SailPoint IdentityNow Provisioning Process

Date Posted:

19 Jun 2025

Category:

Security

SailPoint IdentityNow Provisioning Process

Date Posted:

19 Jun 2025

Category:

Security

SailPoint IdentityNow Provisioning Process

Date Posted:

19 Jun 2025

Category:

Security

Introduction Of SailPoint IdentityNow Provisioning

Provisioning involves granting, updating, or revoking user access to various systems, applications, and databases, ensuring that users have the appropriate permissions based on their roles and needs.

Provisioning Steps

1.     Provisioning can be triggered automatically through lifecycle changes and role assignments, or manually via access requests, certifications, and manager revocations.

2.     This request is packaged into a provisioning plan that outlines the necessary data and operations.

3.     IdentityNow then fulfills the request either directly through connected systems, by notifying external ticketing systems, or via manual intervention.

4.     Once the request is fulfilled, the system re-aggregates data to verify that the changes were successfully applied.

Provisioning Plan

Provisioning Plan Process

The provisioning process begins with the creation of a Provisioning Plan triggered by various events such as user lifecycle changes (joiner, mover, leaver), role assignments or removals, access request submissions, or certification review outcomes.

1. Creation

This is the initial stage of the provisioning process. In this phase, the system identifies and gathers all necessary information to determine the required access changes.

A Provisioning Plan is generated, which includes:

  • Target system

  • Provisioning action (create, update, delete, disable)

  • Attribute values and entitlements.

2. Compilation

In this phase, IdentityNow compiles the provisioning plan into detailed actions:

  • Maps roles to entitlements

  • Resolves identity attributes using mappings or transforms

  • Prepares connector-specific operations

  • Applies provisioning rules for dynamic value generation (if configured)

3. Expand

The compiled actions are expanded into multiple application-specific instructions:

  • Each target application receives its own set of instructions

  • Helps in managing multi-app provisioning through a single role or plan

Example: A single “Role” might expand into instructions for Workday, Active Directory, and ServiceNow.

4. Partition

IdentityNow partitions the provisioning instructions:

  • Group tasks by system or connector type

  • Enables parallel execution for efficiency

  • Ensures proper sequencing (e.g., account creation before entitlement assignment)

IdentityNow filters out already-assigned access during provisioning to avoid redundant actions. Only new or missing access is executed. This step is vital for performance optimization in large environments.

5. Policy Check

Before executing any change, IdentityNow performs policy checks to enforce security and compliance.

Types of Policies Checked:

  • Provisioning Policy: Ensures mandatory fields like email, username are populated correctly.

  • Identity Policy: Validates uniqueness (e.g., no duplicate usernames) and required attributes.

  • SOD Policy: Checks for entitlement conflicts or conditions (SoD violations).

If a policy fails:

  • Provisioning may be blocked

  • An approval or remediation process may be triggered

6. Execution

The execution step in provisioning is where the planned access changes are applied to the target systems. This involves using various methods such as out-of-the-box connectors, IQService for on-premise systems, Web Service connectors through REST or SOAP APIs and custom scripts or rules. Execution may be:

Immediate: Actions are performed in real-time as soon as the plan reaches this stage.

Conditional: Execution waits for specific approvals, triggers, or business rules before proceeding.

Manual: Some actions may require administrators to perform them directly, especially in disconnected or legacy systems.

Execution status (success, failed, pending) is recorded and can be tracked via the UI or logs.

Post-Provisioning Steps

1. Account Aggregation

  • Re-collects the account from the target system to verify that changes are applied.

  • Helps reconcile state and keep the identity warehouse accurate.

2. Audit and Logging

  • All provisioning events are logged.

  • Includes who initiated the action, what was changed, when, and the outcome.

  • Logs are available for compliance, audits, and troubleshooting.

3. Notifications and Workflows

  • IdentityNow can send emails or trigger additional workflow steps, such as:

    • Notify a manager of successful account creation

    • Route to ServiceNow for approval/ticketing

    • Alert admin on provisioning failure

Stay tuned to our blog to see more posts about

Sailpoint products implementation and its related updates.

Stay tuned to our blog to see more posts about

Sailpoint products implementation and its related updates.

Category:

Security

Stay tuned to our blog to see more posts about

Sailpoint products implementation and its related updates.

Stay tuned to our blog to see more posts about

Sailpoint products implementation and its related updates.

Category:

Category:

Security

Security

Get your

Tailored Quote for your

Organisation

Get your

Tailored Quote for your

Organisation

Introduction Of SailPoint IdentityNow Provisioning

Provisioning involves granting, updating, or revoking user access to various systems, applications, and databases, ensuring that users have the appropriate permissions based on their roles and needs.

Provisioning Steps

1.     Provisioning can be triggered automatically through lifecycle changes and role assignments, or manually via access requests, certifications, and manager revocations.

2.     This request is packaged into a provisioning plan that outlines the necessary data and operations.

3.     IdentityNow then fulfills the request either directly through connected systems, by notifying external ticketing systems, or via manual intervention.

4.     Once the request is fulfilled, the system re-aggregates data to verify that the changes were successfully applied.

Provisioning Plan

Provisioning Plan Process

The provisioning process begins with the creation of a Provisioning Plan triggered by various events such as user lifecycle changes (joiner, mover, leaver), role assignments or removals, access request submissions, or certification review outcomes.

1. Creation

This is the initial stage of the provisioning process. In this phase, the system identifies and gathers all necessary information to determine the required access changes.

A Provisioning Plan is generated, which includes:

  • Target system

  • Provisioning action (create, update, delete, disable)

  • Attribute values and entitlements.

2. Compilation

In this phase, IdentityNow compiles the provisioning plan into detailed actions:

  • Maps roles to entitlements

  • Resolves identity attributes using mappings or transforms

  • Prepares connector-specific operations

  • Applies provisioning rules for dynamic value generation (if configured)

3. Expand

The compiled actions are expanded into multiple application-specific instructions:

  • Each target application receives its own set of instructions

  • Helps in managing multi-app provisioning through a single role or plan

Example: A single “Role” might expand into instructions for Workday, Active Directory, and ServiceNow.

4. Partition

IdentityNow partitions the provisioning instructions:

  • Group tasks by system or connector type

  • Enables parallel execution for efficiency

  • Ensures proper sequencing (e.g., account creation before entitlement assignment)

IdentityNow filters out already-assigned access during provisioning to avoid redundant actions. Only new or missing access is executed. This step is vital for performance optimization in large environments.

5. Policy Check

Before executing any change, IdentityNow performs policy checks to enforce security and compliance.

Types of Policies Checked:

  • Provisioning Policy: Ensures mandatory fields like email, username are populated correctly.

  • Identity Policy: Validates uniqueness (e.g., no duplicate usernames) and required attributes.

  • SOD Policy: Checks for entitlement conflicts or conditions (SoD violations).

If a policy fails:

  • Provisioning may be blocked

  • An approval or remediation process may be triggered

6. Execution

The execution step in provisioning is where the planned access changes are applied to the target systems. This involves using various methods such as out-of-the-box connectors, IQService for on-premise systems, Web Service connectors through REST or SOAP APIs and custom scripts or rules. Execution may be:

Immediate: Actions are performed in real-time as soon as the plan reaches this stage.

Conditional: Execution waits for specific approvals, triggers, or business rules before proceeding.

Manual: Some actions may require administrators to perform them directly, especially in disconnected or legacy systems.

Execution status (success, failed, pending) is recorded and can be tracked via the UI or logs.

Post-Provisioning Steps

1. Account Aggregation

  • Re-collects the account from the target system to verify that changes are applied.

  • Helps reconcile state and keep the identity warehouse accurate.

2. Audit and Logging

  • All provisioning events are logged.

  • Includes who initiated the action, what was changed, when, and the outcome.

  • Logs are available for compliance, audits, and troubleshooting.

3. Notifications and Workflows

  • IdentityNow can send emails or trigger additional workflow steps, such as:

    • Notify a manager of successful account creation

    • Route to ServiceNow for approval/ticketing

    • Alert admin on provisioning failure