top of page

SailPoint-IGA

  • Writer: Anand Nerurkar
    Anand Nerurkar
  • Sep 22
  • 3 min read

Step-by-Step SailPoint Identity Governance Workflow (detailed)

SailPoint product options: SailPoint IdentityNow (cloud SaaS) or SailPoint IdentityIQ (on-prem/managed). Either provides the same core capabilities; ABC Bank may use IdentityNow for cloud-first or IdentityIQ for on-prem regulatory constraints. I’ll describe a generic sequence that applies to both; note product UI names differ slightly (IdentityNow uses “Access Request Portal”, IdentityIQ uses “Identity Portal / Access Request”).

A. Typical SailPoint Capabilities used

  • Identity Repo: central source of truth for identities and entitlements (synced to Azure AD / HR systems).

  • Access Request Portal: user-facing portal where staff request entitlements/roles.

  • Provisioning Connectors: SCIM / LDAP / AD / Azure AD / custom APIs to provision/un-provision.

  • Access Certifications: periodic recertification campaigns for managers to attest.

  • Policy Engine: SoD and risk policy enforcement.

  • Password / Credential Manager: integration for privileged credentials and vaulting.

  • Lifecycle & Onboarding: joiner/mover/leaver automation.


B. SailPoint Flow — Step by step (how an employee/operator gets access to a service)

  1. Identity Sync & Role Mapping

    • HR system + Azure AD sync to SailPoint Identity Store.

    • Roles & entitlements (e.g., LoanOfficer, OpsCompliance, KafkaProducer) mapped with business owners.

  2. Access Request

    • Employee logs into SailPoint Access Request Portal (IdentityNow or IdentityIQ).

    • Searches catalog and requests entitlement (e.g., LoanDecisionOverride or KafkaTopicProducer:loan-initiated).

    • Request includes justification; a temporary access window can be requested for JIT access.

  3. Approval Workflow

    • Request routed to approver(s): direct manager and data owner (policy enforced).

    • SoD checks executed in real time: if conflict (e.g., request would give ability to both create and approve loans), request blocked or routed to special approval.

  4. Provisioning

    • On approval SailPoint issues provisioning call to target system (Azure AD / Postgres role / Kubernetes RBAC or connector) via SCIM/API.

    • Provisioned identity/entitlement created; audit record stored.

  5. Certification

    • Periodic campaign: managers review entitlements. Approve / revoke; SailPoint enforces changes.

  6. Privileged Access / Emergency

    • For privileged actions, employee requests temporary elevated access (just-in-time).

    • PAM integration (CyberArk/others) issues a temporary credential; all session activity is logged.

  7. Deprovision / Leaver

    • On offboarding SailPoint triggers deprovision flows to remove entitlements, terminate sessions, revoke tokens.

  8. Auditing & Reporting

    • All actions recorded. Compliance reports generated for auditors and regulators.

Portal specifics

  • IdentityNow: cloud portal (Access Request Portal) for employees; modern UI, out-of-box connectors for Azure AD, work well for cloud deployments.

  • IdentityIQ: on-prem/managed; richer customization for complex enterprise workflows and integrations with legacy systems.

How SailPoint integrates in the lending flow

  • SailPoint provisions service identities used by microservices (service principals) and human roles (Underwriter, Compliance Officer).

  • It controls who can approve manual loan reviews, create or publish Kafka topics, access production ML model registry, view PII, and submit regulatory reports.

  • SailPoint also manages privileged credentials for the Compliance Officer who uploads reports to RBI portal; those credentials are retrieved via a vault and sessions recorded.

Summary (one-paragraph)

This regenerated flow is a production-grade, event-driven lending architecture: Amit R authenticates via Azure AD; loan application is persisted and emitted as a Kafka event (secure mTLS + topic ACLs); parallel adapters call Fenergo/CIBIL/Experian/Actimize; vendor results update the Feature Store; a single ML endpoint (internal) receives {customerId, extCredit, extFraud} then fetches features from Feature Store to return PD & fraud scores; LOS combines ML outputs with LTV/EMI/regulatory rules to decide; on approval loan agreement is eSigned and TCS BaNCS account created; disbursement is orchestrated as a Saga; compliance reporting is orchestrated (SFTP → Actimize → CTR/STR/NTR/CBWR → RBI/FIU submission) with audit and ACK capture. Every hop is secured: TLS/mTLS, JWT + refresh, SailPoint governance, Private Links, Kafka ACLs, WAF/DDOS, SFTP via SSH keys + signed files, TDE at rest, SIEM logging and immutable audits.


 
 
 

Recent Posts

See All
How to replan- No outcome after 6 month

⭐ “A transformation program is running for 6 months. Business says it is not delivering the value they expected. What will you do?” “When business says a 6-month transformation isn’t delivering value,

 
 
 
EA Strategy in case of Merger

⭐ EA Strategy in Case of a Merger (M&A) My EA strategy for a merger focuses on four pillars: discover, decide, integrate, and optimize.The goal is business continuity + synergy + tech consolidation. ✅

 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
  • Facebook
  • Twitter
  • LinkedIn

©2024 by AeeroTech. Proudly created with Wix.com

bottom of page