{"id":61082,"date":"2023-03-14T13:01:27","date_gmt":"2023-03-14T07:31:27","guid":{"rendered":"https:\/\/cloudfoundation.com\/blog\/?p=61082"},"modified":"2024-01-02T12:05:28","modified_gmt":"2024-01-02T06:35:28","slug":"sailpoint-tutorial","status":"publish","type":"post","link":"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/","title":{"rendered":"SailPoint Tutorial | A Beginners guide to SailPoint IAM"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Work Sans||||||||&#8221; text_font_size=&#8221;40px&#8221; header_font=&#8221;Times New Roman||||||||&#8221; header_font_size=&#8221;40px&#8221; header_line_height=&#8221;1.9em&#8221; custom_margin=&#8221;|||19px|false|false&#8221;]<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 ez-toc-wrap-center counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#SailPoint_Overview\" >SailPoint Overview<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#Identity_Governance_Architecture_Components\" >Identity Governance Architecture Components<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#Compliance_Manager\" >Compliance Manager<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#Lifecycle_Manager\" >Lifecycle Manager<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#Identity_Intelligence\" >Identity Intelligence<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#SailPoint_Role\" >SailPoint Role<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#SailPoint_Roles_Types\" >SailPoint Roles Types<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#Management_Role\" >Management Role<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#Accounting_Role\" >Accounting Role<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#SailPoint_Versions\" >SailPoint Versions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#List_out_the_SailPoint_Products\" >List out the SailPoint Products<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#SailPoint_IAM\" >SailPoint IAM<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#SailPoint_IAM_Solution_offers\" >SailPoint IAM Solution offers<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#SailPoint_Password_Management\" >SailPoint Password Management<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#SailPoint_Privileged_Access_Management\" >SailPoint Privileged Access Management<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#Several_Roles_in_SailPoint_PAM\" >Several Roles in SailPoint PAM<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#SailPoint_Identity_Now\" >SailPoint Identity Now<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#Advantages_that_SailPoint_Identity_Now_offers\" >Advantages that SailPoint Identity Now offers<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#Features_of_SailPoint\" >Features of SailPoint<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#Benefits_of_SailPoint\" >Benefits of SailPoint<\/a><\/li><\/ul><\/nav><\/div>\n\n<h1><strong>SailPoint Tutorial &#8211; A Beginners guide to using SailPoint IAM Identity Access Management Solutions<\/strong><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia|300|||||||&#8221; text_text_color=&#8221;rgba(0,0,0,0.8)&#8221; text_font_size=&#8221;20&#8243; text_line_height=&#8221;1.6em&#8221; header_font=&#8221;Georgia||||||||&#8221; header_font_size=&#8221;22px&#8221; header_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; custom_margin=&#8221;|||10%&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_last_edited=&#8221;off|phone&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>In today\u2019s digital world, identity governance is essential to everything from compliance and security to performance and security. In this tutorial, we&#8217;ll go over SailPoint\u2019s fundamentals and demonstrate how to set up the environment. We&#8217;ll go over things like the SailPoint IdentityIQ application, creating rules and policies, and controlling user roles and access, among other things. Let us start with an overview of SailPoint technology.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"SailPoint_Overview\"><\/span><strong>SailPoint Overview<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/SailPoint-AI-and-ML.png\" alt=\"\" width=\"1119\" height=\"490\" \/><\/strong><\/p>\n<p>SailPoint is a leader in <a href=\"https:\/\/cloudfoundation.com\/blog\/what-is-sailpoint-and-what-is-sailpoint-identityiq\/\" target=\"_blank\" rel=\"noopener\">Identity Governance Technology<\/a>. The SailPoint identity governance platform is the only solution that combines <strong>artificial intelligence (AI) and machine learning (ML) technology<\/strong> with the identity governance capabilities of a robust <a href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-online-training-find-out-the-key-aspects-of-sailpoint\/\" target=\"_blank\" rel=\"noopener\">Identity Management System.<\/a><\/p>\n<p>This unique combination of strengths enables SailPoint to deliver a broad range of advanced identity governance capabilities that no other vendor can match.<\/p>\n<p>SailPoint also offers a range of identity business services, including a <strong>compliance management platform, provisioning and access management, and password management<\/strong>, to enable customers to provision access and enforce compliance in every aspect of the business.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/Business-services.png\" alt=\"\" width=\"1894\" height=\"1230\" \/><\/p>\n<p>SailPoint Access management is a <a href=\"https:\/\/cloudfoundation.com\/blog\/what-is-cyberark-a-brief-intro-on-various-cyberark-architectures\/\" target=\"_blank\" rel=\"noopener\">data security and management platform<\/a>. It secures user access by integrating with identity management solutions.<\/p>\n<p>Organizations may protect data, control access permissions, and comply with rules and policies using the platform.<\/p>\n<p>It helps them understand who has access to what data and how it is used. The technology delivers a comprehensive view of user access, helping firms identify risks and reduce data breaches.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/IAM-1.png\" alt=\"\" width=\"1277\" height=\"990\" \/><\/p>\n<p>Today, identity governance is a critical component of any <strong><a href=\"https:\/\/cloudfoundation.com\/blog\/saviynt-tool-the-latest-saviynt-cloud-technology\/\" target=\"_blank\" rel=\"noopener\">identity and access management system<\/a><\/strong>. Enterprises are facing a heightened security threat and regulatory requirements that are increasing the demand for actionable identity intelligence in real-time.<\/p>\n<p>The SailPoint identity governance platform was built with the same high-security standards that power many of the world\u2019s largest customers.<\/p>\n<p><a href=\"https:\/\/cloudfoundation.com\/sailpoint-training\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"http:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/06\/Sailpoint-Training.png\" alt=\"\" width=\"1240\" height=\"260\" \/><\/a><\/p>\n<p>Identity intelligence provides the ability to recognize and recognize patterns of abuse in the identity environment. This enables the mitigation of risks before they threaten business operations and security procedures.<\/p>\n<p>It is a reliable solution built to deliver operational efficiency, security, and compliance to businesses with multi-faceted IT environments.<\/p>\n<p>At the heart of SailPoint is a unique identity governance <strong>architecture<\/strong> that provides organizations the power to create an identity-enabled enterprise.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Identity_Governance_Architecture_Components\"><\/span><strong>Identity Governance Architecture Components<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>This identity governance architecture is made up of three components:<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/SailPoint-Identity-Governance-Architecture-Components.png\" alt=\"\" width=\"800\" height=\"829\" \/><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Compliance_Manager\"><\/span><strong>Compliance Manager<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Compliance Manager in SailPoint automates the standard policy management, audit reporting, and access certification.<\/p>\n<p>This enables organizations to confidently offer on-ramps and off-ramps to access for users. It also enables organizations to confidently provide access to new hires, transfers, and others who may not have strong IT credentials.<\/p>\n<p>This improves overall security by reducing the burden on your compliance and security resources.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Lifecycle_Manager\"><\/span><strong>Lifecycle Manager<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Lifecycle Manager in SailPoint allows business users to easily request access and reset passwords themselves.<\/p>\n<p>It also allows users to do self-service access renewals and self-service access transfers. This empowers users to independently request access and reset passwords. This decreases the cost and complexity of managing user access for your organization.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Identity_Intelligence\"><\/span><strong>Identity Intelligence<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Identity Intelligence in SailPoint gives organizations the power to discover the state of identity and access in their environment.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"SailPoint_Role\"><\/span><strong>SailPoint Role<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/SailPoint-provides-USER-ACCESS-RIGHTS-AND-PERMISSIONS.png\" alt=\"\" width=\"665\" height=\"653\" \/><\/strong><\/p>\n<p>With SailPoint Identity IQ, SailPoint roles are used to <strong><a href=\"https:\/\/cloudfoundation.com\/blog\/saviynt-certification\/\" target=\"_blank\" rel=\"noopener\">provide user access rights and permissions<\/a>.<\/strong> These positions are adaptable and can be customized to any organization&#8217;s requirements.<\/p>\n<p>They give administrators the ability to design granular access control rules that guarantee only users with the right permissions can carry out particular tasks.<\/p>\n<p>In addition, roles are utilized to manage user access privileges across SailPoint Identity IQ and to assign users to groups, projects, and applications.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"SailPoint_Roles_Types\"><\/span><strong>SailPoint Roles Types<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>There are two types of roles in SailPoint:<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/SailPoint-Roles.png\" alt=\"\" width=\"1579\" height=\"1302\" \/><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Management_Role\"><\/span><strong>Management Role<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The management role can do the following: Create, edit, and delete roles Create, edit, and delete user accounts View role assignments Download and update role configuration files<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Accounting_Role\"><\/span><strong>Accounting Role<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The accounting role can do the following: View role membership View role allocations View audit reports.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"SailPoint_Versions\"><\/span><strong>SailPoint Versions<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/SailPoint-is-the-Software-as-a-Service.png\" alt=\"\" width=\"539\" height=\"510\" \/><\/strong><\/p>\n<p>SailPoint is the <strong><a href=\"https:\/\/cloudfoundation.com\/c\/s\/sailpoint-training-in-india\/\" target=\"_blank\" rel=\"noopener\">Software-as-a-Service<\/a> (SaaS) platform<\/strong> that empowers businesses of all sizes to integrate data, devices, and applications to build an identity-enabled enterprise.<\/p>\n<p>It is the industry\u2019s first identity governance platform that combines data, devices, and applications in one solution to deliver a robust identity governance capability with the flexibility to scale up or down with a company\u2019s needs.<\/p>\n<p>It provides the tools for identity management by enabling companies to see who is doing what and why.<\/p>\n<p><strong><a href=\"https:\/\/cloudfoundation.com\/sailpoint-iiq-training\/\" target=\"_blank\" rel=\"noopener\">SailPoint Identity IQ<\/a><\/strong> helps organizations build a robust identity governance framework by integrating identity processes across data, applications, and devices.<\/p>\n<p>SailPoint Identity Platform is the industry\u2019s first identity governance platform that combines <strong>data, devices, and applications into a single solution<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/SailPoint-Identity-Platform-Combines.png\" alt=\"\" width=\"908\" height=\"663\" \/><\/p>\n<p>SailPoint Identity Warehouse is a cloud-based platform that gives organizations the flexibility to deploy, manage, and scale their own identity and access management (IAM) solutions.<\/p>\n<p>SailPoint Identity Mobile is a full-featured and flexible identity and access management solution for mobile professionals.<\/p>\n<p>It allows you to manage user access on a mobile device or in the cloud. It can also be used to provide users with remote access to applications and data.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"List_out_the_SailPoint_Products\"><\/span><strong>List out the SailPoint Products<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/List-of-SailPoint-products.png\" alt=\"\" width=\"788\" height=\"803\" \/><\/strong><\/p>\n<h3><span class=\"ez-toc-section\" id=\"SailPoint_IAM\"><\/span><strong>SailPoint IAM<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><a href=\"https:\/\/cloudfoundation.com\/sailpoint-iam-training\/\" target=\"_blank\" rel=\"noopener\">SailPoint Identity Access Management (IAM)<\/a> stores users to access data for all enterprise and external apps.<\/p>\n<p>IAM manages credentials and access across platforms and applications. It cuts expenses, improves compliance and risk management, and streamlines user onboarding and termination.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/SailPoint-Identity-and-Access-Management.png\" alt=\"\" width=\"604\" height=\"513\" \/><\/p>\n<p>It controls identity access to mobile devices, virtual desktops, and cloud apps. IAM SailPoint controls and monitors access to all business-critical apps and IT resources.<\/p>\n<p>SailPoint IAM is a strategic tool for administrators to manage and control the <a href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-interview-q-a\/\" target=\"_blank\" rel=\"noopener\">Identity Access<\/a> Lifecycle, including resource provisioning and de-provisioning, monitoring access activity, and enforcing IAM rules.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"SailPoint_IAM_Solution_offers\"><\/span><strong>SailPoint IAM Solution offers<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><strong><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/SailPoint-IAM-Solution-Offers-1.png\" alt=\"\" width=\"1202\" height=\"933\" \/><\/strong><\/p>\n<p>Providing a <strong>unified interface<\/strong> for on-premises, cloud, and mobile applications.<\/p>\n<p><strong>Managing and monitoring access<\/strong> to on-premises, cloud, and mobile apps with a single solution.<\/p>\n<p><strong>Single-pane access management<\/strong> and monitoring across varied applications and devices.<\/p>\n<p>Automating difficult <strong>access and onboarding processes<\/strong>.<\/p>\n<p>Provide a <strong>versatile, scalable, and secure platform<\/strong> to accommodate evolving business needs.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"SailPoint_Password_Management\"><\/span><strong>SailPoint Password Management <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A cloud-based identity and access management service called SailPoint password management aid businesses in maintaining secure access to their digital resources.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/SailPoint-Password-Management.png\" alt=\"\" width=\"1080\" height=\"563\" \/><\/p>\n<p>Passwords can be securely stored, shared, and accessed across all of an organization&#8217;s systems and applications.<\/p>\n<p>Users can also access single sign-on features, which streamline the process of authenticating and controlling access to several systems and apps.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"SailPoint_Privileged_Access_Management\"><\/span><strong>SailPoint Privileged Access Management<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A software program called SailPoint PAM (Privileged Access Management) is intended to assist enterprises in safeguarding and controlling their privileged access accounts.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/SailPoint-Privileged-Access-Management.png\" alt=\"\" width=\"1908\" height=\"1920\" \/><\/p>\n<p>It offers centralized management of privileged accounts, which can be applied to <a href=\"https:\/\/cloudfoundation.com\/blog\/cyberark-tutorial\/\" target=\"_blank\" rel=\"noopener\">protect access<\/a> to vital programs and systems.<\/p>\n<p>To assist enterprises in gaining visibility into privileged account actions and enforcing compliance across the enterprise, SailPoint PAM also provides advanced monitoring, alerting, and reporting capabilities.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Several_Roles_in_SailPoint_PAM\"><\/span><strong>Several Roles in SailPoint PAM<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Whether a user or group is subject to a role depends on their role membership.<\/p>\n<p>A user&#8217;s specific access privileges on an application are known as entitlements. Roles and role members are given to them.<\/p>\n<p>You can represent the role hierarchy within IdentityIQ using role composition. One role can be configured to contain another, and you can then specify how those roles are put together to build a hierarchy.<\/p>\n<p>Role aggregation enables you to turn several roles into one. Role aggregation can be set up to combine roles depending on a user&#8217;s or group&#8217;s membership or an application&#8217;s entitlement.<\/p>\n<p>The provisioning and de-provisioning of access when a role is introduced to or removed from an application are controlled by the role lifecycle.<\/p>\n<p>Role composition controls how existing roles are blended to form new roles.<\/p>\n<p>When a user is given numerous roles with the same composition, the application of those roles to that user is determined by role inheritance.<\/p>\n<p>By establishing a relationship of composition between roles, role hierarchy is controlled.<\/p>\n<p><a href=\"https:\/\/cloudfoundation.com\/sailpoint-training\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/06\/sailpoint-online-training-2.png\" alt=\"\" width=\"1240\" height=\"260\" \/><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"SailPoint_Identity_Now\"><\/span><strong>SailPoint Identity Now<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><a href=\"https:\/\/cloudfoundation.com\/sailpoint-identity-now-training\/\" target=\"_blank\" rel=\"noopener\">SailPoint IdentityNow<\/a> is an identity and access management (IAM) solution that enables you to control user identities and access to cloud-based resources such as data, applications, and resources.<\/p>\n<p><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/SailPoint-Identity-Now.png\" alt=\"\" width=\"933\" height=\"497\" \/><\/p>\n<p>You can automate identity management procedures, enhance security and compliance, and lower IT expenses.<\/p>\n<p>Additionally, it offers self-service options that let customers access their accounts from any device, reset their passwords, and update their profile information.<\/p>\n<p>It aids businesses in streamlining user access and administration, enhancing compliance, lowering costs and risks, and enhancing customer experiences.<\/p>\n<p>Identity Now SailPoint provides a full range of capabilities, including identity governance, user provisioning, identity, and access analytics, single sign-on, multi-factor authentication, and identity risk management.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Advantages_that_SailPoint_Identity_Now_offers\"><\/span><strong>Advantages that SailPoint Identity Now offers<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><strong><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/Advantages-of-SailPoint-Identity-Now-1.png\" alt=\"\" width=\"1180\" height=\"1440\" \/><\/strong><\/p>\n<p><strong>Multi-cloud services <\/strong>and applications are governed and automated centrally.<\/p>\n<p><strong>One-stop shop<\/strong> for managing policies for cloud services and apps<\/p>\n<p><strong>cross-cloud services<\/strong> and applications auditing in one place<\/p>\n<p><strong>Versatile deployment<\/strong> options for on-premises and hybrid cloud environments<\/p>\n<p><strong>Agentless cloud service<\/strong> and application provisioning<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Features_of_SailPoint\"><\/span><strong>Features of SailPoint<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/features-of-sailpoint.png\" alt=\"\" width=\"1180\" height=\"1635\" \/><\/strong><\/p>\n<p><strong>Identity Governance:<\/strong> enables companies to keep a safe, reliable, and complete view of all the identities present in their system. Additionally, it offers the capability of controlling and automating user access to programs and systems.<\/p>\n<p><strong>Identity Intelligence:<\/strong> This function enables users to examine identification data and spot unusual activity that might be a sign of a security issue.<\/p>\n<p><strong>Identity Provisioning:<\/strong> With the help of this capability, you can automatically create and manage user accounts and access privileges across many systems and programs.<\/p>\n<p><strong>Access Certification<\/strong>: With the help of this function, businesses may systematically examine user access privileges, spot any security threats, and take the necessary countermeasures.<\/p>\n<p><strong>Risk-Based Authentication:<\/strong> This option offers an extra layer of authentication that necessitates users to submit further verification in order to access systems.<\/p>\n<p><strong>Access Request:<\/strong> Users can use this functionality to request access to specific systems and applications.<\/p>\n<p><strong>Identity Self-Service:<\/strong> This function enables users to control and modify their own identification data, including passwords, addresses, and contact details.<\/p>\n<p><strong>Identity Analytics<\/strong>: This function enables you to examine identity data to find trends and potentially dangerous situations.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_of_SailPoint\"><\/span><strong>Benefits of SailPoint<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/benefits-of-Saillpoint.png\" alt=\"\" width=\"642\" height=\"775\" \/><\/strong><\/p>\n<p><strong>SailPoint comprehensive identity governance:<\/strong> SailPoint offers a comprehensive identity governance system that addresses every stage of the lifespan of user identities, from initial provisioning through retirement.<\/p>\n<p><strong>Automated Provisioning:<\/strong> SailPoint provides the ability for automated provisioning to guarantee that users have the proper access to the proper systems and apps at the proper time.<\/p>\n<p><strong>Risk-Based Access Control:<\/strong> Using user roles and risk profiles, SailPoint enables enterprises to control access to systems and applications.<\/p>\n<p><strong>Single Sign-On (SSO):<\/strong> SailPoint offers an SSO solution that helps users to access numerous applications\u00a0<strong>Self-Service Password Reset:<\/strong> SailPoint enables users to change their passwords on their own without getting in touch with the IT division.<\/p>\n<p><strong>Identity Analytics<\/strong>: SailPoint offers a solution for <a href=\"https:\/\/cloudfoundation.com\/blog\/what-is-ping-identity\/\" target=\"_blank\" rel=\"noopener\">identity analytics<\/a> that aids businesses in identifying and avoiding identity-related hazards.<\/p>\n<p><strong>Policy-Based Access Control<\/strong>: Using user roles and risk profiles as a basis, SailPoint enables companies to <a href=\"https:\/\/cloudfoundation.com\/blog\/ping-identity-certification\/\" target=\"_blank\" rel=\"noopener\">build access control policies<\/a>.<\/p>\n<p><strong>Extensive Audit and Reporting<\/strong>: To guarantee compliance with internal and external regulations, SailPoint offers full audit and reporting capabilities.<\/p>\n<p>Now you are aware of what is SailPoint in-depth and what are the modules and application usages in the organization.<\/p>\n<p>Wondering about how to learn and get immense knowledge in the technology but are confused about how to start and where to start then the following are the few guidelines to <strong>learn SailPoint. <\/strong><\/p>\n<p>Referring to any <em><strong>SailPoint Online course<\/strong><\/em> and <strong>SailPoint blogs<\/strong> makes your <em>SailPoint learning<\/em> ease.<\/p>\n<p>Accessing any <em>SailPoint Tool Tutorial<\/em> aids to get hands-on experience with the tool.<\/p>\n<p><a href=\"https:\/\/cloudfoundation.com\/sailpoint-training\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"size-medium aligncenter\" src=\"http:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/06\/Sailpoint-Certification-Course.png\" alt=\"\" width=\"1240\" height=\"260\" \/><\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_team_member name=&#8221;Akhila&#8221; position=&#8221;Author&#8221; image_url=&#8221;https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/06\/Akhila1.png&#8221; _builder_version=&#8221;4.9.7&#8243; header_level=&#8221;h5&#8243; header_font=&#8221;Titillium Web|700|||||||&#8221; body_font=&#8221;Titillium Web||||||||&#8221; body_font_size=&#8221;16&#8243;]<\/p>\n<p>Hola! I believe words cause magic and here Iam helping you become aware of advancing technologies, because the future of communication starts here.<\/p>\n<p>[\/et_pb_team_member][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Work Sans||||||||&#8221; text_font_size=&#8221;40px&#8221; header_font=&#8221;Times New Roman||||||||&#8221; header_font_size=&#8221;40px&#8221; header_line_height=&#8221;1.9em&#8221; custom_margin=&#8221;|||19px|false|false&#8221;] SailPoint Tutorial &#8211; A Beginners guide to using SailPoint IAM Identity Access Management Solutions [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia|300|||||||&#8221; text_text_color=&#8221;rgba(0,0,0,0.8)&#8221; text_font_size=&#8221;20&#8243; text_line_height=&#8221;1.6em&#8221; header_font=&#8221;Georgia||||||||&#8221; header_font_size=&#8221;22px&#8221; header_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":61138,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"2880","footnotes":""},"categories":[82],"tags":[],"class_list":{"0":"post-61082","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-sailpoint"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SailPoint Tutorial | A Beginners guide to SailPoint IAM<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SailPoint Tutorial | A Beginners guide to SailPoint IAM\" \/>\n<meta property=\"og:description\" content=\"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Work Sans||||||||&#8221; text_font_size=&#8221;40px&#8221; header_font=&#8221;Times New Roman||||||||&#8221; header_font_size=&#8221;40px&#8221; header_line_height=&#8221;1.9em&#8221; custom_margin=&#8221;|||19px|false|false&#8221;] SailPoint Tutorial &#8211; A Beginners guide to using SailPoint IAM Identity Access Management Solutions [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia|300|||||||&#8221; text_text_color=&#8221;rgba(0,0,0,0.8)&#8221; text_font_size=&#8221;20&#8243; text_line_height=&#8221;1.6em&#8221; header_font=&#8221;Georgia||||||||&#8221; header_font_size=&#8221;22px&#8221; header_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/\" \/>\n<meta property=\"og:site_name\" content=\"CloudFoundation | Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-14T07:31:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-02T06:35:28+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/cyber-security-digital-data-protection-concept-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"336\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"NAGENDRAG\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"NAGENDRAG\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SailPoint Tutorial | A Beginners guide to SailPoint IAM","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/","og_locale":"en_US","og_type":"article","og_title":"SailPoint Tutorial | A Beginners guide to SailPoint IAM","og_description":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Work Sans||||||||&#8221; text_font_size=&#8221;40px&#8221; header_font=&#8221;Times New Roman||||||||&#8221; header_font_size=&#8221;40px&#8221; header_line_height=&#8221;1.9em&#8221; custom_margin=&#8221;|||19px|false|false&#8221;] SailPoint Tutorial &#8211; A Beginners guide to using SailPoint IAM Identity Access Management Solutions [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.7&#8243; text_font=&#8221;Georgia|300|||||||&#8221; text_text_color=&#8221;rgba(0,0,0,0.8)&#8221; text_font_size=&#8221;20&#8243; text_line_height=&#8221;1.6em&#8221; header_font=&#8221;Georgia||||||||&#8221; header_font_size=&#8221;22px&#8221; header_line_height=&#8221;1.9em&#8221; max_width=&#8221;800px&#8221; max_width_last_edited=&#8221;off|phone&#8221; [&hellip;]","og_url":"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/","og_site_name":"CloudFoundation | Blog","article_published_time":"2023-03-14T07:31:27+00:00","article_modified_time":"2024-01-02T06:35:28+00:00","og_image":[{"width":650,"height":336,"url":"http:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/cyber-security-digital-data-protection-concept-1.jpg","type":"image\/jpeg"}],"author":"NAGENDRAG","twitter_card":"summary_large_image","twitter_misc":{"Written by":"NAGENDRAG","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/","url":"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/","name":"SailPoint Tutorial | A Beginners guide to SailPoint IAM","isPartOf":{"@id":"https:\/\/cloudfoundation.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#primaryimage"},"image":{"@id":"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#primaryimage"},"thumbnailUrl":"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/cyber-security-digital-data-protection-concept-1.jpg","datePublished":"2023-03-14T07:31:27+00:00","dateModified":"2024-01-02T06:35:28+00:00","author":{"@id":"https:\/\/cloudfoundation.com\/blog\/#\/schema\/person\/df6c7eba98f1bb15f2a100a9958266e4"},"breadcrumb":{"@id":"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#primaryimage","url":"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/cyber-security-digital-data-protection-concept-1.jpg","contentUrl":"https:\/\/cloudfoundation.com\/blog\/wp-content\/uploads\/2023\/03\/cyber-security-digital-data-protection-concept-1.jpg","width":650,"height":336},{"@type":"BreadcrumbList","@id":"https:\/\/cloudfoundation.com\/blog\/sailpoint-tutorial\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloudfoundation.com\/blog\/"},{"@type":"ListItem","position":2,"name":"SailPoint Tutorial | A Beginners guide to SailPoint IAM"}]},{"@type":"WebSite","@id":"https:\/\/cloudfoundation.com\/blog\/#website","url":"https:\/\/cloudfoundation.com\/blog\/","name":"CloudFoundation | Blog","description":"A New way of Learning","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudfoundation.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cloudfoundation.com\/blog\/#\/schema\/person\/df6c7eba98f1bb15f2a100a9958266e4","name":"NAGENDRAG","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudfoundation.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09e08ba1102807a876f2c00245d6b955f0a9f027b40c181e9cee0cd2d927f84a?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09e08ba1102807a876f2c00245d6b955f0a9f027b40c181e9cee0cd2d927f84a?s=96&d=wavatar&r=g","caption":"NAGENDRAG"},"url":"https:\/\/cloudfoundation.com\/blog\/author\/nagendrag\/"}]}},"_links":{"self":[{"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/posts\/61082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/comments?post=61082"}],"version-history":[{"count":28,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/posts\/61082\/revisions"}],"predecessor-version":[{"id":77672,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/posts\/61082\/revisions\/77672"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/media\/61138"}],"wp:attachment":[{"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/media?parent=61082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/categories?post=61082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudfoundation.com\/blog\/wp-json\/wp\/v2\/tags?post=61082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}