Tell about the application of Sailpoint?

Ans: SailPoint Identity could also be a feature-rich and strong cloud-based identity governance arrangement that devolves access control, access accreditation administrations provisioning, password management for tables, cloud, on-premises applications, and mobiles. 

Q22) Tell about the importance of Cloud Identity Management?

Ans:

  • According to the current circumstance, the general cyberattacks and steady dangers to the company's protection plans have become a critical concern for affiliations. Cloud Identity Management just as the approved admittance basically guarantees that it is just the affirmed person who can get to the data on the cloud and simultaneously can properly manage the same. 
  • This routinely overhauls the assurance alongside security in a cloud circumstance and enables the association to simply keep up their pace constantly. Cloud identity management avoids the chances of leaking the data by imposing different restrictions on the equivalent. 

Q23) Brief notes on Identity Management?

Ans: It is essentially described as the procedure of authentication and authorization in cloud circumstances. Everything began from the security of basic applications and later changed into the whole cloud. One of the key points of this approach is to increase the cloud circumstances more and more conspicuously to associations with unpredictable and unique information storage needs.

Q24) List out the key drives of IAM in Sailpoint?

Ans: Following are the key drives of IAM in Sailpoint: 

  • Audit Compliance
  • Operational Efficiency

  • Improved Security

  • Business Enablement

Q25) Define Host Configuration?

Ans: The Host Configuration page is utilized to screen potent servers running an IdentityIQ instance. This is generally called an IdentityIQ circumstance. The data given on this page advises framework administrators regarding the current outstanding burden within reach that each server is keeping up.

Q26) Which cloud model can you apply the Sailpoint solution directly?

Ans: Sailpoint Solution can be applied for the following cloud models: 

  • Communicate Cloud
  • Hybrid Cloud

  • Private Cloud

  • Public Cloud

Q27) Differentiate app SSO Solution with Cloud  Identity Management?

Ans:

  • Indeed, Cloud Identity Management is something other than a basic application SSO solution. It gives better protection and ensures each client can have singular access. It is likewise conceivable to confine or restrict admittance to this approach. 
  • All the traditional frameworks can be made viable with cloud Identity Management and the beneficial thing is it depends on Directory-as-a-administration. In contrast to SSO arrangements, there is no worry in the CIM (Cloud Identity Management) with regards to various gadgets and the Operating system.

Q28) Explain any one difference between Sailpoint and Traditional Cloud Identity Management?

Ans: The SailPoint mainly focuses on the multi-pact approach and it primarily around empowering any Information Technology asset to be considered basic. One of the key advantages is it just acknowledges the default language of the instrument or the program and essentially ensures good outcomes in the most brief conceivable time.

Q29) Can Identity Management be possible in the Utility Computing world?

Ans: Yes, it is possible because it is model management, the idea of organizations could be unprecedented. In most of the examples, the Hybrid strategy and Identity Management is positively not a genuine arrangement with the assistance of a suitable course of action.

Q30) According to you what are the benefits that a business can derive from an effective Cloud Identity Management Solution?

Ans:

  • Perhaps the best thing is it can associate the representatives to one another in a safe way and indeed without trading off with anything. All the IT applications an association utilizes and the gadgets they own can be made to speak with one another with a focal control or an eye on them. 
  • Most likely this regulates the frauds and other issues. Associations can essentially appreciate the zero administration overhead, just as upgraded security. Likewise, the registry of the executives should be possible in a truly solid way and without trading off with anything. 
  • Also, all the cloud servers of an association can be associated with the current AD. The equivalent can likewise be stretched out up to a decent degree. All the gadgets can be overseen under one focal control paying little heed to their location.

Q31) What are various layers in Cloud Architecture in Sailpoint?

Ans: Following stated are the various layers in the Cloud Architecture in Sailpoint:

  • Walrus

  • Node Controller

  • Cluster Controller

  • Cloud Controller

  • Storage Controller

Q32) Explain the term roles in Identity Management?

Ans: Associating certain entitlements to frame a role. And this Entitlement can be demonstrated as an approval of a particular application/framework. 

Q33) How many types of roles can you develop using Sailpoint?

Ans: Following are the two types of roles that the user can develop using Sailpoint: 

  • IT Roles

  • Business Roles

Q34) Explain the term role configuration in Sailpoint?

Ans: Role Configuration is the page used to portray only extended role characteristics and various roles. The comprehensive qualities are apparent with the rest of the role information all through the thing. An instance of a comprehensive role quality might be role status.

Q35) Explain the use of Role Type in Sailpoint?

Ans: The role type is used to organize parts to perform different limits inside your strategy. For example, the sort might be used to control the inheritance or customized assignment of roles.

Q36) Expand APMFA in Sailpoint?

Ans: APMFA stands for Application-Level Multi-factor Authentication.

Q37) Explain about the System Integrators and how they are related to Identity Management?

Ans: One of the essential obligations of the structure integrators is to give the best framework to the arranging of the technique which is tangled anyway is useful in Identity Management. A strong arrangement of a crossover or a private cloud with convincing access to the executive's limits can be ensured with the help of this strategy.

Q38) Can you explain how effective cloud Identity Management Solution influences large Scale firms with complex needs and operations?

Ans: There isn't anything incorrectly to state that this methodology is exceptionally basic to any association with complex requirements and the board arrangements on a cloud. Probably the greatest factor is the general profitability of the workers can be upgraded up by and large and without agonizing over the general expense related. The innovation simultaneously can likewise be improved. In the event that associations need to confront issues about the stage in view of catalog benefits, a cloud identity management solution with an unbiased seller can be valuable.

Q39) Explain how mobile computing is different from cloud computing?

Ans: They appear to be very like each other however are really extraordinary. Both utilize a similar idea and Cloud computing has extra advantages. It becomes information operational through the World Wide Web than simply a particular gadget. The information which is requested by the clients can be gotten to whenever. On the opposite side, all the application is versatile for the most part runs on a distant worker. Subsequently, clients can approach stores, just as dealing with the information.

Q40) Tell us how a Sailpoint Cloud Identity Management Solution could be more useful than any other parallel solution?

Ans: Following stated points will help you to know how the cloud identity management solution is more useful when compared to other parallel solutions: 

  • Its information reinforcement and storage is secure and companies can ensure the equivalent 
  • It offers the board capacities without compromising with the server abilities 

  • There are inbuilt sandboxing highlights which the clients can just ensure without trading off with whatever else 

  • It spares plenty of expenses, just as endeavors of specialists with regards to dealing with the information on a cloud

Q41) Tell about any one method that you use to secure while transmitting the data within the cloud?

Ans: Paying attention to the encryption key while transmitting the data within the cloud. 

Sailpoint Interview Questions for Experienced

Q42) Explain the advantages that users can have as a tool for authorizing the application services within Cloud Identity Management Solution?

Ans: To authorize the identities, a cloud identity management arrangement can essentially empower the association to have better access control. This ensures the consent of the management for dealing with the errands for other's sake. Anybody entering a confined segment of a cloud can be controlled. Also, different advantages incorporate the approval, just as the confirmation with the goal that a set number of clients can get to the information.

Q43) Explain the Apache Velocity Engine?

Ans: IdentityIQ email designs are taken care of through an open‐source motor called Apache Velocity. Speed is a Java‐based format engine that licenses site page modelers to reference systems portrayed in Java code. IdentityIQ's email designs use the Velocity Template Language to intensely decide the email messages' substance and make custom email messages express to the recipient, work thing, and movement included.

Q44) What approach will you opt for in order to render your cloud more intelligent?

Ans: We can essentially do this by giving the integrators the information identified with the datacenter just as its creation history.

Q45) Explain the term Identity Cube in Sailpoint?

Ans: Any record from a source application is called an Identity after it is gathered into the Sailpoint IIQ. The entire data of the customer, for instance, Identity, Identity Detail, and Entitlements combined are implied as an Identity shape.

Q46) Explain about the Application Onboarding in Sailpoint?

Ans: The total strategy of affirming the accessibility, getting the customer data from applications into the Sailpoint IIQ is called Application onboarding.

Q47) Explain the various certification types that are available in Sailpoint?

Ans: Following stated are the various certification types that are available in the Sailpoint:

  • Application Owner Certification
  • Manager Certification

  • Role composition Certification

  • Role Membership Certification

  • Account Group Permission

  • Account group Membership Permission

Q48) Explain the security laws that would be implemented for securing the information in the cloud environment?

Ans: The client should ensure that the information is to be controlled and prepared dependably in an application. The following law is identified with a record that essentially ensures that it deals with the whole information which is being controlled. There are a couple of more laws, for example, Input Validation, Output Reconciliation just as laws overseeing the security, just as the reinforcement of the organization.

Q49) Tell us about any one of the approaches that should be considered to link the programs to the useful systems?

Ans: This should be possible with the assistance of a methodology called EUCALYPTUS. It is likewise conveyed for bunching in the cloud environment with the goal that identity can be overseen on a mind-boggling network without any problem.

Q50) What are the actions that users should take when performance issues are raised in the Sailpoint environment?

Ans: The load, just as the presentation testing, is something that would be incredibly useful for you yet this would be done in the underlying stage. Code investigating is the following thing that should be possible for this. Also, the activity fortress and the upliftment should be possible. Consideration is to be paid on the information records, plate space accessibility, just as on the elements that can upgrade the vacation.

Q51) What would be needed for the users while implementing the Identity Management and Cloud Security Policies in Sailpoint?

Ans: Virtualization just ensures the successful usage of all the administration level approaches just like the arrangements restricting the Operating frameworks. Moreover, virtualization is the methodology that is helpful in keeping the client level ideas, just as the backend level ideas are unique in relation to each other.

Q52) What are the basic requirements that users needed to fulfill before implementing a cloud Identity Management Solution?

Ans: First user should focus on consistency which is required. It is likewise important to focus on the loss of the information just as the capacity. The specialists should likewise focus on the general congruity of the information honesty of the cloud environment.

Q53) How to eliminate the complex programs in Cloud?

Ans: This should be possible with the assistance of the Application Programming Interface. All the directions that oversee the power over the application correspondence are characterized by it and new frameworks can be added to the cloud without changing the current security arrangements restricting recognizable proof and access to the board. 

Q54) Explain Cloud Service?

Ans: Cloud is essentially a way to deal with construct and store cloud applications with the assistance of a worker in an organization with the assistance of the web. It offers the capacity to the clients to get to the application inside a cloud from any area. What's more, all the applications can be set at a unified area where one requires not to stress over the wellbeing and the security of the concerned information.

Q55) What are the two basic clouds in the cloud computing approach?

Ans: Following are the two basic clouds in the cloud computing approach:

  • Professional Cloud
  • Performance Cloud

Q56) What are the Key Components of IQ in Sailpoint?

Ans:

  • IdentityIQ gives the accompanying key parts to robotized access confirmations, strategy implementation, and the start to finish access demand and provisioning measures: 
  • Compliance Manager Streamline's consistency controls and improves review execution through robotized access accreditations and strategy authorization. 
  • Governance Platform unifies personality information, jobs, business strategy, and danger demonstrating to help consistency activities and client lifecycle the board. 
  • Identity Intelligence changes specialized character information dispersed over numerous undertaking frameworks into brought together, effectively comprehended, and business-pertinent data including dashboards, reports, and progressed investigation.
  • Lifecycle Manager offers self-assistance access demand and lifecycle occasion the executives to rearrange and mechanize the creation, alteration, and denial of client access advantages. 
  • User Provisioning gives adaptable choices to executing changes mentioned by the business during the consistency and lifecycle of the executives.

Q57) Explain different provision types in Sailpoint?

Ans: Following stated are various provision types in Sailpoint: 

  • Automated provisioning: In this distinguishing new client records from the Legitimate Source or HR System and naturally provisioning those clients with fitting access on track applications. 
  • Self-administration provisioning: In this permits clients to refresh their profile information and demand a record or solicitation a privilege and deal with their own passwords. 
  • Work-flow based provisioning: In this assembles the necessary endorsements from the assigned approvers prior to conceding a client admittance to an application or information.

Q58) Explain Password Management in Sailpoint?

Ans: IdentityIQ Password Manager conveys a basic use solution for overseeing client passwords to decrease operational expenses and lift profitability. Following are two password management types in Sailpoint: 

  • Self-Service Password Management 
  • Solid Password Policy Enforcement and Sync

Q59) Explain the Account Mappings in Sailpoint?

Ans: Record the Mapping page to arrange and guide particular records. A particular record can be any records that legitimize extraordinary taking care of all through our endeavor. For models, special records, for example, Root, Administrator, or Superuser, and administration accounts that entrance particular assistance or capacity on an application. Any trait reached out on this page is accessible for looking on the Identity Search page. You can appoint symbols to stretched out qualities to feature these records in confirmations and the point by point character pages. Particular record ascribes can be demonstrated to deal with any idea utilizing basic one‐to‐one planning principles. This segment portrays two of the most well-known situations. Utilize the Account Attributes page to see the all-encompassing record ascribes data for your setup. Go through this page to set particular record credits such as Privileged and Service, and some other expanded characteristics for use in affirmations and searches.

Q60) Explain the Role Configuration in Sailpoint?

Ans: Role Configuration page to characterize exceptionally expanded role describes and role types. The all-encompassing qualities are shown with the remainder of the data all through the item. A case of an all-encompassing role characteristic may be role status. Role type is utilized to design parts to perform various capacities inside your plan of action. For instance, the type may be utilized to control legacy or programmed tasks of roles.

Q61) How to handle multi-threading in Sailpoint?

Ans: On the off chance that you are intending to have plenty of beneficiaries, I would not utilize the One-string What's more, QUEUE-PER-RECEIVER approach. You could wind up with a heap of strings not doing anything more often than not and I could hurt your exhibition wide. An elective is utilizing a string pool of specialist strings, simply picking errands from a mutual line, each undertaking with its own collector ID, and maybe, a common word reference with attachment associations with every beneficiary for the working strings to utilize.

Q62) Which tool is used to monitor the code in Sailpoint?

Ans: JRockit is a finished answer for Java SE which incorporates an elite JVM, profiling, observing, and diagnostics instruments, and can be utilized for foreseeing idleness in Java applications. Shroud Memory Analyzer is a Java load analyzer that causes you to discover memory spills and, what's more, diminish memory utilization. It is more appropriate for being a broadly useful toolbox to examine Java load dumps and figuring of its size. It tends to be utilized moreover reports spill suspects and memory utilization enemies of examples.

Q63) List Out various correlations in Sailpoint?

Ans: Following stated are two types of correlations in Sailpoint: 

  • Manager Correlation
  • Account Correlation

Q64) Differentiate the differences between Authorization and Authentication?

Ans: 

Authentication: This alludes to the way toward choosing the character of a client who is attempting to get to an offered system.

Authorization: Refers to the way toward choosing regarding what sort of exercises you will allow access. By and large, approval is utilized with regards to a generally validated character

Q65) How to merge the data during application Configuration?

Ans: Information blending is a connector level component open in delimited and JDBC sort of uses. Various sections of data are merged during the last stage.

Q66) Explain how you will handle the performance for an End-user?

Ans: We can do that by keeping the gathering memory impression low Page at DB level instead of at the webserver level. While load testing uses a wide extent of data to avoid the save and copy the genuine exhibition of end-customers.

Q67) What are the two data centers that are available in the Cloud environment?

Ans: Following are the two data centers that are available in the Cloud Environment: 

  • Low-density Data Centers
  • Containerized Data Centers

Q68) What are the investments that are needed in the cloud environment?

Ans: For sure, the investments are almost nil then on that specific occasion, one requires a submitted cloud. It is particularly obvious that cloud advancement is well secure and safe in each point as it basically guarantees the at the last possible second establishment.

Q69) Explain about IdentityNow?

Ans: IdentityNow is the Software as a Service offering of Sailpoint's IdentityIQ. Thus, Sailpoint is the main supplier of IAM as a help. IdentityNow helps in client provisioning, single sign-on, and the secret phrase the executives. It is profoundly reasonable for complex cross breed IT conditions. Generally significant of all, IdentityNow likewise helps in the unification of character the executives measure all through various conditions. The encryption and security innovation establishment of Sailpoint further improves the believability of IdentityNow.

Q70) Differentiate between roles and capabilities in Sailpoint?

Ans: Indeed, Capability isn't the right term here. It is known for entitlement. Entitlement is the entrance that is given to a specific framework and then again, the roles are the gatherings or groups of these gets to.

Q71) Explain approval items in Sailpoint?

Ans: Each head or the chief has barely any things on his dashboard, which some subordinate delegate has an entrance demand/account request set up, for the manager to support.

Q72) Explain about an app server would you deploy when you are dealing with a J2EE Application? And why WebSphere over Tomcat?

Ans: WebSphere is an Application server whereas tomcat is a web server. So Websphere is liked in the event that you need to run disseminated exchanges and EJB. Tomcat is sufficient in the event that you give only HTTP convention level help alone.