Common Application Configuration Details
The Details tab for each application includes options that are common to all applications.

The Application Type list contains all the connectors that are enabled for your instance of IdentityIQ. Many of the application types are specific to particular target systems, such as Workday or Box. Others are more general-use types that can be used on various systems or sources, such as JDBC and SCIM 2.0.
The application type determines which configuration options appear in the application configuration UI. Some options are unique to the selected application type.
Note that some connectors may not be enabled by default in your instance and so may not appear in the application type list; if you do not see an application type listed here that you think you should have access to, contact your Customer Success Manager or Professional Services resource.
For more information about specific connectors, refer to the IdentityIQ Connectors documentation on SailPoint's documentation portal.

The owner specified here is typically the business owner of the system, who is familiar with the system, its entitlements, and who should have access it it. The owner responsible for access reviews for this application from application owner certifications, account group permissions certifications, and account group membership certifications. The application owner can also be selected as an approver in targeted certifications.
By default, the application owner is also responsible for approving access requests for entitlements associated with this application, although this behavior can be modified in the business process that manages access requests.
Tip:
An application owner can be either an individual or a workgroup; it is a best practice to set a workgroup as the owner of the application. Assigning ownership to a workgroup makes it possible for multiple people to share responsibility for managing application-related activities that must be performed by someone, but do not necessarily need to be owned or performed by a specific person.

If you want to designate a user or workgroup that is responsible specifically for handling requests to revoke access (which typically occur as a result of a certification decision or policy violation), enter that identity or workgroup here. If no user is specified in this field, all revocation requests are assigned to the application owner by default.

An authoritative application is a target system that represents the primary and most trusted information for employee information for your enterprise, such as a human resources application. When this option is selected, designating this application as an authoritative one, the IdentityIQ aggregation process will create an authoritative Identity Cube for each account in this application.
For applications that are not marked as authoritative, IdentityIQ will attempt to correlate aggregated accounts to existing authoritative identities.
Your organization can have multiple target systems designated as authoritative sources.
For more information, see Authoritative and Non-Authoritative Data Sources .