EXPERIENCE WITH OTHER IDM TOOLS Flashcards
How would you compare your experiences working with Oracle IDM, ForgeRock, and SAILPOINT IDENTITY IQ?
I’ve had a pretty interesting journey working with Oracle IDM, ForgeRock, and SAILPOINT IDENTITY IQ, and each one has really brought something different to the table when it comes to identity management.
● So, take Oracle IDM for instance. If you’re already familiar with Oracle and use a lot of their products, it’s a fantastic option. It’s really a powerhouse with a great range of features and it works smoothly with other Oracle Products.
● Then you’ve got ForgeRock. Now, what I love about ForgeRock is just how adaptable it is. If you’re dealing with consumer identity management, this is your go to. It can really grow with your business needs and offers so much flexibility, which I think is super important in today’s dynamic business environment.
● And then there’s SailPoint. This is a solution I’ve spent a good amount of time with, and let me tell you, it’s something else. The way SailPoint’s IdentityIQ platform manages to blend compliance ontrols, access certifications, and user provisioning all into one neat package is something that’s really made a difference in complex enterprise environments. It really stands out in the identity and access management (IAM) field with its unique approach.
Have you worked on any other IDM tools?
Besides my hands-on experience with SailPoint, I’ve gotten my feet wet with Oracle IDM, I am also familiar with ForgeRock.
● With Oracle IDM, I was heavily involved with it in a “XYZ” project. My duties there weren’t just limited to the basics like creating and managing user accounts or provisioning resources. It went deeper than that. I set up workflows for automated approval processes, dabbled in security by managing access control and privileges… you name it. But what I especially loved about it was Oracle IDM’s comprehensive auditing and reporting features. I used them a lot to
make sure all access and activities were up to par with our security protocols. Helped me sleep better at night, knowing everything was secure.
● Now, talking about ForgeRock, that’s another interesting chapter. It was during another “XYZ project” when I really dug into ForgeRock’s wide range of tools for digital identity management. Again, my work wasn’t just about administering end-user identities and managing access privileges. I got to set up single sign on (SSO) capabilities, configure multi factor authentication to beef up our security.
Have you migrated from Oracle IDM to SP IIQ?
So, I had this experience on my “XYZ project” where I migrated from Oracle IDM to SailPoint IIQ. I’ll tell you, it was quite a journey, but very rewarding in the end.
● First things first, we got to understand the current Oracle IDM setup from A to Z. We’re talking user roles, groups, access rules, workflows all the bits and pieces that make the system work.
● Once we’ve got that down, it’s time to play matchmaker. We need to figure out what in Oracle IDM corresponds to what in SailPoint IIQ.
● Now, the real work begins moving day! We’ve got to pack up all our user data, roles, groups, and permissions, and move them from Oracle IDM over to their new home in SailPoint IIQ. This involved a lot of scripting and using ETL tools to make sure everything was in a format that SailPoint IIQ could understand.
● We also had to think about all the connections that Oracle IDM had with other systems in our environment. SailPoint IIQ has a lot of ready to use (out of the box) connectors, but it’s also flexible enough to let us build custom integrations which we’ve done quite a bit.
● Next, we went into test mode. We had to check that all our migrated data and integrations were working properly in SailPoint IIQ.
● And of course, there’s always that learning curve when you introduce a new system. We had to ensure our end users and admins were trained up on how to navigate and use SailPoint IIQ.
● When we felt ready, we started the rollout. Given the size of our organization, we didn’t want to dive in headfirst. So, we started off with a pilot group, testing the waters before going for a full-blown launch.
● And finally, after the migration was complete, we shifted into a support and monitoring mode. We had to keep an eye on the system, provide user support, and tweak things based on the feedback we got. Monitoring and support were the final pieces of the puzzle that ensured a successful migration.
What were the key factors you had to consider during the migration process?
The key factors we had to consider during the migration process included:
● Downtime Minimization: Ensuring that the migration process caused the least amount of disruption to business operations was a critical factor. Planning the migration during nonpeak hours or times of low system use can help achieve this.
● Data Integrity: The preservation a nd accuracy of data during migration was a top priority. We performed several data integrity checks before, during, and after the migration to ensure no data
was lost, corrupted, or altered inappropriately.
● Security: Ensuring the security of data during transit and at the new location was vital. We used encrypted protocols for data transfer and established robust security measures (like firewalls, intrusion detection systems) at the new location.
How did you perform the Data Integrity for migration?
Pre-Migration check:
● Istarted off by creating a nifty inventory of all the existing data we have. I’m talking about users, roles, entitlements, application definitions, and all those other components that SailPoint takes
care of.
● On top of that, I took a deep dive to validate our current data. I’ve been on the hunt for anything odd or out of place, anything that could potentially throw a wrench in our migration plans. We’re talking about things like wonky role definitions, users who somehow have
multiple accounts, or entitlements that aren’t tied to any roles or users.
● I’ve been making good use of the reporting and auditing tools within SailPoint to generate this data. This detailed pre migration check will act as our yardstick to measure the post migration
results and to make sure we don’t lose any data in the process.
Backing up the data:
● Before we got the migration ball rolling, I made sure to have a complete, UpToDate backup of all our data. Consider this our insurance policy in case anything goes sideways during the migration.
What is the difference between IDP (OKTA, AD, LDAP) and IDM/IGA (SAILPOINT IDENTITY IQ)?
IDP provides and verifies user identities, while an IDM solution manages what those identities are allowed to do once authenticated. They work together as part of a complete identity and access management strategy
Can you elaborate on how these technologies work together?
IDP or Identity Providers like OKTA, Active Directory (AD), and LDAP provide user authentication services. They confirm a user’s identity and provide them with access tokens. IDM or Identity Management like SAILPOINT IDENTITY IQ goes a step further by managing the entire lifecycle of digital identities. It includes provisioning and deprovisioning of user access, role management, access reviews, and compliance reporting. The IDM and IDP work in conjunction. The IDM uses the IDP for authentication while it manages the access rights.
When OKTA is used as SSO on SAILPOINT IDENTITY IQ what is IDP on OKTA?
When OKTA is used as Single Sign On (SSO) on SAILPOINT IDENTITY IQ, the Identity Provider (IDP) on OKTA is typically Active Directory (AD). An Identity Provider refers to a system entity that creates, maintains, and manages identity information for principals while providing authentication services to relying on applications within a federation or distributed network. However, as far as I know,
Okta is quite versatile and can use various other systems as IDPs, depending on the specific configurations and needs of the organization. I think, while Active Directory may be used as the IDP in
many cases, it is not the only possible IDP for Okta.
Can you describe any challenges faced when integrating OKTA as an SSO with SAILPOINT IDENTITY IQ, and how did you overcome them?
In our “XYZ project’ we used Okta as Single Sign On (SSO) on SAILPOINT IDENTITY IQ, and the Active Directory was used as IDP on Okta. AD authenticated the user identities, and these were then
federated to Okta, which in turn provides SSO services for SAILPOINT IDENTITY IQ. The challenges in this setup arose from misconfiguration of SSO settings and AD connection.
We had to configure Okta with SAILPOINT IDENTITY IQ and ensure that the AD identity provider is correctly set up. We found that Users may not be synced correctly, causing access issues and we manually reconciled accounts to ensure each user has the appropriate access. Also, by systematic troubleshooting and examining log files we also found that when configuring SSO, user roles and permissions were not mapped correctly between systems, and we carefully planned how roles in our identity provider map to roles in SAILPOINT IDENTITY IQ.
Have you worked with MS Entra, and how?
Yes, I was part of the POC project, where we tried to implement MS Entra ID as the IAM service, but MS Entra ID is a cloud-based IAM service primarily focused on providing identity and access
management for Microsoft-centric environments, while SailPoint IdentityIQ is a comprehensive IAM platform suitable for managing identities, access, and governance across diverse IT ecosystems,
including both Microsoft and non-Microsoft technologies. Our company decided to stick with the SailPointIIQ as the IAM platform.
Have you integrated MS Entra ID (Azure AD) with SailPoint?
Yes, I have integrated MS Entra ID (Azure AD) and SailPoint IIQ and I’ve done the following:
- User Provisioning and Synchronization:
- I’ve configured SailPoint IIQ to synchronize user accounts, groups, and attributes from MS Entra ID. This ensures that user information remains consistent across both platforms.
- Changes made in MS Entra ID, such as user additions, updates, or deletions, can trigger corresponding actions in SailPoint IIQ to keep identity data up-to-date.
- Role and Entitlement Management:
- SailPoint IIQ provided advanced role and entitlement management functionality, allowing organizations to define and manage roles, entitlements, and permissions across their IT landscape.
- MS Entra ID’s group-based access control can be synchronized with SailPoint IIQ to facilitate role assignments and entitlement provisioning based on users’ group memberships in MS Entra ID.