Stay up to date on our latest features and enhancements.
At SailPoint we’re committed to innovation. From product improvements to breakthrough technologies, this page will highlight many of the exciting advancements we’ve recently released across our entire portfolio of SaaS products, as well as providing a preview of some of the great new features our team is currently hard at work on.
Find the latest information in our Connector Directory.
Stay tuned for IdentityIQ and File Access Manager releases.
Forward Looking Statement
The development, release, and timing of any features or functionality described for our products that are not currently available remains at our sole discretion on a when, and if available, basis and may not be delivered at all and should not be relied on in making a purchasing decision.
Please try again.
Control both Source and Role administration at the Source level. This feature allows our customers to assign admin responsibility for an individual Source to anyone they chose, without granting administrative rights to other Sources.
Allows administrators to limit the use of API keys to an approved list of IP addresses, thereby increasing the security of those keys.
Access Request Configuration API update that allows administrators to decide what happens in approval workflows when a Requestor is also part of the normal approval workflow. Approvals can either be re-routed to that Requester/Approver’s manager, or automatically approved based on implicit approval.
Provides an improved, transforms-based approach for the automated creation of custom-defined attribute values. Via API, administrators can create a prioritized list of transforms that will generate custom attribute values and check those values against a source for uniqueness. Ex. The automated provisioning of unique account names.
Create SOD policies at a more granular (entitlement) level. Improving the specificity of access that triggers violations and simplifying remediation by providing the exact entitlements that cause each Identity to be in violation.
Extended support to include Okta as a Identity Provider (IDP) for displaying federated access to cloud platforms.
Heightened support for large & complex IaaS environments via automated registration of new cloud accounts, and the ability to customize the scope of managed cloud accounts.
Provides the ability to understand, interpret, and act on industry best practice KPIs in order to improve the efficiency, accuracy, and security of their access model.
Easily create and manage non-employee identities, while also quickly granting, modifying, or revoking access for those third parties, whether they’re partners, suppliers, or any other type of contingent worker.
Schedule campaigns to automatically kick-off at regular intervals with predetermined completion dates or reuse an existing campaign schedule again to save time, reduce errors, and increase productivity.
Numerous additional enhancements to the cert reviewer experience:
- Dynamic resizing and “preference memory’ for grid columns between views.
- Auto-navigation to move users onto the next decision item (access item or identity) and through the decision tabs.
- Clear indication (gray out) when all decisions on a tab are complete.
- Campaign cards sorted by due date, completed cards sorted by signed-off date.
- Added flags for additional info (ex. indicate birthright access “*”.
- Added sorting capability to columns.
- Reminder on completion screen (pre “high five”) to ensure sign-off is complete.
Treat ‘Provisioning Tasks’ as searchable objects by allowing them to be accessed through the dynamic Search engine along with all other forms of reporting data.
Detect and display the related governance action (ex. certification revocation or access request approval) that led to the specific access which was provisioned or de-provisioned from an identity within the Access History timeline.
Include account statuses (‘active’, ‘locked’, or ‘disabled’) in the event timeline. Improve the ease of understanding when, and how, an identity gained or lost access by relating these additional insights to the corresponding action.
Easily assign Workload Privilege Management users’ access to specific privileged targets by applying a tag to users, connections, API keys and targets.
Enable reviewers to input comments when revoking access to specific Roles, Entitlements, or Access items during a campaign.
NOTE: Auto Discovery of Targets is an Integration use case that requires SailPoint’s Cloud Access Management service. Cloud Access Management provides the ability to define guardrails that discover privileged instances in the cloud. Once discovered, Workload Privilege Management will automate configuring discovered instances as targets, create & rotate credentials for each instance moving forward, and apply access controls so that access is governed.
Proactively inform users of the connection or credential’s status (is it available or not) before attempting to gain access to it.
A major upgrade to our API support portal that provides improved navigation, clearer documentation, and the ability to test API functionality directly on the site.
Provides the ability to automate actions, such as sending an email or starting a Certification campaign, whenever a change is detected within our system.
Integrate our IGA solutions into existing business processes and kick off custom workflows for things like Identity attribute changes or when provisioning has completed.
Improved functionality for detecting and displaying cloud access that is unused. In addition to displaying unused permissions that users have access to, Cloud Access Management now displays more details of how that cloud access is granted at higher levels, such as unused services or unused roles a user may have access to.
Show federated user access for Azure Active Directory users, as well as groups mapped to AWS accounts, for customers that use Azure AD as their Identity Provider (IDP). This provides greater visibility into who has access to what within multi-cloud platform environments.
Access Request Segmentation
Govern the items individuals or groups (e.g. business units, geographies, or types of employees) can see and request via the Request Center.
By providing the ability to fine tune the rules used to model Roles, this capability will provide organizations more granular control over the Roles that are created, and simplified visuals and controls will help ensure they align with the exact needs of the business.
Automated Role Creation into IdentityNow
Provides a seamless experience between role creation and role governance eliminating the need to export roles and insights via CSV.
Sunset Modification via Access Request
Supports the modification or extension of a sunset date. Modifications will automatically kick off the same approval workflow that is configured for granting the access before the update is confirmed.
Access Request User Enhancements
Filter Access Profiles by description in the details overlay to help users more quickly find the access item they’re looking for. Plus, the addition of key identity attributes (like Manager, Department, and Location) in the approval workflow, so that approvers have more context about the request recipient during the approval process.
ETS event for VA Health Check
Triggers when changes have been detected on the status of a VA. A “subscribed” event can be used to automate responses, such as notification via Slack channel or PagerDuty.
Additional Provisioning Transforms
- Date/Time Math Transform – Calculate date and time values by adding or subtracting units of time from an existing date/time value or “Now”.
- Name Normalizer Transform – Enhanced capabilities to normalize capitalization on a given name value. Ensure all values for a name attribute follow the appropriate, designated capitalization pattern.
- String Handling Transform – Improved string handling to support parsing and formatting of data strings. Includes functions for left and right padding, Base64 encoding and decoding, enhanced sub-string functions, and splitting by delimiter.
Sunset Date Support in Certifications
Display, set, and modify a termination-of-access (or “sunset”) date on access items approved during an Access Certification. Initially the modification of sunset dates will only support the shortening (bringing in) of sunset dates.
Reporting for Unused Access
Generate, download, and export reports for any unused access across Cloud Service Providers.
The ability to define time-bound access, on an ad hoc basis, for privileged cloud environments via API in order to limit exposure from long-running access.
Access Request Recommendations
Proactively recommend appropriate access for employees within the Request Center, based on peer group analysis and machine learning, to simplify the access request process.
Provide customers licensed for Access Request and SOD the ability to ensure their approvers are aware of all SOD violations that would result from their approval of a specific access request.
Sunset Dates for Access Request
Set a pre-defined end date for any access granted through an Access Request, allowing for the automated deprovisioning of that access at the specified time.
Certs Over Search Workflow Enhancements
Enhancements to the Certifications in Search user experience that include an updated menu when creating new campaigns from scratch, consolidated steps for configuring and scheduling campaigns, and improved grid views that show the status of all Campaigns.
Certifications to support the periodic review of Roles, including the access granted by the role, the assignment configuration, and the name and description of the role itself.
Multi-account Source Provisioning
Resolves ambiguous target accounts for provisioning requests. If a provisioning action cannot be completed because the source has more than one possible target account for the selected Identity, IdentityNow will generate a manual task to facilitate the selection of the appropriate target account to which the access should be provisioned.
Direct Permissions on Entitlements
Surface any permissions directly associated with an entitlement. These permissions can be configured on a per source basis, provisioned to directly, and certified via Access Certifications.
Multiple Entitlement Types per Source
Support for multiple “types” of entitlements on a source, each with a uniquely defined set of mapped attributes. These entitlements can be also certified via Access Certifications.
Support for Okta MFA
Support for identity proofing (knowledge-based user attributes, document verification, ID verification, etc.) to confirm an individual’s identity via Okta multi-factor authentication.