Posts

Showing posts from 2021

How to transpose selected rows of Data into multiple columns in Excel

Image
Given a set of data in one single column, and you need to transpose every N number of rows into columns in Excel. The first task is to figure out how many rows or lines of data corresponds to one set. Once you have figured out how many consecutive rows of data corresponds to one set or a single records, then next step is transpose the selected rows into columns.  Lets take a simple example, given a data as below in one single column. aaa1 aaa2 aaa3 bbb1 bbb2 bbb3 ccc1 ccc2 ccc3 The first thing is to figure out how many rows correspond to one set. To make it simpler, we can see aaa1,aaa2,aaa3 belong to one set, and similarly bbb1,bbb2,bbb3 belongs to a different set. Hence the data represents three different records. The objective is to transpose the 3 lines or rows of data into separate columns, as below showing 3 distinct records. aaa1  aaa2  aaa3 bbb1 bbb2  bbb3 ccc1  ccc2  ccc3 The data now can now be represented into a Table format with each row corresponding to one separate record

SailPoint IIQ Features

SailPoint Identity IQ (IIQ) as the Identity Management System provides full management of User Lifecycle across all the resources in an organization. This includes Auditing, Compliance and Access Privileges of a user.  SailPoint IIQ provides following features 1) Reduce Risk: Full visibility on user access to resources on a continuing basis via certifications and access reviews 2) Reduce IT Heldesk costs: self service portals and expeditation of the processes for requesting and granting access to IT resources 3) Improve Efficiency: Automation of provisioning resources to users, including modifying, revoking user access throughout user lifecycle. 4) Automate Policy Management: The compliance to policies for user access, including separation of duties can be fully automated with the SailPoint Compliance Manager. 5) Integration with Privileged Access Management: SailPoint offers integration with several Industry Privileged Access products like CyberArk, Thycotic etc., for managing the li

Closed Loop Remediation in Identity Management and Governance

Closed-loop remediation is a term that is used in Identity Management and Governance that revokes any of the access privileges of a user which were identified for revocation during a Certification process. Ideally the Closed-loop remediation feature should directly revoke roles and entitlements from the Provisioning Tool after the Certification process or campaign has flagged such entitlements of a user for revocation. For example, in Oracle Identity Manager (OIM), when a certification is complete and all primary review tasks have been signed off, Oracle Identity Manager attempts to remove every user and privilege for which the final decision was to revoke. Requests are created to de-assign any role-assignment that is revoked, to de-provision any account that is revoked, to remove any entitlement-assignment that is revoked, and to delete or disable any user that is revoked.  Note, for non-managed applications, you may have to manually revoke roles and entitlements. The key here is that