工程

Protocol-based connectors enable broad integration

Connectivity is at the heart of SailPoint Identity and Access Governance. IGA program managers see significant increases in business value as they integrate highly critical applications, in higher quantities, under governance. Our integrations fall under two categories: Named application connectors – These are out of the box integrations with a […]

Forget your password while working remotely? We can help!

With the rapid development in technology, work culture, and our current lockdown situation, people might not always be connected to their corporate network. They need to connect remotely from home, a client site, or other venues. The following scenario might sound familiar to you. While you are working remotely, you […]

SailPoint 的快速聯合 (FastFed) SDK 已推出!

SailPoint 於今日自豪地宣佈將推出兩項獲 MIC 授權、實施目前 FastFed 規格的開放原始碼 SDK。  本網誌發文時,實施者的草稿 (implementer’s draft) 才剛剛提交出去,正等候核准。 您可至 https://github.com/sailpoint-oss/fastfed-sdk 瀏覽原始碼。  對於跟我一樣那些不太 […]

SailPoint 工程師: 積極主動出擊,避免消極被動

積極主動指預先設想問題、尋求新的解決方案,以及在狀況變成衝突或危機來源之前竭盡全力採取行動。 這意味著對我們的產品負起責任,而非只是任由情況發生。 在客戶服務的這個層面上,問題出現之後回應客戶或事件[…]

透過 Prometheus 取得更好指標

從微服務與基礎架構生成數百萬指標很容易(或許該說太簡單了)。 在營運團隊成長與擴展應用程式時,收集這些指標並構建成有意義的儀表板與警報就是挑戰了。 我們在 Prometheus 發現了一個功能強大且靈活的指標收集平台 […]

您的資料很糟糕…我們可以提供幫助

很抱歉必須要告訴您的是,您的資料糟透了,問題很嚴重。 人工智慧和機器學習將在未來幾年內改變身分治理,想要充分利用它的優點,您必須有備無患。 這是 […]

快速聯合: 將應用程式配置到您的身分供應商

作為負責將新的應用程式配置到所在環境中的 IT 管理員,您大多會希望啟用單一登入,讓您的團隊成員可以使用公司憑證 (使用者名稱和密碼) 存取該應用程式。 授予所述存取權限通常是透過直接整合 LDAP 服務完成 (假設 […]

Meet the SailPoint Engineering Crew

What is it like to work at SailPoint? Get an inside look at what life on the SailPoint engineering team is like, and why they love what they do!

Finding the Needle in the Needlestack: Moving Towards a Smarter Risk Detection, Modeling & Assessment

What is risk? Risk is a nebulous concept, albeit highly intuitive, or probably too generic of a term. The thing about risk is that to develop effective tools to deal with or mitigate its ill effects, one would typically require highly non-trivial and specific details. For example, risk from a […]

Bring your shovels, we’re going mining! – Gearing up for an AI revolution in access modeling

Managing access can be quite a daunting task in mid-to-large sized enterprises. Having a good answer for “Who should have access to what?” is not easy, to say the least. With a myriad of existing applications, accounts, file systems, etc. that keep growing all the time, and with a dynamic […]