Home » Sailpoint Training Videos
Connector rules in sailpoint are used to define how to connect to target applications and how to interpret the information returned from the target application. A connector rule is made up of a set of conditions that must be met in order for the rule to be triggered. When the conditions are met, the connector rule performs a set of operations on the data from the target application.
The operations performed by the connector rule can include retrieving data from the target application and manipulating that data in various ways. The operations performed by a connector rule can include writing data back to the target application. Connector rules are written in XML and are divided into three main sections: trigger conditions, actions,and post-processing.
The trigger conditions specify the conditions that must be met for the connector rule to be triggered. The actions specify what is done to the data retrieved from the target application. The post-processing portion of the connector rule contains any custom scripting that might be required to clean up or manipulate the data retrieved from the target application.
One identity vs sailpoint: One Identity means a person is having one account in the system. Talk about all accounts of the person in the system. SailPoint means All identities in the system.
Ping identity vs SailPoint: sailpoint is a cloud-based identity management system that helps enterprises in managing users, roles, and permissions in a central manner. sailpoint comes with features like access governance, identity assurance, and user management.
On the other hand, Ping identity is a cloud-based password management system that helps enterprises in managing passwords and other credentials in a centralized manner. The main features of Ping Identity are password management and user lifecycle management.