SailPoint IdentityNow
Visit Website
sailpoint.com
Loading

SailPoint IdentityNow

Workflows to deploy, govern, and audit access with SailPoint IdentityNow
4.3 
Rating
70 votes
Your vote:
No screenshots
Visit Website
sailpoint.com
Loading

Begin by mapping who needs what access, then let IdentityNow automate the rest. Connect your HR system as the source of truth, add directories and key applications, and build job-based access profiles that align to real tasks. Publish a request catalog so employees and contractors can ask for what they need with clear approval paths and SLAs. Set up single sign-on and enforce MFA across critical apps; enable passwordless options or social sign‑in where appropriate. For joiners, access is provisioned automatically on day one; for movers, entitlements adjust as roles change; for leavers, accounts are closed the moment HR marks the exit. Use time‑bound or emergency access with expiration to limit risk, and route approvals to managers or app owners via email or mobile.

For role design and cleanup, run the AI-driven analysis on your existing entitlements. It clusters common permission sets, proposes role candidates, and shows coverage, gaps, and risk. Use simulations to preview who would gain or lose access and catch policy conflicts before you publish. Accept or refine the suggestions, then backfill the new roles to bring legacy accounts into alignment. Peer-based comparisons highlight outliers—users with more privilege than similar coworkers—so you can right-size entitlements. Risk scores and contextual tips help reviewers decide quickly; one click removes excess access or replaces it with a safer role. Schedule recurring reviews to keep drift under control without manual spreadsheets. more

Review Summary

Features

  • API Access Management
  • User Activity Monitoring
  • Role Management
  • Password Management
  • Account Management
  • Access Request Management
  • Compliance Management
  • Passwordless Login
  • Social Sign On
  • Single Sign-On (SSO)
  • Multi-factor Authentication (MFA)
  • AI-driven Role Mining
  • Cloud Entitlement Discovery
  • Risk Scoring and Recommendations
  • Just-in-time Access
  • Workflow and Approvals
  • Access Certifications
  • SIEM and ITSM Integrations

How It’s Used

  • Onboard a new employee with least-privilege access in minutes
  • Design and publish roles using AI recommendations and simulations
  • Automate mover updates and deprovision leavers on HR status change
  • Provide self-service access requests with manager or owner approvals
  • Enforce SSO, MFA, and optional passwordless or social login
  • Discover and govern permissions across Azure, AWS, and GCP
  • Implement just-in-time elevation for privileged tasks
  • Run quarterly access certifications with evidence exports
  • Monitor API usage and gate services with OAuth2 policies
  • Reduce helpdesk load with self-service password reset and unlock

Plans & Pricing

Standard

Custom

Automate access provisioning
Maintain compliance
Deliver actionable insights
Add-ons
<ul>
<li>Cloud Infrastructure Entitlement Management

Business

Custom

Make smarter access decisions
Simplify role management
Reduce edge-case risk threats
Add-ons:
<ul>
<li>Cloud Infrastructure Entitlement Management
Non-Employee Risk Management
Data Access Security
Password Management
Access Risk Management
Machine Identity Security

Business Plus

Custom

Proactively scale with the most advanced AI and ML
Identify and act on anomalous access
Seamlessly secure IaaS environments
Add-ons:
<ul>
<li>Non-Employee Risk Management
Data Access Security
Password Management
Access Risk Management
Machine Identity Security

Comments

4.3
Rating
70 votes
5 stars
0
4 stars
0
3 stars
0
2 stars
0
1 stars
0
User

Your vote: