Stay up to date on our latest software release updates.
At SailPoint we’re committed to innovation. From product improvements to breakthrough technologies, this page will highlight our IdentityIQ and File Access Manager release updates, as well as provide a preview of some of the great new features our team is currently working on.
Forward Looking Statement
The development, release, and timing of any features or functionality described for our products that are not currently available remains at our sole discretion on a when, and if available, basis and may not be delivered at all and should not be relied on in making a purchasing decision.
Please try again.
Activity Data Persistence
AWS S3 Connector Federated Accounts Support
Azure File Connector
Business Website Custom IIS Settings
Data Classification Enhancements
DSAR Campaign Workflows
Google Workspace G-Drive Shared Drive Support
Microsoft Teams Integration
Role Recommendations for Approvals and Certifications
Unattended Collectors Installation
.NET Core Migration
« Classification Category » Filter in the Permission API Endpoint
Add Usage Statistics to the Permissions API
Administrative Capabilities to the Business Website
Administrative Power-User Password Complexity Improvements
Application Configuration & Management Web Migration
A newly created Application Configuration Wizard and Management Screen has been migrated to the File Access Manager Business Website. Enjoy streamlined design and UX, a guided user journey through wizard hints, tagging and filtering capabilities, and delegate access with the improved RBAC.
The ability to create and manage applications, or perform operations on resources, can now be delegated to other users and Admins. They do not have to install the Legacy Client Application except for specific use cases.
The Application Configuration experience has been aligned with the new design of the Business website for easier administration and navigation between applications.
Automated Role Discovery and Creation
AWS S3 Bucket Connector
Extend your governance controls and processes to your Cloud Storage and AWS tenants, and remain secure through digital transformation efforts. Leverage File Access Manager’s Permissions Analysis, Access Reviews capabilities to resources and files stored on AWS S3 Buckets, and attain a comprehensive governance posture and greater visibility into access to data on S3 buckets throughout the organization.
Analyze access rights for AWS IAM Identities across multiple Regions, Organizational Units and External and Internal Accounts. Review granular access governance controls down to the file level. Users can also gain insight into Organization and Bucket-level Access Policies, Public Bucket Permissions and fine-grained ACL-based access rights for individual identities.
Business Website Single-Sign-On (SSO) Integration
Integrate File Access Manager with the Identity Provider of your choice with new support for all SAML-based SSO Services, in addition to the standard Windows Authentication.
Enjoy a smooth logging experience and seamless support for distributed and hybrid environments.
Common Criteria Certification
After a rigorous evaluation process, File Access Manager received its official Common-Criteria Certification. Common Criteria is now the most widely accepted product security certification standard, required by governments and enterprises around the world to protect their mission-critical infrastructure and products. It is also required by the US Federal Government.
It ensures that the right security measures were taken into consideration and that rigorous processes and validations are taking place during:
- The product’s development process
- Its architectural design
- Devising its deployment and delivery methodologies
This certification marks that File Access Manager complies with the highest industry standards in terms of:
- Product development life-cycle management
- And deployment and delivery standards
Enhanced Lifecycle Management of Privileged Access
Hierarchical Resource Scope for Sensitive Data and Permissions Analysis Report Templates
Isilon Multiple Access Zone Support & Tenant Isolation
File Access Manager now offers Tenant Isolation and Full Capabilities for Multiple Access-Zones on Isilon Clusters.
With the addition of Activity Monitoring and Permission Collection capabilities for Multiple Access-Zones within an Isilon Cluster and removing the dependency on the Administrative (System)-Zone-based OneFS API, each Access Zone within the cluster functions as an independent Isilon Application within File Access Manager.
This enhancement marks the transition in approach from a Cluster-Oriented to a Zone-Oriented configuration. The new configuration will allow users to easily configure applications per Access Zone settings, now allowing for multiple Access Zones on the same cluster to be created with ease.
Protect your mission-critical Linux servers, and ensure the integrity and continuous availability of the resources and unstructured data they rely on. File Access Manager’s new Linux Connector analyzes access rights, performs Access Requests and Certifications, and identifies and classifies sensitive information on your Linux systems, of all major distributions.
Through a single centralized view, this feature provides organizations with a comprehensive picture of effective data access privileges granted to users, accounts and groups from NIS and LDAP (AD) identity stores, as well as local accounts and identities.
File Access Manager’s approach will allow IGA admins and data owners to enforce governance controls, identify sensitive information, excessive privileges and overly-privileged accounts, detect overexposed or jeopardized resources, and assess risk. Then, preventive and mitigative actions can be taken to protect mission critical processes and resources.
OAuth-based Modern Authentication for O365 Connectors
Enjoy easier configuration and onboarding, improved performance, and increased security with your Cloud Applications!
- OAuth-Based Modern Authentication is now available for SharePoint Online, Exchange Online, and the Azure AD Identity Collector and OneDrive.
- File Access Manager supports Modern Authentication methods for all O365, and all cloud endpoints in our Connectivity Portfolio.
- Legacy Authentication, which Microsoft is gradually aging out is no longer required.
With no credentials shared or stored, the risk of jeopardizing service accounts is reduced. You can impose Security Policies, such as Multi-Factor Authentication and Credentials Cycling, on service accounts with no additional effort just as you would for all other accounts. As part of this change, we also added support for multiple authenticated accounts to improve performance and avoid throttling quotas.
Resource Scoping and Ownership Filtering in the Stale Data Reports
Self-service Password Reset Improvements
Support Business Justifications for Access Requests and Approvals
System Usage Report
Top Level Requestable Resource Labeling
User Scope Change Management & Default Capability
The new User Scope Import capabilities allow change management and cumulative imports of resource scopes for business users, as well as a streamlined ownership assignment process, allowing you to assign Data Ownership Capabilities. This can be done by leveraging Manage Business Users visibility over time, simplifying users onboarding within the organization, and expediting deployment and adoption efforts.
For a quicker more intuitive onboarding, the default scope for the Auditor and Compliance Manager Capabilities have been adjusted to manage all resources by default.
Access Management Enhancement
A new Quicklink configuration setting (« What can members remove? ») gives you flexibility and control over what users can view and remove on the Remove Access tab, when managing user access.