Review the steps.
1______________________________________
2. Import the virtual appliance (VA) image to the virtualization platform.
3. Start the VA.
4. Log in to the VA using the default credentials.
5. Change the password for the SailPoint user.
6______________________________________
7. Create a new VA cluster in IdentityNow.
8. Create a new VA configuration in IdentityNow. 9 Download / procure the config.yaml.
10. Configure the keyPassphrase in the config.yaml.
11. Upload the config.yaml into the VA.
12______________________________________.
Are these the missing steps?
Solution: 1. Click Test Connection on the VA configuration. 6. Download / procure the VA image. 12. Configure networking configurations (as needed).
Is this statement true?
Solution: IdentifyNow allow HTML editing of an email template.
Is the following description of an access profile correct?
Solution: it can be acknowledged during certifications.
Is the following true about the web-services connector in IdentityNow?
Solution: The connector only supports JSON content-types.
Does this example accurately describe an IdentityNow data flow?
Solution:
1. The IdentityNow engineer logs into the virtual appliance and creates a new identity profile.
2. The virtual appliance contacts the IdentityNow tenant to synchronize the identity profile.
3. The IdentityNow tenant provisions accounts to source systems.
4. The IdentityNow tenant sends an API call to the virtual appliance with confirmation that accounts were provisioned
Is this statement accurate regarding SailPoint's multi-tenant processing environment?
Solution: identityNow admins have the option to choose how often updates to their tenant occur.
When preparing for a manager certification campaign is this a step that is considered a best practice before the campaign preview is generated?
Solution: Load entitlement descriptions
The customer has a system that matches the following description. Is this a suitable connector type to use?
The system is a modern, cloud-based, web application that uses a MySQL database backend provided by the cloud platform. The database is only accessible from the web application. The web application exposes a fully compliant SCIM 2.0 interface with OAuth 2.0 client credentials.
Solution: SCIM 2.0 Connector
Refer to the following diagram.
For this strategy, all virtual appliances (VAs) are deployed in a single VA cluster, with all VAs running concurrently. Some of these VAs are in the primary data center, and others {called OR VAs) are deployed in a DR data center.
While using this strategy, is this a disadvantage?
Solution: The disaster recovery VAs are not being utilized at all until a disaster recovery event occurs.
Is this statement true about deploying and configuring IdentityNow's virtual appliance (VA)?
Solution: When using the AWS deployment option, the identityNow engineer needs to convert the VA image in order to deploy it.
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
SailPoint Free Exams |
---|
![]() |