
Shared Signals Framework in SailPoint ISC
Date Posted:
24 Feb 2026
Category:
Security
Author:
Sandhiya

Shared Signals Framework in SailPoint ISC
Date Posted:
24 Feb 2026
Category:
Security
Author:
Sandhiya

Shared Signals Framework in SailPoint ISC
Date Posted:
24 Feb 2026
Category:
Security
Author:
Sandhiya
Introduction
SSF is a way for security tools to talk to each other in real time.
It allows SailPoint to receive and react to security signals coming from other security tools such as endpoint management, device compliance, or threat detection platforms.
Instead of waiting for scheduled scans or manual reviews, SailPoint act immediately when something risky happens.
In SailPoint Identity Security Cloud, SailPoint receives security signals from other tools. Based on the signal, SailPoint can:
Block access
Revoke permissions
Trigger workflows
Add extra approvals
Shared Signals in SailPoint ISC
CAEP events are real time security signals sent to SailPoint from external systems (like device or security platforms).
SailPoint uses these signals to re-evaluate user access continuously.
1. Signal Transmitter
External security systems. Example: Jamf, endpoint or security tools
Detect events such as:
Device Compliance Change - The user’s device becomes compliant or non-compliant
Risk Level Change - The risk score of a user or session changes
Token Claims Change - Information inside the access token (claims) has changed
These tools send security events (signals) to SailPoint
2. Stream
A stream is a logical event channel that carries security signals from an external system to SailPoint ISC.
3. Signal Receiver
SailPoint ISC acts as the SSF Receiver. It consumes these real time signals and correlates them with identity data
4. Automated Response
Based on the signal, SailPoint can:
Trigger workflows
Adjust access decisions
Revoke or limit access
Add additional approval steps
Enforce adaptive security controls
Setting up SSF in ISC
Go to Admin -> Connections -> Shared Signals-> Create New
Shared signals page lists all the connected streams and the event data received from transmitter.

In create new -> connection settings, Discovery URL is the base URL of the SSF transmitter (the external system) that SailPoint will contact to
Create a new stream

ISC Workflow for CAEP events
This workflow is triggered when an identity’s device is no longer compliant. The workflow disables the identity’s accounts in response to a potential threat.

The CEAP event trigger will initiate a workflow when a CAEP event is received.
Stay tuned to our blog to see more posts about
Sailpoint products implementation and its related updates.
Stay tuned to our blog to see more posts about
Sailpoint products implementation and its related updates.
Category:
Security
Stay tuned to our blog to see more posts about
Sailpoint products implementation and its related updates.
Stay tuned to our blog to see more posts about
Sailpoint products implementation and its related updates.
Category:
Category:
Security
Security
Get your
Tailored Quote for your
Organisation
Get your
Tailored Quote for your
Organisation
Introduction
SSF is a way for security tools to talk to each other in real time.
It allows SailPoint to receive and react to security signals coming from other security tools such as endpoint management, device compliance, or threat detection platforms.
Instead of waiting for scheduled scans or manual reviews, SailPoint act immediately when something risky happens.
In SailPoint Identity Security Cloud, SailPoint receives security signals from other tools. Based on the signal, SailPoint can:
Block access
Revoke permissions
Trigger workflows
Add extra approvals
Shared Signals in SailPoint ISC
CAEP events are real time security signals sent to SailPoint from external systems (like device or security platforms).
SailPoint uses these signals to re-evaluate user access continuously.
1. Signal Transmitter
External security systems. Example: Jamf, endpoint or security tools
Detect events such as:
Device Compliance Change - The user’s device becomes compliant or non-compliant
Risk Level Change - The risk score of a user or session changes
Token Claims Change - Information inside the access token (claims) has changed
These tools send security events (signals) to SailPoint
2. Stream
A stream is a logical event channel that carries security signals from an external system to SailPoint ISC.
3. Signal Receiver
SailPoint ISC acts as the SSF Receiver. It consumes these real time signals and correlates them with identity data
4. Automated Response
Based on the signal, SailPoint can:
Trigger workflows
Adjust access decisions
Revoke or limit access
Add additional approval steps
Enforce adaptive security controls
Setting up SSF in ISC
Go to Admin -> Connections -> Shared Signals-> Create New
Shared signals page lists all the connected streams and the event data received from transmitter.

In create new -> connection settings, Discovery URL is the base URL of the SSF transmitter (the external system) that SailPoint will contact to
Create a new stream

ISC Workflow for CAEP events
This workflow is triggered when an identity’s device is no longer compliant. The workflow disables the identity’s accounts in response to a potential threat.

The CEAP event trigger will initiate a workflow when a CAEP event is received.
