Self-Assessment 8.2 Flashcards
Which is NOT a valid method for creating Identity Cubes?
A. Bulk import
B. LCM Create Identity
C. By running aggregation tasks to read user accounts from applications that are systems of record
D. Through the Identity Warehouse
D. Through the Identity Warehouse
What is the Identity Warehouse Page?
The Identities table contains basic user information for every identity discovered during the latest aggregation process. Identities can include non-human identities, such as service accounts and bot identities, as well as users.
What is the LCM Create Identity?
Some implementations have the requirement to create new Identities directly in IdentityIQ. One way to create them is by using the Create Identity Quicklink. You can use this Quicklink without a provisioning policy, or you can define a policy that will help your end users define the choices that are made when creating Identities in the system
When you add extended attributes that are not marked searchable to IdentityIQ, where are these new attributes stored by default?
A. In the application server
B. In a CLOB
C. The WEB-INF directory
D. Their own column in the database
B. In a CLOB
What is CLOB?
(Character Large Object): This is a database data type designed to store large amounts of text data, up to 4 gigabytes in size.
What important files are stored under the /WEB-INF directory?
-
Function: A special subdirectory within a web application that’s not directly accessible through a web browser.
- Purpose: Houses sensitive configuration files, Java class files, and libraries that are crucial for the application’s internal workings.
-
Key Contents: School (Classes ,libraries, web)
- classes: Contains compiled Java class files that implement the application’s core logic.
- lib: Stores JAR files (libraries) that the application depends on for additional functionality.
- web.xml: The central configuration file for the web application, defining servlet mappings, security settings, and other parameters.
What important files are stored under the /identityiq:** directory?
-
Function: containing the deployed SailPoint IdentityIQ web application.
-
Contents: Holds the various files and resources that make up the IdentityIQ application, including:
JWCS- Webpages (HTML, JSP, etc.)
- Java servlets
- Configuration files
- Static assets (images, CSS, JavaScript)
-
Contents: Holds the various files and resources that make up the IdentityIQ application, including:
What important files are stored under the /webapps:** directory?
-
Function: A standard subdirectory within Tomcat that houses deployed web applications.
- Structure: Each web application is typically contained within its own individual directory, like “identityiq” in this case.
What important files are stored under the /tomcat:** directory?
-
Function: Denotes the root directory of the Apache Tomcat installation, a popular open-source web server and servlet container.
- Role: Tomcat is responsible for receiving and processing web requests, executing Java servlets and JSPs, and serving dynamic web content.
- Key Files: Contains essential configuration files like server.xml, web.xml, and context.xml, along with logs and temporary files.
What does the “-clean” option do when exporting Objects?
A. It creates an empty object of the type being exported.
B. It removes the GUID and creation/modification dates from the Object being exported.
C. It removes the Object completely from the existing IdentityIQ database in preparation for loading it into the next database.
D. It deletes all passwords from the exported object.
B. It removes the GUID and creation/modification dates from the Object being exported.
Command to Export all applications from IdentityIQ to a file on the Desktop called apps.xml. With clean option.
export -clean /home/spadmin/Desktop/apps.xml application
A provisioning plan is passed to a workflow to start the provisioning process. What is included in a provisioning plan?
A. One or more requests for multiple identities.
B. One request for multiple identity.
C. One or more requests for one identity.
D. A set of provisioning policies.
C. One or more requests for one identity.
You have to use a separate provisioning plan for each identity.
True or False?
True
Rapid Setup Joiner configuration defines the operations that are launched when a user joins a new group within your organization, such as department transfer.
True or False?
False - This is a mover
Which of these options defines how the account attributes within a provisioning plan are populated?
A. Build Map Rule
B. Provisioning polices
C. Policy definitions
D. Application schemas
B. Provisioning polices
What do provisioning polices in an application configuration do?
Defines the set of attributes that are needed to complete a provisioning request, whether that request is to create an account, modify an account, add a role to an identity, etc.
You can use the Edit Identity Quicklink to modify an identity’s attributes and trigger attributes synchronization to other applications.
True or False
True
This only true for attributes that are set to “editable”. Otherwise, you won’t have the option to change it. (Greyed out)
If an attribute is set to temporary and you change it in IdentityIQ. What happens the next time if the source has a different value, then what is in IdentityIQ?
It will be overwritten be whatever value is listed in the source application.
If provisioning policy has not been defined. What settings are used and where are they defined?
If a provisioning policy has not been defined, the fields default to what is defined in the Identity Configuration Object, which can be viewed or edited in the Debug pages.
In the standard IdentityIQ access request workflow (LCM Provisioning), the default approver is the owner.
True or False.
True
When implementing policies, a best practice is to set the _____________ option to preview what impact they will have on the system.
A. Inactive State
B. Simulate
C. Check active policies
D. Capabilities
C. Check active policies
Check active policies options:
Keep previous violations
keeps all existing violations, even if they are found to be resolved or do not match any active policy.
Check active policies options:
A comma separated list of policy names
Entering a list of policies in this field means the task will check only the listed policies that are active;
blank means check all active policiesInactive policies are not checked
When a serious system error occurs, and an incident code is displayed, where would an admin user go to see details of the error?
A. My Work –> Work Items
B. Setup –> Lifecycle Events
C. Java Standard Out Log
D. Intelligence –> Advanced Analytics –> Syslog Search
D. Intelligence –> Advanced Analytics –> Syslog Search