Identity security has become a critical part of modern cybersecurity strategies. As organizations grow, managing who has access to what—across thousands of applications—becomes extremely complex.
This is where SailPoint Identity Security Cloud plays a key role by providing centralized Identity Governance and Administration (IGA).
In this detailed SEO-friendly guide, we will cover:
IAM vs IGA concepts (with real examples)
SailPoint Identity Security Cloud overview
How users access and register
Dashboard and navigation
Requesting access & certifications
Tasks and troubleshooting
Real-world enterprise use cases
We will also connect this to advanced training:
π SailPoint Identity Security Cloud Training – SecApps Learning
Before understanding SailPoint, it is important to understand two core cybersecurity concepts:
IAM is a framework that ensures the right person gets the right access at the right time.
IAM includes:
User authentication (login)
Authorization (permissions)
Password management
Single Sign-On (SSO)
Multi-Factor Authentication (MFA)
Example of IAM:
Imagine an employee in a bank:
They log in using corporate credentials (SSO)
They access email, HR portal, and internal tools
IAM ensures they cannot access admin systems or customer financial data
π IAM focuses on controlling access at login time
IGA is an advanced layer on top of IAM.
It focuses on:
Who SHOULD have access (governance)
Who currently HAS access (visibility)
Periodic access reviews (certifications)
Compliance and audit reporting
Example of IGA:
A company has 10,000 employees:
Some employees have access to finance systems
Some have access to HR data
Some access production servers
IGA ensures:
Access is reviewed regularly
Managers certify employee access
Unnecessary access is removed
π IGA focuses on governance, compliance, and access lifecycle
| IAM | IGA |
|---|---|
| Controls login access | Governs user access lifecycle |
| Focus on authentication | Focus on compliance |
| Real-time access | Periodic access review |
| Example: login to system | Example: approve/remove access |
SailPoint Identity Security Cloud is a modern SaaS-based Identity Governance platform that helps organizations manage:
Access requests
User provisioning
Role management
Certifications (access reviews)
Identity lifecycle management
It ensures employees always have the right access without compromising security.
β Centralized identity governance
β Access request automation
β Role-based access control (RBAC)
β Certification campaigns
β Dashboard-based visibility
β Cloud-based SaaS architecture
β Integration with enterprise applications
Once a user logs in, they are taken to the home dashboard, which acts as the central control panel.
From here users can:
Request access to applications
Approve or reject access requests
Complete certification tasks
Manage assigned responsibilities
Step 1: Initial Login
Users can access Identity Security Cloud via:
Email invitation OR
Organization SSO (Single Sign-On)
Step 2: Registration Process
If invited via email:
Open invitation email
Click Register Now
Create password (meeting security requirements)
Confirm password
Complete security setup
Then:
Provide contact details
Set security questions
Save profile information
Step 3: First Login Experience
After login, users land on the Home Dashboard, which shows:
Pending tasks
Access requests
Certifications
Notifications
SailPoint supports modern browsers:
Desktop:
Chrome
Firefox
Edge
Safari
Mobile:
Mobile Chrome (Android)
Mobile Safari (iOS)
π Note:
Certification reviews are not supported on mobile devices
Admin tasks work best on desktop/tablet
The dashboard is the central workspace for users.
It contains tiles, which display key information like:
Pending approvals
Access requests
Certification tasks
Identity insights
Users can personalize their view:
To add tiles:
Click Edit Dashboard
Select “Add” on required tiles
To remove tiles:
Click Remove on unwanted tiles
To rearrange:
Drag and drop tiles
Admins may assign managed dashboards with:
Predefined widgets
Reporting views
Compliance insights
Important:
Managed dashboards cannot be edited
Users can only view or switch between them
One of the most important features is Access Request Management.
Example:
An employee needs access to:
SAP system
HR portal
Finance dashboard
Steps:
Search for application
Select required role/access
Submit request
Manager approves
System automatically provisions access
β No manual IT dependency
β Faster onboarding
β Reduced human error
β Full audit trail
Certifications are periodic reviews where managers verify:
Who has access
Whether access is still required
Whether access should be revoked
Example:
A developer leaves a project but still has:
Production access
Database access
During certification:
Manager reviews access
Removes unnecessary permissions
β Compliance (SOX, GDPR, ISO 27001)
β Security risk reduction
β Prevents privilege creep
Users may receive tasks such as:
Approving access requests
Completing certification reviews
Updating identity information
These tasks appear directly on the dashboard.
1. Cannot login
Check SSO configuration
Verify browser compatibility
2. Access request not processed
Approval pending
Manager not assigned correctly
3. Missing dashboard tiles
Check managed dashboard settings
Ask admin to reassign widgets
4. Certification not visible
Role not assigned
Campaign not yet started
Scenario: Global IT Company
Company has:
50,000 employees
300+ applications
Multiple cloud systems
Without SailPoint:
Manual access approvals
Security gaps
Compliance failures
With SailPoint:
β Automated onboarding/offboarding
β Real-time access visibility
β Continuous compliance checks
β Reduced insider threats
SailPoint is widely used because:
Identity is the new security perimeter
Cloud adoption increases access complexity
Regulations require strict compliance
Organizations need automation
π IAM + IGA together form the backbone of enterprise security
β Cloud-native architecture
β Scalable identity governance
β Strong compliance support
β Reduced IT workload
β Better security visibility
β Faster access provisioning
SailPoint Identity Security Cloud is a powerful identity governance platform that helps organizations manage access securely and efficiently.
It bridges the gap between:
IAM (Access control)
IGA (Access governance)
Together, they ensure that the right people have the right access at the right time—for the right reasons.
If you want to master SailPoint Identity Governance with real-time examples, hands-on labs, and interview preparation:
Your email address will not be published. Required fields are marked*
Copyright 2022 SecApps Learning. All Right Reserved
Comments ()