Access Modeling and Governance Flashcards

1
Q

What defines what a user can do and see in IdentityIQ

A

Capabilities and Scope (if configured)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is scoping?

A

The act of subdividing data into logical groups and granting access based on those subdivisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Workgroups are used for? (Two things)

A

Assigning access to IdentityIQ and Sharing of IdentityIQ responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: IdentityIQ does not support multi-factor authentication.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: A best practice is to assign ownership of objects, such as applications, to workgroups.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do Identity Cubes represent within IdentityIQ?

A

Users

Identity Cubes store all information regarding a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are Identity Cubes created?

A

By loading data from authoritative sources or from the UI

This process involves gathering user data to populate the Identity Cubes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do applications define in the context of IdentityIQ?

A

Target resources

Applications specify which resources are to be managed within IdentityIQ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of a Connector in IdentityIQ?

A

To specify how to connect to the resource

Connectors define the method of interaction with target resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do Schemas define in IdentityIQ?

A

The data to be read from the resource

Schemas outline the structure and types of data that can be accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What controls how and when data is read from the target resource?

A

Aggregation Tasks

These tasks manage the timing and methodology of data collection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do Identity Mappings control?

A

How Identity Attributes are ‘sourced’

Identity Mappings determine the origin of various user attributes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of Authentication in IdentityIQ?

A

To control who can log in

Authentication mechanisms ensure that only authorized users can access the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do Capabilities/Scoping and workgroups control within IdentityIQ?

A

Users’ access

These features manage permissions and access levels for users within the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Managed Entitlement Customization Rule?

A

A rule that allows the customization of fields such as owner, requestable, or descriptions on ManagedAttributes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

1

Runs when and does what?

A
  • Runs for every line in the file
  • Converts incoming data into map
17
Q

2

Runs when and does what?

A
  • Runs once for each aggregation
  • Can do any pre-processing
18
Q

4

Runs when and does what?

A
  • Runs once for each account or group
  • Performs final conversion to Resource Object
19
Q

What are the benefits of using roles instead of logical applications?

A

*Roles scale significantly better than logical applications
* Roles have an extended set of features not available to logical applications
* Roles leverage existing connector pathways

This highlights the advantages of roles in managing applications.

20
Q

Define the Challenge Period.

A

A timeframe where challenges to decisions or actions can be made.

This period allows for objections or disputes.

21
Q

What is the Revocation Period?

A

When access is removed from denials. Can be automatic or manual

This allows for reconsideration of prior decisions.

22
Q

What is Certification in this context?

A

The process of officially validating or confirming a status.

Certification often involves meeting certain criteria or standards.

23
Q

What is #1

A

Staging
(optional)

https://documentation.sailpoint.com/identityiq/help/certification/phases_of_a_certificatio.html

24
Q

What is #3

A

Challenge
(optional)

https://documentation.sailpoint.com/identityiq/help/certification/phases_of_a_certificatio.html

25
Detect a user with (or who will have) conflicting access. Is an example of what policy voilation/check.
Separation of duties
26
How are policy violations found
Refresh identity with "Check active policies" selected.
27
What is a way of sharing the decision-making of access reviews within IdentityIQ?
Delegation ## Footnote This method includes options like delegation, reassignment, and forwarding.
28
True or False: It is only possible to monitor information about a certification such as decision statistics and current completion status of individual access reviews after the certification has been fully completed.
False
29
True or False: The Perform Maintenance task must run for the certification process to complete.
True
30
What is two reasons for using roles?
Efficiency Control ## Footnote Roles streamline processes and improve organizational effectiveness.
31
Roles help to encapsulate sets of _______.
entitlements ## Footnote Entitlements refer to the permissions granted to users.
32
How do roles simplify the access review process?
By providing a structured way to evaluate permissions ## Footnote This reduces complexity in auditing user access.
33
What is one benefit of using roles in the access request process?
Ease access request process ## Footnote Roles can streamline how users request access to resources.
34
What are Required roles in IT?
Required roles refer to the set of access that someone with a given role must have.