Become an Identity Security Leader. Take the training & pass the exam to earn the credential. Enroll now
Some community content requires that you sign in for access. Join the Compass community to ask questions, share answers, watch webinars, sign up for training and more.
Community activity
- 6
- 0
- 423
Watch now: Lead the way – learn how to become an Identity Security leader
There is a deficit of nearly 4 million cybersecurity employees today, with unfilled cybersecurity positions at 71% ...
- 19
- 1
- 401
Are you a life long learner? Our new courses will make your day!
The word that comes to mind with this fall’s new courses is plethora! Join us in Identity University to expand your...
- 13
- 2
- 1213
Introducing SailPoint Knowledge Credentials with the first ever Identity Security Leader Credential!
What is a Knowledge Credential? A knowledge credential is a new type of digital badge you can earn, confirming th...
- 6
- 0
- 967
[New podcast] - Extend identity security to cloud infrastructure and govern cloud entitlements
Cloud and infrastructure-as-a-service tools are relied on by companies around the globe every day, yet managing and...
- 0
- 0
- 41
Grip Security Connector - Extending SaaS Identity Risk Management
This connector can be leveraged using SailPoint’s web services connector to deliver seamless integration between G...
- 0
- 1
- 23
read-only system admin access
Is there any plugin or capability for read-only system admin access for 8.1 or 8.2 versions, pls suggest any leads...
- 0
- 0
- 35
RACF Delayed Delete abends with S0C4.
S0C4 Abend in CTSR100 when processing delayed delete. Delayed Delete processing can cause an abend S0C4 in CTSR100...
- 0
- 0
- 42
Move most of our modules above the 16M line
Prevent abend S80A, S106 etc. caused by insufficient storage below the 16MB line by allowing our modules to be loa...
- 0
- 0
- 29
ACF2 agent loops when removing a group with UID String having a cent sign at the end
Loop in CTSACS removing a UID group with cent at the end. Remove (disconnect user from) a UID group such as ******...
- 6
- 0
- 967
[New podcast] - Extend identity security to cloud infrastructure and govern cloud entitlements
Cloud and infrastructure-as-a-service tools are relied on by companies around the globe every day, yet managing and...
- 2
- 0
- 594
[New podcast] - Simplify risk analysis with SailPoint Access Risk Management
What-if simulations. Separation-of-duties. Emergency access. These are all key components of strong ERP governance,...
- 0
- 0
- 565
[New podcast] Identity security for applications and systems
Every application and system in an organization’s environment is a new angle of attack for bad actors. So, when com...
- 0
- 0
- 548
[New podcast] Eyes on your data with Data Access Security
Enterprises work to secure business applications and sensitive data, but as data grows and circulates, vulnerabili...
- 1
- 0
- 709
[New podcast] What is AI-driven identity security?
AI is the hot topic of the day, but did you know SailPoint has been using AI and machine learning in their product...
Community corner
Meet the members of our community and see recent events!
One of seven 2023 North Star winners, Vishal Kejriwal receiving his award
Lorrin Minton showcasing Identity University at the Community Lounge
Jeff Warembourg delivering a technical session to a packed house
The Community team enjoying time with a customer