Is this statement correct about security and/or encryption of data?
Solution: When setting up a virtual appliance cluster. SailPoint creates an asymmetnc key pair based on a user-provided passphrase. and then uses this key pair to communication with the IdentityNow tenant.
Is the following statement accurate regarding Separation of Duties (SoD)?
Solution: An SoD policy can define mitigating controls.
An IdentityNow engineer needs to find identities with disabled AD accounts by using IdentityNow's search features. Is this the correct search syntax to perform this task?
Solution:
When preparing for a manager certification campaign is this a step that is considered a best practice before the campaign preview is generated?
Solution: Evaluate available campaign administration filters
Is this statement true about the IdentityNow release cycle?
Solution: IdentityNow releases are controlled and coordinated by SailPoint.
Is this statement true about using the IdentityNow APIs?
Solution: API documentation is located at https://docs.sailpoint.com
In an IdentityNow environment, the source lest connection is failing with a timeout error.
Is this a step an identityNow engineer should take to troubleshoot the problem?
Solution: Clear the Authentication checkbox for the source in identityNow.
Is this statement correct about security and/or encryption of data?
Solution: identityNow uses a hashing algorithm for secure encryption of data in transit and uses TLS for hashing passwords and the answers to security questions
In an optimized aggregation, if an account is unchanged since the last aggregation, does this step execute?
Solution: The virtual appliance connects to the target system to retrieve accounts.
Is this an item that an IdentityNow engineer should configure when implementing a source that uses a JDBC connector?
Solution: Use a query select statement with a clause to match the incoming account to an existing account for the Single Account SQL Query configuration item
An IdentityNow engineer needs to review logs to diagnose when the secure tunnel fails to allow communication. Could reviewing thi9 log file help diagnose the issue?
Solution: /home/sailpoint/log/relay.log
The customer has a system that matches the following description. Is this a suitable connector type to use?
The system is a modern, cloud-based, web application that uses a MySQL database backend provided by the cloud platform. The database is only accessible from the web application. The web application exposes a fully compliant SCIM 2.0 interface with OAuth 2.0 client credentials.
Solution: SCIM 2.0 Connector
An IdentityNow engineer has the following problem:
An identity is listed under Identities with Errors.
Is this one of the steps that should be taken to troubleshoot the issue?
Solution: Check for missing lastname, email, or uid attributes.
Is this an advantage of microservice architecture?
Solution: It provides quicker resolution of unintentional issues or failures with the service.
Is this statement true about the purpose of a tenant?
Solution: A non-production tenant is for demonstrating functionality.
In an IdentityNow environment, the source lest connection is failing with a timeout error.
Is this a step an identityNow engineer should take to troubleshoot the problem?
Solution: Test connectivity from the virtual appliance (VA) to the source.
Is this statement accurate regarding SailPoint's multi-tenant processing environment?
Solution: identityNow admins have the option to choose how often updates to their tenant occur.
Is the following true about the web-services connector in IdentityNow?
Solution: The connector supports SAML authentication.
Is this statement accurate regarding SailPoint's multi-tenant processing environment?
Solution: identityNow admins have the option to choose how often updates to their tenant occur.
Is this an appropriate use case for the Build Map?
Solution: To provide the ability to modify to modify the map data of an account for a JDBC or a Delimated File source.
An IdentityNow engineer has set up an access profile for an application. The access profile allows for users to request access, and for a user's manager to approve or deny access.
After a recent staff meeting, management has expressed that they want to remove any approval requirements for this application.
Is management's request possible in IdentityNow. and. if so. are these the recommended steps the engineer should take to meet their new requirement?
Solution: It is possible. Delete the certification campaign associated with this application.
A customer wants to configure a virtual appliance (VA) to use a static IP address. Does this file on the VA need to be modified to perform the configuration?
Solution: /home/sailpoint/proxy.yaml
Review the steps.
1______________________________________
2. Import the virtual appliance (VA) image to the virtualization platform.
3. Start the VA.
4. Log in to the VA using the default credentials.
5. Change the password for the SailPoint user.
6______________________________________
7. Create a new VA cluster in IdentityNow.
8. Create a new VA configuration in IdentityNow. 9 Download / procure the config.yaml.
10. Configure the keyPassphrase in the config.yaml.
11. Upload the config.yaml into the VA.
12______________________________________.
Are these the missing steps?
Solution: 1. Click Test Connection on the VA configuration. 6. Download / procure the VA image. 12. Configure networking configurations (as needed).
An IdentityNow engineer needs to find identities with disabled AD accounts by using IdentityNow's search features. Is this the correct search syntax to perform this task?
Solution:
Is the following true about custom connectors in IdentityNow?
Solution: Custom connector are developed and compiled inside identityNow.