Skip to content

Discovering Roles

Role Discovery, part of Access Modeling, identifies user access patterns and determines potential roles, or bundles of access, that accurately align with what users actually do in an organization.

To discover potential roles, SailPoint uses a patented network graph analysis. Entitlement-based similarities are found among the identities in an organization, and identities are organized into cluster communities, or peer groups, with similar access. This network graph enables SailPoint to detect and discover roles with least-privileged access for groups of very similar identities.

You can access Role Discovery as soon as Access Modeling is enabled for your org.

After potential roles have been discovered, you can:

Role Discovery Process Overview

Each process overview step is described in detail in the sections that follow.

  1. Define a group of identities and launch Role Discovery.

  2. Work with the potential role results and save the role discovery session to work on later.

  3. Explore potential roles.

  4. Refine the entitlements for a potential role and save the role as a draft to work on later.

  5. Export the potential role data to a ZIP file for evaluating offline and manually creating new roles.

  6. Automatically create a new role from a potential role.

Important

SailPoint also automatically discovers potential roles and makes them accessible through the Auto-Discovered Roles tile on the Role Insights page.

Discovering Potential Roles

You can launch Role Discovery from either Role Insights or Search to display potential roles based on the optimal role granularity derived from our AI algorithms.

New identities and entitlements added to your organization are available for Role Discovery on the following day.

Discover Roles from Role Insights

  1. Go to Admin > Access Model > Role Insights and select Discover Roles to launch the Define a Group of Identities page.

    On this page you can use the filters to define a group of identities that you expect to have shared entitlements through roles.

  2. Select an attribute type and value(s) from the dropdown lists. The attribute type and value dropdown lists can each hold up to 1,000 items.

  3. Select the Add filter icon to apply the filter. Multiple filters can be applied and will be combined with AND operators to narrow the number of identities.

    Caution

    Searching for dates in the Attribute Value search field will result in an error. Instead, scroll through the list and select specific date attribute values.

  4. After adding filters to define a group of identities, select Discover Roles.

  5. Select either Discover Common Access Roles or Discover Specialized Roles.

    Common access roles contain broad access that is common across an organization and not tied to a specific job function. Specialized roles contain access that is specific to a functional area within the organization.

    After the role discovery process completes, the Potential Role Results page lists all the potential roles that were discovered. You can work with the potential role results in various ways.

  1. Go to Admin > Search and enter a search query.

    Note

    SailPoint recommends using targeted, specific search queries to narrow down the identities to groups that you want to have shared entitlements through roles.

    When searching on *(all), there is a limit of 25,000 identities returned. SailPoint does not recommend searching on *(all). For more information on Search syntax, refer to Building a Search Query.

  2. Select Role Discovery.

  3. Select either Discover Common Access Roles or Discover Specialized Roles.

    Common access roles contain broad access that is common across an organization and not tied to a specific job function. Specialized roles contain access that is specific to a functional area within the organization.

    After the role discovery process completes, the Potential Role Results page lists all the potential roles that were discovered. You can work with the potential role results in various ways.

Working with Potential Roles Results

The Potential Role Results page lists the potential role results from the role discovery session.

Some of the discovered roles may have a High Impact label . High-impact roles are unique with similar access among identities and will improve your organization’s access model the most. The Potential Role Results list can be sorted by role impact, identity access similarity, number of identities, or number of entitlements.

From the Potential Role Results page, you can work with the potential roles list in the following ways:

The potential role results can be sorted by role impact, identity access similarity, number of identities, or number of entitlements.

Viewing Session Criteria

Select Session Criteria at the top of the Potential Role Results page to view the session settings and identity filters applied to the session.

To change the identity filters, select Start a New Session to return to the Define a Group of Identities page and begin a new session.

To edit the session settings, close the Session Criteria window and then select Settings on the Potential Role Results page.

Editing Session Settings

Select the Settings icon to modify the potential roles displayed in the list:

  1. Use the Role Granularity slider to adjust the size and specialization of the potential roles. The orange pin on the slider represents the smart default value that our AI algorithms used to discover the initial set of potential roles displayed.

    A lower role granularity percentage displays potential roles with broader access. The potential roles discovered will each include higher numbers of identities with less entitlement similarity. In general, the included identities are less similar to each other. The roles are easier to manage, but it is possible that some identities might gain access that isn’t completely essential to their job function.

    A higher role granularity percentage displays potential roles with more specialized access. The potential roles discovered will each include fewer identities with more entitlement similarity. It can take longer to evaluate and maintain a large number of potential roles with higher specialization. However, the potential roles will have a higher level of relative security due to more entitlement similarity.

  2. Adjust the Minimum Number of Identities to display only the potential roles that include at least that number of identities.

  3. Select Apply to update the list of potential roles based on your changes.

Exploring Potential Roles

Potential roles can be explored from newly discovered potential role results, a saved role discovery session, or saved draft roles. You can explore the properties and attributes of a potential role as follows:

  1. Select Attributes for any potential role to quickly view the role’s top 3 job titles, departments, and locations (by percentage) shared among the included identities. It is possible to add a fourth identity attribute with help from Professional Services.

    Note the following conditions for how attributes are displayed:

    • If none of the identities in the potential role have attributes for job title, department, or location, another attribute is displayed.

    • The attributes available depend on the way the mapping from your source is configured by the solution architect during the onboarding process.

    • If the job title, department, and location attributes show Not Applicable, it means those attributes were not mapped for any identities included in the potential role. For example, this could be the case for a potential role that includes contract workers not assigned job titles or departments.

  2. To see detailed information for a potential role, select the potential role name or Work On This Role in the Attributes view. The Composition screen for the potential role displays an entitlement popularity visualization.

    The table below the visualization lists the role’s entitlements along with their % Popularity.

    If your organization has Activity Insights and has set up the relevant connectors, Source Usage data will also display in this table. This data shows the percentage of identities who have used the related source in the past 90 days. Selecting the percentage displays further information about the identities and their usage.

  3. Select the Excluded Entitlements tab to see the entitlements that are excluded from the potential role. The Reason Excluded column indicates why the entitlement is excluded: Common Access, User Excluded, or Duplicate.

  4. Select the Identity Overview tab to display a list of all identities in the potential role and their job title, department, and location attributes. You can also select Show Chart to see distribution graphs for these identity attributes. The Identity Overview tab reflects only the identities in the original potential role discovered and does not update based on entitlement changes made in the Composition tab.

    Reviewing the Identity Overview tab is a way to double-check that the initial identities in the potential role composition should have the included entitlements.

You can customize an individual potential role by refining the entitlements and save the role as a draft.

Refining Entitlements for a Potential Role

You can refine the entitlements for a potential role. Refining entitlements changes the contents of the potential role data you will export and the roles you can automatically create.

You should refine entitlements first in bulk and then individually.

Bulk Entitlement Exclusion

The first part of refining entitlements is to exclude all entitlements below a certain popularity threshold or all entitlements considered common access.

To exclude entitlements from a potential role in bulk:

  1. Select a potential role. The potential role opens on the Composition tab.

  2. Exclude entitlements below popularity threshold.

    This visualization allows you to see the popularity distribution of the entitlements in the potential role. Hover over different steps in the visualization to see how many entitlements fall above, at, and below different percentages of popularity.

    Note

    The steps in the visualization will change if you individually exclude all the entitlements in a step.

    Use the Popularity Threshold slider to select a popularity threshold, below which entitlements will be excluded from the potential role.

    Best Practice

    To avoid entitlement proliferation, SailPoint recommends removing low-popularity entitlements (< 70%) from your role definitions.

  3. Select Apply when you are finished. The Apply button becomes selectable only if you made changes.

  4. To hide the visualization section of the Composition tab, select the X icon. To display the visualization again, select Refine Entitlements.

    Caution

    If you select Back to Potential Roles to return to the initial Potential Roles screen before exporting or creating a new role, all applied changes for bulk entitlement exclusion will be lost and you’ll have to repeat the steps you took to refine the entitlements in bulk for a potential role.

    Individual entitlement exclusions are remembered if you select Back to Potential Roles.

    If you have made bulk entitlement exclusions, save the role as a draft to avoid losing your changes.

Individual Entitlement Exclusion

The next part of refining entitlements is to select specific entitlements to exclude from the potential role.

To exclude specific, individual entitlements from a potential role:

  1. On the Composition tab, select the checkboxes next to the entitlements you want to exclude, or select the checkbox in the table header to exclude all entitlements in the table.

  2. Select Exclude. The selected entitlements are removed from the Composition tab and are now listed on the Excluded Entitlements tab.

To add excluded entitlements to a potential role:

  1. On the Excluded Entitlements tab, select the checkboxes next to the entitlements you want to include, or select the checkbox in the table header to include all entitlements in the table.

  2. Select Include. The selected entitlements are removed from the Excluded Entitlements tab and are now listed on the Composition tab.

When you have finished adjusting the entitlements in the potential role, you are ready to export the potential role data or create a new role from the potential role.

Saving Role Discovery Sessions and Draft Roles

To allow time for thorough access model development and review, Role Discovery lets you save role discovery session results and draft roles to work on later. Saved sessions and draft roles are accessible in the left pane when you go to Admin > Access Model > Role Insights.

Saving Role Discovery Sessions

Saving a role discovery session allows you to return to the saved session at your convenience for further evaluation and modification.

To save a role discovery session:

  1. On the Potential Role Results page, select Save Session.
  2. Enter a session name and select Save.

To access your saved role discovery sessions, go to Admin > Access Model > Role Insights > Role Discovery Sessions. Each saved session is listed with the identity filters (search criteria) used for the session, the number of potential roles discovered, the total number of identities returned by the identity filters, who created the session, and the date created.

You can work with your saved sessions in the following ways:

Saving Draft Roles

Saving a potential role as a draft allows you to return to the draft role at your convenience for further refinement and evaluation before implementing it in your organization.

To save a draft role:

  1. On a potential role page, select Save Draft.
  2. Enter a Role Name and Description.
  3. If the draft role's session has not already been saved, Save Session is enabled an you will also need to enter a Session Name.
  4. Select Save.

To access your saved draft roles, go to Admin > Access Model > Role Insights > Draft Roles. You can work with your saved draft roles in the following ways:

  • View entitlements and identity attributes
  • Use the Popularity Threshold slider to exclude entitlements below the selected popularity threshold
  • Include and exclude individual entitlements
  • Edit role details such as role name and description
  • Create a new role from the saved draft role
  • Delete saved draft roles

Once a draft role has been saved, the draft stays in the saved session until deleted, even if the session settings are changed in such a way that the potential role would no longer be included in the session’s results.

Exporting and Using Potential Role Data

On the potential role page, select the Export Data button to save the entitlements, identities, and identity distribution data for the potential role in a ZIP file.

Use the exported potential role data to add identities or membership criteria to auto-created roles, share with stakeholders, evaluate your current roles, or manually create new roles.

Creating New Roles from Potential Roles

After you have explored a potential role and customized/refined it, you can automatically create a new role.

Complete the following steps:

  1. On the potential role page, select Create Role. The Create a New Role dialog box appears.

  2. Fill in the information for the new role. The role name entered must be unique from other role names in your organization. If you enter an preexisting role name, you will not be able to create the role and will be prompted to choose another name.

  3. Select Include Identities to send access requests to the appropriate owner for each of the identities. Identities can also be added later from exported potential role data.

  4. By default, entitlements will be directly assigned to the new role. To bundle the entitlements in access profiles, deselect the Assign entitlements directly to the role checkbox.

  5. Select Create Role. A banner appears to inform you that the new role was successfully created.

    The newly created role will be available after a period of time for you to work with. However, you cannot assign it to be a common access role.

    You can also select View New Role in the success banner to go directly to the Role page for your newly created role.

Working with Created Roles

The newly created role is saved with your other roles (Admin > Access Model > Roles) in an enabled state without identities. You can add identities later from exported potential role data.

If you selected Include Identities, access requests are sent to the appropriate owner for each of the identities, and the role is saved with your other roles in an enabled, requestable state. Users that request the new role must be approved by the role owner.

The role creation process creates one or more access profiles that are included only in the new role. It also generates an AI_CREATED tag for each new role and access profile.

Optionally, you can generate a role composition certification campaign so others in your organization can review the role before enablement.

  1. Add identities to the new role if not already included.

  2. Go to Admin > Search and enter "AI_CREATED" in the query field.

  3. Start a certification campaign.

Important

If you delete a role, be sure to also delete the access profiles that were created.

To delete access profiles, go to Admin > Access Model > Roles or Admin > Access Model > Access Profiles.

Deleting access profiles and roles that were already assigned to identities does not automatically remove the entitlements from those identities. For information about deprovisioning entitlements related to access profiles or roles, refer to Managing Access Profiles and Managing Roles.

Documentation Feedback

Feedback is provided as an informational resource only and does not form part of SailPoint’s official product documentation. SailPoint does not warrant or make any guarantees about the feedback (including without limitation as to its accuracy, relevance, or reliability). All feedback is subject to the terms set forth at https://developer.sailpoint.com/discuss/tos.