Applications and Identity Modeling Flashcards

1
Q

Schemas

A

Definition of what data to read from the application and how to interpret that data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Schema types: Account

A

Represents individual accounts on a target resource (Active Directory or SAP Accounts, for example)required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Schema types: Group

A
  • Represent native account groups from target resource (LDAP Groups or Active Directory
    Groups, for example)
  • Certain connectors support multiple group schemas (6.4)
  • JDBC, SQL Loader, Delimited File, and Oracle EBS
    optional
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four different correlation methods?

A
  • Correlation Wizard
  • Correlation Rule
  • Default Logic
  • Manually
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Correlation Wizard can use which two types of correlation

A
  • Attribute based
    Ex: Correlate account attribute mail with identity attribute email
  • Condition based Ex: Correlate accounts where app2_service = true with Admin cube
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Major thing to remember when using manual correlation.

A

Correlation permanently retained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do Correlation Rule do?

A

Build and maintain account correlations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do customization Rule do?

A

Modify/normalize incoming account data prior to saving to an Identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do Managed Entitlement Customization Rule do?

A

Set fields such as owner, requestable, or descriptions on ManagedAttributes (entitlements,
groups)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Aggregation and Correlation steps:

A
  1. Non-authoritative application contains accounts
  2. Application/Connector defines what to read, how to connect
  3. Aggregation task runs
  4. Connector reads accounts, tries to correlate to existing
    Identity Cubes
  5. Positive Correlation – add account to existing cube
  6. Unsuccessful Correlation – add account to new cube (mark
    as un-correlated)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Connector Rules:
What is Build Map Rule

A
  • Runs for every line in the file
  • Converts incoming data into map
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Connector Rules:
What is Preiterate Rule

A
  • Runs once for each aggregation
  • Can do any pre-processing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Connector Rules:
What is Postiterate Rule

A
  • Runs once for each aggregation
  • Can do any post-processing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Connector Rules:
Map To ResourceObject Rules:

A
  • Runs once for each account or group
  • Performs final conversion to Resource Object
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Connector Rules:
MergeMaps Rules:

A
  • Performs merging processing
  • If default merge capabilities aren’t enough, a rule here can control merging
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Within a schema, what are attribute properties

A

define how attributes are used and managed, including their data type, allowed values, and whether they can be multi-valued or indexed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Properties of Attributes
Entitlement

A

Marking an attribute as an entitlement indicates that this is an access right you want to track for your identities (for example, to use in certifications).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Properties of Attributes
Managed

A

Attributes designated as Managed can be viewed and managed from the Entitlement Catalog page. Managed attributes can be made requestable, can be assigned an owner (for approvals or entitlement certifications), and can have display names and descriptions that will help users identify and understand them. They can also be used in policies and risk calculations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Properties of Attributes
Multi-valued

A

For some attributes, multiple values might be returned during aggregation (for example, an attribute indicating group membership). These should be marked as Multi-valued. Values for attributes flagged as multi-valued are stored as a list. Even objects that have a single value for a multi-value attribute are stored as a single-item list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Properties of Attributes
Correlation Key

A

The Correlation Key flag is only used for activity and unstructured data aggregation. If activity aggregation is not being used, Correlation Key should not be selected. This flag specifies attributes that IdentityIQ can use to correlate activity discovered in the activity logs for this application with information stored in Identity Cubes. For information about correlating aggregated accounts to existing identities, see Correlation in Application Concepts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Properties of Attributes
Minable

A

Attributes that you want to use for role and profile creation should be marked as minable. This allows the Role Mining feature to mine applications for attributes and permissions when creating roles and profiles, rather than requiring manual entry of the values. Only attributes designated as minable are returned by those searches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Properties of Attributes
Remediation Modifiable

A

Attributes that are remediation modifiable can have their values and permissions modified as part of a certification, for the identity being certified. Options are:

Select – in the certification, display a select list of all possible values or permissions for this attribute.

Free text – in the certification, display a text field in which a certifier can enter any value.

Readonly – the value cannot be modified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the term for reading application data into IdentityIQ from external sources?

A

Aggregation

Aggregation is a key process in IdentityIQ for integrating external data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
True or False: A task can interact with a user and is typically activated in response to a user action or data change.
False ## Footnote Workflows are user-interactive while tasks handle batch processes.
26
True or False: Implementers can add their own custom business logic to IdentityIQ using rules.
True ## Footnote Rules allow for customization of business logic in IdentityIQ.
27
What are the main components required for installation?
Java Runtime, Application Server, IdentityIQ Software, Database Server, Other Components ## Footnote Other Components may include items like IQService for provisioning to Active Directory
28
Where does the IdentityIQ Software operate?
Inside the Application Server
29
What is the function of the Database Server in the installation?
Stores data for the IdentityIQ Software
30
Fill in the blank: _______ is required for provisioning to Active Directory.
IQService
31
True or False: The installation components are fixed and do not depend on implementation goals.
False
32
What may be included in the 'Other Components' based on implementation goals?
IQService or other specific tools needed for integration
33
What are the supported application servers?
* Tomcat * WebSphere * WebLogic * JBoss ## Footnote These are platforms that can host Java applications.
34
List the supported databases.
* MySQL * Oracle * MS SQL Server * DB2 ## Footnote These databases can be used in conjunction with the supported application servers.
35
What Java platforms are supported?
* Sun JDK * Oracle JDK * IBM JDK * Oracle JRockit JDK ## Footnote These are different implementations of the Java Development Kit.
36
What does SSB stand for?
Services Standard Build
37
What is the primary function of the Services Standard Build?
Automates packaging and deployment of custom objects and code
38
What is processed by batch hosts?
* Tasks/reports * Workflows * Certification generation * Etcetera ## Footnote Batch hosts are used for processing a variety of tasks that do not require immediate user interaction.
39
What is processed by UI hosts?
* Access Requests * Access Reviews (certifications) * Dynamic Analytics * Etcetera ## Footnote UI hosts are designed for tasks that involve user interaction and immediate responses.
40
Which hosts required the use of load balancer?
UI (User interface) hosts ## Footnote Load balancers help maintain performance and reliability by ensuring no single server becomes overwhelmed.
41
What is the role of a Request Scheduler?
Manages and prioritizes incoming requests to optimize processing ## Footnote Request schedulers help improve the efficiency of resource allocation.
42
What is extremely important for database deployment?
Network Proximity (latency) ## Footnote IIQ requires 3ms or less (0.3ms preferred) round-trip latency between its application server and its Database Server.
43
The critical network performance zone is between the user's browser and IdentityIQ. It requires a round trip latency of 3ms or less.
False. The connection between Application server and database needs to be less than 3ms.
44
The Services Standard Build (SSB) is a deployment process provided by SailPoint that is required when deploying IdentityIQ. True or false
False. It is not required.
45
What is the first step in the Identity Cube Creation Process?
Authoritative resource contains accounts
46
What role does the Application/Connector play in the Identity Cube Creation Process?
Defines schema and how to connect to resource
47
What does the Connector do in the Identity Cube Creation Process?
Reads accounts
48
What defines the creation of Identity Attributes?
Identity Mappings
49
When would you use Manager Correlation Rule?
When simple matching is not enough
50
Identity Mapping #1
Property name for the attribute
51
Identity Mapping #2
Display value can be a message key for localization support
52
Identity Mapping #5
Source of Attribute: application account attribute or RuleProperty name for the attribute
53
True or False: Authoritative Identity Cubes are created for each account read from all applications.
False
54
When an attribute is marked as 'searchable', what does this mean?
The attribute is stored in its own column for more efficient access for searching.
55
True or False: The terms Identity Attributes and Account Attributes refer to the same thing.
False ## Footnote Identity Attributes are in IIQ. Account Attribute are in source applications
56
Benefits of Rapid Setup
* Allows a broad team of people to participate in deployment * Supported by core product data structure * Framework for quick configuration of common scenarios | Available since in 8.1
57
Steps to fix uncorrelated account
* Identify uncorrelated accounts * Manually correlate an account to an Identity Cube * Remove empty Identity Cube
58
Purpose of connector rules
These rules are used to implement pre-processing of data, implement post-processing of data, and manipulate, merge, or otherwise transform the incoming data as it is being read. ## Footnote Connector rules vary by connector type.
59
**Connector Troubleshooting:** Check pass-through Authentication
connectorDebug auth
60
**Connector Troubleshooting:** Connection test
connectorDebug test
61
What is consistent across connectors
* Account and Group schema * Resource Object representation * Application-level rules
62
What varies across connectors?
* Group schema – one vs. multiple * Connectivity details * Connector-specific rules
63
How is an identity's manager determed?
You must: * Define which application attribute defines a user’s manager * Map the application attribute to the manager’s Identity Attribute ## Footnote Manager Correlation Rule will work as well