Sailpoint IdentityNOW
Sailpoint IdentityNOW
Sailpoint IdentityNOW
One Solution, Endless Possibilities – Discover SailPoint IdentityNow
One Solution, Endless Possibilities – Discover SailPoint IdentityNow
Our pioneering SaaS identity governance solution, IdentityNow, stands as the industry's premier choice. It simplifies the administration of user access across all applications and systems, elevating audit responsiveness and operational effectiveness. Our robust platform ensures secure user provisioning, access requests, and password management across cloud, mobile, and on-premises applications, setting a new standard in identity management solutions.
Our pioneering SaaS identity governance solution, IdentityNow, stands as the industry's premier choice. It simplifies the administration of user access across all applications and systems, elevating audit responsiveness and operational effectiveness. Our robust platform ensures secure user provisioning, access requests, and password management across cloud, mobile, and on-premises applications, setting a new standard in identity management solutions.


Separation of Duties
Separation of Duties
A Separation of Duties (SoD) policy is a control mechanism used to define and enforce rules that prevent or detect conflicting entitlements or roles assigned to a single identity. The policy ensures that no user can perform multiple conflicting actions that could lead to security risks, fraud, or policy violations. SoD policies are used to track violations and prevent some violations before they occur. Separation of Duties are used to reduce risk by making sure no single person has too much control. Detective SoD finds existing access issues, while Preventative SoD warns about possible issues before they happen. SoD policies are created by defining two sets of conflicting access, and violations happen when a user has access from both sets. Users and reviewers are notified about these violations during access requests. SoD reports can also be sent automatically through subscriptions to keep track of risks regularly.
A Separation of Duties (SoD) policy is a control mechanism used to define and enforce rules that prevent or detect conflicting entitlements or roles assigned to a single identity. The policy ensures that no user can perform multiple conflicting actions that could lead to security risks, fraud, or policy violations. SoD policies are used to track violations and prevent some violations before they occur. Separation of Duties are used to reduce risk by making sure no single person has too much control. Detective SoD finds existing access issues, while Preventative SoD warns about possible issues before they happen. SoD policies are created by defining two sets of conflicting access, and violations happen when a user has access from both sets. Users and reviewers are notified about these violations during access requests. SoD reports can also be sent automatically through subscriptions to keep track of risks regularly.
Separation of Duties
A Separation of Duties (SoD) policy is a control mechanism used to define and enforce rules that prevent or detect conflicting entitlements or roles assigned to a single identity. The policy ensures that no user can perform multiple conflicting actions that could lead to security risks, fraud, or policy violations. SoD policies are used to track violations and prevent some violations before they occur. Separation of Duties are used to reduce risk by making sure no single person has too much control. Detective SoD finds existing access issues, while Preventative SoD warns about possible issues before they happen. SoD policies are created by defining two sets of conflicting access, and violations happen when a user has access from both sets. Users and reviewers are notified about these violations during access requests. SoD reports can also be sent automatically through subscriptions to keep track of risks regularly.
Separation of Duties (SoD) helps to
Separation of Duties (SoD) helps to
Separation of Duties (SoD) helps to


Provide an internal control to mitigate risk
Provide an internal control to mitigate risk
Provide an internal control to mitigate risk
SoD ensures no single person has too much control, reducing the chances of errors or fraud
SoD ensures no single person has too much control, reducing the chances of errors or fraud
Gain visibility into where risk occurs
Gain visibility into where risk occurs
Gain visibility into where risk occurs
It helps us see which access permissions or combinations are most vulnerable, giving you better insight into where risks exist
It helps us see which access permissions or combinations are most vulnerable, giving you better insight into where risks exist
Be aware of violations but allow exceptions
Be aware of violations but allow exceptions
Be aware of violations but allow exceptions
SoD alerts us to violations but allows flexibility by letting us decide which issues need immediate action and which can be permitted when necessary.
SoD alerts us to violations but allows flexibility by letting us decide which issues need immediate action and which can be permitted when necessary.

Detective and Preventive SoD
Detective and Preventive SoD
Detective – Identify the existing conflicts in the organization
Preventative – Flag potential conflicts during access requests
Detective – Identify the existing conflicts in the organization
Preventative – Flag potential conflicts during access requests
Detective Separation of Duties
Detective SoD allows to detect policy violations that have occurred in your organization. It will identify and display violations for existing users who had conflicting access before the implementation of the SoD policy. This ensures visibility into pre-existing access conflicts, enabling organizations to address them effectively and align with the newly established controls.We can check violations from view violations for each policy or download violation reports.
Detective Separation of Duties
Detective SoD allows to detect policy violations that have occurred in your organization. It will identify and display violations for existing users who had conflicting access before the implementation of the SoD policy. This ensures visibility into pre-existing access conflicts, enabling organizations to address them effectively and align with the newly established controls.We can check violations from view violations for each policy or download violation reports.
Preventative Separation of Duties
Preventative Separation of Duties
Detective and Preventive SoD
Detective – Identify the existing conflicts in the organization
Preventative – Flag potential conflicts during access requests
Detective Separation of Duties
Detective SoD allows to detect policy violations that have occurred in your organization. It will identify and display violations for existing users who had conflicting access before the implementation of the SoD policy. This ensures visibility into pre-existing access conflicts, enabling organizations to address them effectively and align with the newly established controls.We can check violations from view violations for each policy or download violation reports.
Preventative Separation of Duties
Creation & Subscription
Creation & Subscription
Creation & Subscription
SoD policy Creation
SoD policy Creation
SoD policy Creation
To create SoD policy, we need to create two lists of access. A violation will be triggered if an identity has access found in both lists.
To create SoD policy, we need to create two lists of access. A violation will be triggered if an identity has access found in both lists.
Subscription
Subscription
Subscription
We can subscribe SoD policy and send violation report to recipients for scheduled time. By default, Violation Owner will be added to the list.
We can subscribe SoD policy and send violation report to recipients for scheduled time. By default, Violation Owner will be added to the list.



HARBOR PILOT – SailPoint’s First Digital Agent
HARBOR PILOT – SailPoint’s First Digital Agent
HARBOR PILOT – SailPoint’s First Digital Agent
Harbor Pilot is an agentic AI that acts as a virtual coworker available in Identity Security Cloud. It assists with the requests related to workflows, identity data exploration and documentation searches. This AI assistant uses Natural Language Processing (NLP), so it understands user’s query written in plain text and provides accurate results. Currently, it supports only the English language.
Harbor Pilot is an agentic AI that acts as a virtual coworker available in Identity Security Cloud. It assists with the requests related to workflows, identity data exploration and documentation searches. This AI assistant uses Natural Language Processing (NLP), so it understands user’s query written in plain text and provides accurate results. Currently, it supports only the English language.
Harbor Pilot is an agentic AI that acts as a virtual coworker available in Identity Security Cloud. It assists with the requests related to workflows, identity data exploration and documentation searches. This AI assistant uses Natural Language Processing (NLP), so it understands user’s query written in plain text and provides accurate results. Currently, it supports only the English language.
Sailpoint Identity Security Cloud Launcher
Sailpoint Identity Security Cloud Launcher
Sailpoint Identity Security Cloud Launcher
Launcher
In SailPoint Identity Security Cloud, Launchers are workflows made available for users to manually execute. Launchpad is the user interface that displays these Launchers, allowing users to launch workflows themselves. Launchers can be configured with or without interactive forms. Forms are used to collect input from the user before starting the workflow. The user’s input is then passed into the workflow and used during its execution.
Use cases
Manual initiation of workflows instead of triggers
Workflows involving Privileged Task Automation (PTA)
Workflows that require user input
Emergency situations where workflows need to be manually triggered
To Create a Launcher in Identity Security Cloud (ISC)
To Create a Launcher in Identity Security Cloud (ISC)
To Create a Launcher in Identity Security Cloud (ISC)
A corresponding entitlement
This is automatically created with the Launcher and must be made requestable and assigned to users for it to appear in the Launchpad
The Launchpad UI
This is where users see their available Launchers, initiate workflows, and view the status including past and in-progress executions
Steps to create a Launcher
Steps to create a Launcher
Steps to create a Launcher
Step-1
Step-2
Step-3
Step-4
Go to Admin → Access Model → Launchers, click New Launcher, and attach the workflow (must include an Interactive Trigger). Alternatively, in the workflow, add an Interactive Trigger and click Create Launcher. ISC automatically creates a corresponding entitlement.

Step-1
Step-2
Step-3
Step-4
Go to Admin → Access Model → Launchers, click New Launcher, and attach the workflow (must include an Interactive Trigger). Alternatively, in the workflow, add an Interactive Trigger and click Create Launcher. ISC automatically creates a corresponding entitlement.

Step-1
Step-2
Step-3
Step-4
Go to Admin → Access Model → Launchers, click New Launcher, and attach the workflow (must include an Interactive Trigger). Alternatively, in the workflow, add an Interactive Trigger and click Create Launcher. ISC automatically creates a corresponding entitlement.

BENEFITS
Future-Proof Your Identity Governance: SailPoint IdentityNow for Modern Businesses
Future-Proof Your Identity Governance: SailPoint IdentityNow for Modern Businesses
Future-Proof Your Identity Governance: SailPoint IdentityNow for Modern Businesses
Streamlined User Access
It simplifies and automates the process of granting and managing user access, making it easier for employees to get the access they need quickly and efficiently.
Streamlined User Access
It simplifies and automates the process of granting and managing user access, making it easier for employees to get the access they need quickly and efficiently.
Streamlined User Access
It simplifies and automates the process of granting and managing user access, making it easier for employees to get the access they need quickly and efficiently.
User-Friendly Interface
The platform features an intuitive interface that simplifies identity management tasks, making it easier for IT administrators and end-users to navigate and use.
User-Friendly Interface
The platform features an intuitive interface that simplifies identity management tasks, making it easier for IT administrators and end-users to navigate and use.
User-Friendly Interface
The platform features an intuitive interface that simplifies identity management tasks, making it easier for IT administrators and end-users to navigate and use.
Cloud Integration
As a cloud-based solution, SailPoint IdentityNow integrates seamlessly with various cloud services and applications, providing a unified approach to identity management across the entire IT ecosystem.
Cloud Integration
As a cloud-based solution, SailPoint IdentityNow integrates seamlessly with various cloud services and applications, providing a unified approach to identity management across the entire IT ecosystem.
Cloud Integration
As a cloud-based solution, SailPoint IdentityNow integrates seamlessly with various cloud services and applications, providing a unified approach to identity management across the entire IT ecosystem.
One Solution, Endless Possibilities – Discover SailPoint IdentityNow
Our pioneering SaaS identity governance solution, IdentityNow, stands as the industry's premier choice. It simplifies the administration of user access across all applications and systems, elevating audit responsiveness and operational effectiveness. Our robust platform ensures secure user provisioning, access requests, and password management across cloud, mobile, and on-premises applications, setting a new standard in identity management solutions.


