DocumentationAPI ReferenceRelease Notes
Log In
Documentation

SailPoint IdentityIQ

This document provides the steps required to configure the integration between SailPoint IdentityIQ and Endpoint Privilege Management for Windows and Mac.

Create the IdentityIQ service account in EPM

  1. Log on to the EPM web console as an Administrator.
  2. Go to Configuration, and then API Settings.
  3. Create an API account for IdentityIQ.

You must log on to IdentityIQ using administrator credentials.

  1. Click the Add New Application button.
  2. From the Application Type menu, select SCIM 2.0. Provide a name for the application.
  3. On the Configuration tab, provide the base URL and token URL. Select Client Credentials for Grant type. Enter the client ID and secret for the svc_iiq API account.

ℹ️

Note

If the instance URL is https://pmc01.acme.somedomain.net then the API URLs are based on https://pmc01-services.acme.somedomain.com.

  1. Try testing the connection at this point.

  2. Go to the Schema tab.

  3. Click Discover Schema Attributes for Object Type: account.

  4. The attributes discovered for account are shown.

  5. Delete extra attributes and keep the attributes shown here.

  6. Discover the schema attributes for roles, and keep the attributes as shown.

  7. Click Provisioning Policies.

  8. Click Add Policy, and then click Create Policy Form.

  9. Click Add Section, then + on the new Section and Add Field. The first field is userName which maps to email address. Click Apply.

    The script format: return identity.getAttribute("email");

  10. Set the attribute name.givenName. Click Apply.

  11. Set the attribute name.familyName. Click Apply.

  12. Set the attribute email. Click Apply.

  13. Set the attribute displayName. Click Apply.

  14. Set the attribute active. Click Apply.

  15. Set the attribute locale to static, and Value to en-US or en-GB. This can be mapped to an Identity attribute, if available.

  16. Set the attribute timezone to static value. This can be mapped to an Identity attribute, if available.

  17. Provide a form name and description, and then save the form. Don’t forget to save the application.

  18. Edit the application again, and go to Correlation.

  19. Create a correlation rule. Save the application.

  20. Create the aggregation task for EPM. Navigate to Setup, then Tasks.

  21. Click the New Task menu, then select Account Aggregation.

  22. Configure the task to scan PM Cloud. Scroll to the bottom of the page and click Save and Execute.

  23. Confirm the Task result is Success.

  24. Create a group aggregation task for roles, and filter for only the roles type. Click Save and Execute, and confirm the task executed successfully.

  25. Go back to the application and select the Accounts tab.

  26. Review the discovered or aggregated accounts together with roles.

  27. Go to Applications, then Entitlement Catalog. Use Advanced Search to filter for the application. The screen capture shows the discovered roles.

  28. Go to Applications, then Entitlement Catalog. Use Advanced Search to filter for the Application. The screen capture shows the discovered roles.

ℹ️

Note

Only roles are requestable. Entitlements are read-only in the current RBAC model.

  1. Select a user that does not yet have access to EPM from the menu in the upper left corner. Select Manage Access, and then Manage User Access.
  2. Select a test user on the Manage User Access. Click Next.
  3. Select a role under the EPM Application. Click Next.
  4. Click Submit.
  5. The request should be in Verifying mode.
  6. Confirm the new user is added in EPM.
  7. Go to the Application Accounts tab and view the user application account and roles.

©2003-2025 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.