COURSE: Identity Bot Introduction | CONFIDENTIAL: DO NOT COPY
The
dashboard
will help you
to map SAVIYNT
e2 DEPLOYMENT e3
4
different ul IDENTITY BOT &
e
du
l ul
INTRODUCTION od o od
M EXECUTION
DEPLOYMENT M RECORDING M BEST
modules and TYPES PRACTICES
FLOW
locate
where you
are in the Module 1
course. You are here!
COURSE: Identity Bot Introduction | CONFIDENTIAL: DO NOT COPY
01 Motivation
02 Identity Bot Unveiled
COURSE: Identity Bot Introduction | CONFIDENTIAL: DO NOT COPY
Motivation
COURSE: Identity Bot Introduction | CONFIDENTIAL: DO NOT COPY
Disconnected Applications DO NOT
Standard/Protocol APIs
Proprietary APIs
Application
1. Have any Integration APIs exposed.
Have any other standard integration model 2.
Have any other standard Integration
Have any integration APIs exposed. 1.
2.
model.
COURSE: Identity Bot Introduction | CONFIDENTIAL: DO NOT COPY
Reconciliation
• Application Administrator exports the User/Account/Entitlement
Data to any standard format files.
• Imports the data from those files using several import options
available in SSM.
Provisioning
• Application Administrator manually does the create/update/delete
operations in the application
• Complete the ARS task in SSM manually.
COURSE: Identity Bot Introduction | CONFIDENTIAL: DO NOT COPY
Manual
Latency
Intervention
• Administrator MUST perform the CRUD • There is always a time DELAY.
operations in the application MANUALLY.
• Update the ARS tasks status MANUALLY
• Import the data into Saviynt MANUALLY.
COURSE: Identity Bot Introduction | CONFIDENTIAL: DO NOT COPY
• Administrator performing the same set of actions.
• If an application can performs these same set of actions!!!!!!
PROCESS AUTOMATION.. WHAT?
• It is a technology using which an application can emulate the actions of a user.
• Such Applications are referred to as Robots or Bots.
• Bots can mimic many human user actions. They login to applications, fill in forms, copy and
paste data, move files and folders, extracts structured data.
COURSE: Identity Bot Introduction | CONFIDENTIAL: DO NOT COPY
01 Motivation
02 Identity Bot Unveiled
COURSE: Identity Bot Introduction | CONFIDENTIAL: DO NOT COPY
Identity Bot Unveiled
COURSE: Identity Bot Introduction | CONFIDENTIAL: DO NOT COPY
Train the Bot
Remote
(Record)
Execution
(Playback)
• Record the sequence of actions while • Execute this recorded script anytime
administrator is performing any CRUD when the same operation must be
operation to accomplish a use case. performed.
• Save these actions in a script and edit
the script to add any variables.
COURSE: Identity Bot Introduction | CONFIDENTIAL: DO NOT COPY
COURSE: Identity Bot Introduction | CONFIDENTIAL: DO NOT COPY
Thank You
COURSE: Identity Bot Introduction | CONFIDENTIAL: DO NOT COPY