Please try again.
Access Model Snapshot
Access Model Snapshots will provide users with a clear visualization of their overall access model. These snapshots can be used to verify accuracy in the access model and review trends.
Display Correlated Identities for Cloud Resource Users
Show detailed identity information, from IdentityNow, within Cloud Access Management for all cloud resource users.
Export Access History Event Timeline
Administrators can export the “identity event” timeline data from Access History to support audit and compliance needs.
IDP Support for PingFederate
Cloud Access Management will provide full visibility of all federated cloud access via PingFederate.
Public APIs to Manage Cloud Sources
New public-facing APIs to support automated creation and updates for cloud sources.
Recommendations for Access Profiles and Roles within Access Request Approvals
Accelerate access request approvals by leveraging peer group analysis and machine learning to proactively recommend appropriate access profiles and roles for employees.
Recommendations for Entitlements within Access Request
By leveraging AI and machine learning, the Recommendations Engine helps simplify the access request process by proactively recommending fine-grain entitlements for employees within the Request Center.
Any roles that are identified as identical, or near-identical, across the access model are consolidated into a single role. This makes roles easier to find and eliminates duplicative items.
Support for Microsoft PIM
This enhancement will enable the discovery and display of cloud access defined within Microsoft Privileged Identity Manager (PIM).
Team Recommendations within Access Request
By leveraging AI and machine learning, the Recommendations Engine helps ensure uniform access of team members by proactively recommending access to managers for their direct reports within the Request Center.
An updated UI will provide easier navigation, greater visibility, and additional insights. Along with a refresh of existing widgets, there will be new widgets for guardrails and high risk users.
Access Modeling for Cloud Entitlements
Utilizing artificial intelligence and machine learning, Cloud Access Manager will analyze existing cloud access, in order to reduce role and policy proliferation, by discovering overlapping and duplicate access and providing suggested remediation actions.
Cloud Access Certifications
Certify cloud access for AWS, Azure, and GCP within IdentityNow or IdentityIQ.
Create Common Access Roles
Identity and Role administrators can easily create common access, or “joiner”, roles through the role discovery process.
Enhanced Business Intelligence
New data reporting and visualization capabilities will provide customizable charts and graphs with IdentityNow’s standard out-of-the-box reports.
Event Notifications in Slack and MS Teams
Ability to receive event notifications for Joiner, Mover, and Leaver events directly within Slack and MS Teams.
Event-driven Attribute Promotion
An enhancement to the process that promotes attributes from an account to its correlated identity. Currently this process is batch-driven and runs on a schedule. With this update, promotion will now move to an event-driven process which runs on targeted accounts as changes are detected.
Governance Groups in Certifications
Customers will be able to assign a group of people to review Certifications (vs a single reviewer), making Certifications easier and faster to review while ensuring only the appropriate decision makers are still the people determining access for their organization.
Identity Outlier Detection
Highlight identity anomalies and suggest remediation options based on how access is currently distributed across the enterprise.
New Request Center Experience
We’re making self-service Access Requests even easier by centralizing search across all requestable item types (applications, roles, and entitlements). We’re also updating the request flow to simplify the overall catalog experience for requestors.
Recommendations for Access Profiles and Roles within Certifications
Leverages peer group analysis and machine learning to proactively recommend appropriate access profiles and roles for employees during access certifications of an identity.
Role Discovery Filtering Enhancements
Additional improvements to the discovery of roles via Access Modeling, by making the selection criteria easier and more intuitive to navigate.
Scope for Cloud Roles
Detailed access information for cloud Roles displayed directly within the UI.
Support Custom Text
Customers can add custom instructional text to the Password Management workflow experience.
Support for Okta MFA
Support for identity proofing (knowledge-based user attributes, document verification, ID verification, etc.) to confirm an individual’s identity via Okta multi-factor authentication.
Time-Based One-Time Password (TOTP) on Login
Time-based One-time Passwords are a common form of two factor authentication (2FA). Unique numeric passwords are generated with a standardized algorithm that uses the current time as an input. Time-based passwords are available offline and provide user friendly, increased account security when used as a second factor.
Updated Source Management Experience
A completely updated user experience for managing new and existing sources. Users will be able to take actions on sources with fewer clicks through an intuitive, user friendly experience.
Simplify automation and accelerate business with a graphical workflow builder to create custom workflows using a drag & drop GUI.
Govern the items individuals or groups (e.g. business units, geographies, or types of employees) can see and request via the Request Center.
Admins can use an intuitive UI to construct logic that will select the appropriate account provisioning assignments when the identity has multiple accounts on the target source.
Ensure certification reviewers have more information when making access decisions, by showing what accounts a user has not accessed in the last 6-12 months.
New events that can be utilized by the Event Trigger Service to perform actions. Event triggers include: Campaign Generated, Campaign Activated, Certification Campaign Ended/Expired, Certification Signed-off, and Certification Reminder.
The default attributes for the Recommendations Engine provide accelerated time-to-value for new implementations and improve the accuracy of recommendations for existing customers.
Cloud Access for Entitlements
View cloud access details for entitlements directly within IdentityNow or IdentityIQ.
UI controls allowing Admins and Source-Admins to configure the account and group level direct permissions that would be aggregated for a source.
UI controls allowing Admins and Source-Admins to configure the entitlement types that would be aggregated for a source.
This enhancement will pinpoint common access items across an organization to define access models more clearly.
Architecture and design improvements to reduce the time for onboarding and refreshing large scale cloud environments.
Provides visibility into related Parent and Child entitlements when viewing the details of a specific entitlement.
Users can submit requests for individual entitlements via Access Request for themselves or on behalf of other users.
Using access request events in combination with the Event Trigger Service, the Request Tracker will include visibility into when important events occurred during the request workflow.
Synchronize attribute changes to downstream applications, in near real time, when a change is detected to ensure the data in those systems is more accurate.
Granular User and Administration Access Levels
Ability to specify, and limit, access to administrative functions within Cloud Access Manager.
The ability to copy entire configurations or specific objects from one environment to another (ex. sandbox to production). These APIs can be used to restore configurations, by importing a previously exported configuration snapshot, and can also be used to automate identifier mapping and rule copying to accelerate implementations.
Support for multiple “types” of entitlements on a source, each with a uniquely defined set of mapped attributes. These entitlements can be also certified via Access Certifications.
We’ve added 3 event triggers to help you create powerful, customized, and automated workflows for your identity governance processes. The new triggers are: Source Created, Source Updated, and Source Deleted. Additional information about each trigger will be available on the SailPoint Developer Portal.
We’re simplifying the deployment of Connector Rules within IdentityNow. Customers and Partners can deploy Connector type rules directly into their tenant without the need for review and approval from SailPoint.
Generate, download, and export reports for any unused access across Cloud Service Providers.
Managers can request the removal of access for their direct reports when access is no longer needed. Requests to remove access will trigger an approval workflow that is configurable and can be different from the grant access workflow.
This functionality helps administrators better understand their access model and make guided decisions on how to continuously improve it through newly surfaced roles.
A secure and compliant way for customers to provide access to their tenants for SailPoint Support & Services.
This enhancement will allow Administrators to edit Access Profiles within the UI.
We’re making it easier to select the right identity attributes in a source’s “Correlation Configuration” and “Create Profile” menus. The technical attributes names will appear in parentheses after the business-friendly attribute names for any identity attribute.
A new, intuitive, and streamlined user experience for changing passwords for applications and accounts. This new UI also provides new deep linking integration options that allow employees to reach Password Management from outside applications with a single click.
We’re continuing to improve our Access Certification review process. This release will include an updated UX upon campaign completion, additional information on the Campaign Details page, new search fields, improved overlay pages, and simplified reassignment.
Proactively recommend appropriate access for employees within the Request Center, based on peer group analysis and machine learning, to simplify the access request process.
Filter Access Profiles by description in the details overlay to help users more quickly find the access item they’re looking for. Plus, the addition of key identity attributes (like Manager, Department, and Location) in the approval workflow, so that approvers have more context about the request recipient during the approval process.
Detect and display the related governance action (ex. certification revocation or access request approval) that led to the specific access which was provisioned or de-provisioned from an identity within the Access History timeline.
- Date/Time Math Transform – Calculate date and time values by adding or subtracting units of time from an existing date/time value or “Now”.
- Name Normalizer Transform – Enhanced capabilities to normalize capitalization on a given name value. Ensure all values for a name attribute follow the appropriate, designated capitalization pattern.
- String Handling Transform – Improved string handling to support parsing and formatting of data strings. Includes functions for left and right padding, Base64 encoding and decoding, enhanced sub-string functions, and splitting by delimiter.
Control both Source and Role administration at the Source level. This feature allows our customers to assign admin responsibility for an individual Source to anyone they chose, without granting administrative rights to other Sources.
A major upgrade to our API support portal that provides improved navigation, clearer documentation, and the ability to test API functionality directly on the site.
Access Request Configuration API update that allows administrators to decide what happens in approval workflows when a Requestor is also part of the normal approval workflow. Approvals can either be re-routed to that Requester/Approver’s manager, or automatically approved based on implicit approval.
Provides a seamless experience between role creation and role governance eliminating the need to export roles and insights via CSV.
Provides an improved, transforms-based approach for the automated creation of custom-defined attribute values. Via API, administrators can create a prioritized list of transforms that will generate custom attribute values and check those values against a source for uniqueness. Ex. The automated provisioning of unique account names.
Schedule campaigns to automatically kick-off at regular intervals with predetermined completion dates or reuse an existing campaign schedule again to save time, reduce errors, and increase productivity.
Enhancements to the Certifications in Search user experience that include an updated menu when creating new campaigns from scratch, consolidated steps for configuring and scheduling campaigns, and improved grid views that show the status of all Campaigns.
An additional validation field for the Password Reset workflow that ensures users have successfully updated their password correctly.
Surface any permissions directly associated with an entitlement. These permissions can be configured on a per source basis, provisioned to directly, and certified via Access Certifications.
Create SOD policies at a more granular (entitlement) level. Improving the specificity of access that triggers violations and simplifying remediation by providing the exact entitlements that cause each Identity to be in violation.
Triggers when changes have been detected on the status of a VA. A “subscribed” event can be used to automate responses, such as notification via Slack channel or PagerDuty.
Integrate our IGA solutions into existing business processes and kick off custom workflows for things like Identity attribute changes or when provisioning has completed.
Provides the ability to automate actions, such as sending an email or starting a Certification campaign, whenever a change is detected within our system.
Extended support to include Okta as an Identity Provider (IDP) for displaying federated access to cloud platforms.
Show federated user access for Azure Active Directory users, as well as groups mapped to AWS accounts, for customers that use Azure AD as their Identity Provider (IDP). This provides greater visibility into who has access to what within multi-cloud platform environments.
Heightened support for large & complex IaaS environments via automated registration of new cloud accounts, and the ability to customize the scope of managed cloud accounts.
Treat ‘Provisioning Tasks’ as searchable objects by allowing them to be accessed through the dynamic Search engine along with all other forms of reporting data.
Improved functionality for detecting and displaying cloud access that is unused. In addition to displaying unused permissions that users have access to, Cloud Access Management now displays more details of how that cloud access is granted at higher levels, such as unused services or unused roles a user may have access to.
Multi-account Source Provisioning
Resolves ambiguous target accounts for provisioning requests. If a provisioning action cannot be completed because the source has more than one possible target account for the selected Identity, IdentityNow will generate a manual task to facilitate the selection of the appropriate target account to which the access should be provisioned.
Easily create and manage non-employee identities, while also quickly granting, modifying, or revoking access for those third parties, whether they’re partners, suppliers, or any other type of contingent worker.
Provide customers licensed for Access Request and SOD the ability to ensure their approvers are aware of all SOD violations that would result from their approval of a specific access request.
Recommendations for bundles within Access Request for Movers
By leveraging AI and ML, the Recommendations Engine enables existing employees to quickly and easily find new access they may need to start performing additional job responsibilities.
By leveraging AI and ML, the Recommendations Engine enables new employees to quickly and easily find the access they need to start performing their new job responsibilities.
By providing the ability to fine tune the rules used to model Roles, this capability will provide organizations more granular control over the Roles that are created, and simplified visuals and controls will help ensure they align with the exact needs of the business.
Include account statuses (‘active’, ‘locked’, or ‘disabled’) in the event timeline. Improve the ease of understanding when, and how, an identity gained or lost access by relating these additional insights to the corresponding action.
Enable reviewers to input comments when revoking access to specific Roles, Entitlements, or Access items during a campaign.
Certifications to support the periodic review of Roles, including the access granted by the role, the assignment configuration, and the name and description of the role itself.
Provides the ability to understand, interpret, and act on industry best practice KPIs in order to improve the efficiency, accuracy, and security of their access model.
The official SailPoint for Microsoft Teams application empowers enterprises to employ governance capabilities with their existing Microsoft tools, and provides identity security capabilities to organizations, such as granting users access to corporate resources anytime, from their Teams app! All approval workflows are still managed, and decision records maintained, within IdentityNow ensuring normal approval processes are maintained and an audit trail is available.
The official SailPoint for Slack application protects your business everywhere by ensuring users have the right access to corporate resources anytime, anywhere right from Slack! All approval workflows are still managed, and decision records maintained, within IdentityNow ensuring normal approval processes are maintained and an audit trail is available.
New visualizations of cloud inventory data and improved flexibility for refreshing access relationships.
Display, set, and modify a termination-of-access (or “sunset”) date on access items approved during an Access Certification. Initially the modification of sunset dates will only support the shortening (bringing in) of sunset dates.
Set a pre-defined end date for any access granted through an Access Request, allowing for the automated deprovisioning of that access at the specified time.
Supports the modification or extension of a sunset date. Modifications will automatically kick off the same approval workflow that is configured for granting the access before the update is confirmed.
Numerous additional enhancements to the cert reviewer experience:
- Dynamic resizing and “preference memory’ for grid columns between views.
- Auto-navigation to move users onto the next decision item (access item or identity) and through the decision tabs.
- Clear indication (gray out) when all decisions on a tab are complete.
- Campaign cards sorted by due date, completed cards sorted by signed-off date.
- Added flags for additional info (ex. indicate birthright access “*”.
- Added sorting capability to columns.
- Reminder on completion screen (pre “high five”) to ensure sign-off is complete.