Movatterモバイル変換


[0]ホーム

URL:


Loading
  1. Elastic Docs/
  2. Reference/
  3. Ingestion tools/
  4. Elastic integrations

Sailpoint Identity Security Cloud

Version1.2.0 (View all)
Subscription level
What's this?
Basic
Developed by
What's this?
Elastic
Ingestion method(s)API
Minimum Kibana version(s)9.0.0
8.16.1

The Elastic integration forSailpoint Identity Security Cloud enables real-time monitoring and analysis of identity security events within the SailPoint platform. This integration collects, processes, and visualizes audit logs, access activities, and identity lifecycle events to enhance security posture, compliance, and operational efficiency.

  • events: Provides audit data that includes actions such asUSER_MANAGEMENT,PASSWORD_ACTIVITY,PROVISIONING,ACCESS_ITEM,SOURCE_MANAGEMENT,CERTIFICATION,AUTH,SYSTEM_CONFIG,ACCESS_REQUEST,SSO,WORKFLOW,SEGMENT and more.
  • Audit Events are records that a user took action in anIdentityNow tenant, or other service likeIdentityAI. Audit Events are structurally and conceptually very similar toIdentityIQ'sAudit Events, but have evolved in several ways.
  • This data stream leverages the Sailpoint identity security cloud API's/v2025/search endpoint to retrieve event logs.

Log in to the application with an administrator account and generate aPersonal Access Token (PAT). Personal access tokens are associated with a user inSailpoint identity security cloud and inherit the user's permission level (e.g., Admin, Helpdesk, etc.) to determine access.

To create aPersonal Access Token (PAT) using anadmin account, follow the instructions provided in the official documentation:
Generate a Personal Access Token.

Event documents can be found by setting the following filter:event.dataset : "sailpoint_identity_sc.events"

Example
{    "@timestamp": "2024-12-12T10:58:27.962Z",    "agent": {        "ephemeral_id": "c66d99e7-2d3b-4b3a-98ea-d64d114e37fe",        "id": "e8f2e5b9-6585-49bd-9022-eb2edfc745c1",        "name": "elastic-agent-98705",        "type": "filebeat",        "version": "8.15.0"    },    "data_stream": {        "dataset": "sailpoint_identity_sc.events",        "namespace": "71277",        "type": "logs"    },    "ecs": {        "version": "8.11.0"    },    "elastic_agent": {        "id": "e8f2e5b9-6585-49bd-9022-eb2edfc745c1",        "snapshot": false,        "version": "8.15.0"    },    "event": {        "agent_id_status": "verified",        "category": [            "iam"        ],        "dataset": "sailpoint_identity_sc.events",        "ingested": "2025-02-11T15:12:05Z",        "kind": "event",        "module": "sailpoint_identity_sc",        "type": [            "info"        ]    },    "host": {        "geo": {            "city_name": "Milton",            "continent_name": "North America",            "country_iso_code": "US",            "country_name": "United States",            "location": {                "lat": 47.2513,                "lon": -122.3149            },            "region_iso_code": "US-WA",            "region_name": "Washington"        },        "ip": [            "216.160.83.56"        ]    },    "input": {        "type": "cel"    },    "related": {        "hosts": [            "216.160.83.56"        ],        "user": [            "test.user"        ]    },    "sailpoint_identity_sc": {        "events": {            "_type": "event",            "_version": "v2",            "action": "USER_PASSWORD_UPDATE_PASSED",            "actor": {                "name": "test.user"            },            "attributes": {                "account_id": "test.user",                "host_name": "216.160.83.56",                "info": "Password workflow invoked successfully. Request Id :923169315cab448cac82091dc4827f38",                "org": "ta-partner14055",                "pod": "se01-useast1",                "scope": [                    "sp:scopes:all"                ],                "source_name": "IdentityNow"            },            "created": "2024-12-12T10:58:27.962Z",            "details": "38eef046d4594d7e9186cee997232f3d",            "id": "f514ad697321c49b61b65ec9b5099a192eb598d2c520d4e09f958f7abdfc16dd",            "ip_address": "216.160.83.56",            "name": "Update User Password Passed",            "objects": [                "USER",                "PASSWORD"            ],            "operation": "UPDATE",            "org": "ta-partner14055",            "pod": "se01-useast1",            "stack": "pigs",            "status": "PASSED",            "synced": "2024-12-23T10:58:32.977Z",            "target": {                "name": "test.user"            },            "technical_name": "USER_PASSWORD_UPDATE_PASSED",            "tracking_number": "fb38cc3fb990451dab51133aed21268a",            "type": "PASSWORD_ACTIVITY"        }    },    "tags": [        "forwarded",        "sailpoint_identity_sc.events"    ]}

ECS Field Reference

Please refer to the followingdocument for detailed information on ECS fields.

The following non-ECS fields are used in events documents:

Exported fields
FieldDescriptionType
@timestampEvent timestamp.date
data_stream.datasetData stream dataset.constant_keyword
data_stream.namespaceData stream namespace.constant_keyword
data_stream.typeData stream type.constant_keyword
input.typeInput type.keyword
sailpoint_identity_sc.events._typeDocument type of the access profile. This enum represents currently supported document types. Additional values may be introduced in the future without prior notice.keyword
sailpoint_identity_sc.events._versionVersion of the SailPoint events. Example: V2.keyword
sailpoint_identity_sc.events.actionEvent name as displayed in audit reports.keyword
sailpoint_identity_sc.events.actor.nameName of the actor responsible for generating the event. Example: System.keyword
sailpoint_identity_sc.events.attributes.access_profiles_afterAccess profiles assigned after the event.keyword
sailpoint_identity_sc.events.attributes.access_profiles_beforeAccess profiles assigned before the event.keyword
sailpoint_identity_sc.events.attributes.account_idAccount identifier.keyword
sailpoint_identity_sc.events.attributes.account_nameName of the account.keyword
sailpoint_identity_sc.events.attributes.account_sourceSource of the account.keyword
sailpoint_identity_sc.events.attributes.account_uuidUnique identifier for the account.keyword
sailpoint_identity_sc.events.attributes.app_idApplication identifier.keyword
sailpoint_identity_sc.events.attributes.attribute_nameName of the attribute.keyword
sailpoint_identity_sc.events.attributes.attribute_valueValue of the attribute.keyword
sailpoint_identity_sc.events.attributes.cloud_app_nameName of the cloud application.keyword
sailpoint_identity_sc.events.attributes.descriptionDescription of the entity.keyword
sailpoint_identity_sc.events.attributes.durationDuration of the process.keyword
sailpoint_identity_sc.events.attributes.errorsErrors related to the event.keyword
sailpoint_identity_sc.events.attributes.host_nameHostname involved in the event.ip
sailpoint_identity_sc.events.attributes.idUnique identifier.keyword
sailpoint_identity_sc.events.attributes.identities_processedIdentifier for processed identities.keyword
sailpoint_identity_sc.events.attributes.identities_selectedNumber of selected identities.keyword
sailpoint_identity_sc.events.attributes.identities_totalTotal number of identities involved.keyword
sailpoint_identity_sc.events.attributes.infoInformation related to the attribute in the event. Example: SailPoint.keyword
sailpoint_identity_sc.events.attributes.interfaceInterface associated with the event.keyword
sailpoint_identity_sc.events.attributes.match_all_accountCriteria for matching all accounts.keyword
sailpoint_identity_sc.events.attributes.match_all_accounts_afterMatching criteria for accounts after the event.keyword
sailpoint_identity_sc.events.attributes.match_all_accounts_beforeMatching criteria for accounts before the event.keyword
sailpoint_identity_sc.events.attributes.modified_afterLast modification timestamp after the event.keyword
sailpoint_identity_sc.events.attributes.modified_beforeLast modification timestamp before the event.keyword
sailpoint_identity_sc.events.attributes.nameName of the entity.keyword
sailpoint_identity_sc.events.attributes.operationType of operation.keyword
sailpoint_identity_sc.events.attributes.orgOrganization involved in the event. Example: acme.keyword
sailpoint_identity_sc.events.attributes.podPod name involved in the event. Example: stg03-useast1.keyword
sailpoint_identity_sc.events.attributes.process_idProcess identifier.keyword
sailpoint_identity_sc.events.attributes.scopeScope of the event.keyword
sailpoint_identity_sc.events.attributes.segmentSegment associated with the event.keyword
sailpoint_identity_sc.events.attributes.source_nameName of the source involved in the event.keyword
sailpoint_identity_sc.events.attributes.user_idUser identifier.keyword
sailpoint_identity_sc.events.attributes.users_addedUsers added during the event.keyword
sailpoint_identity_sc.events.createdISO-8601 date-time indicating when the object was created.date
sailpoint_identity_sc.events.detailsIdentifier for event details.keyword
sailpoint_identity_sc.events.idUnique identifier for the access profile.keyword
sailpoint_identity_sc.events.ip_addressIP address of the target system.ip
sailpoint_identity_sc.events.nameName of the access profile.keyword
sailpoint_identity_sc.events.objectsObjects affected by the event.keyword
sailpoint_identity_sc.events.operationOperation or action performed during the event.keyword
sailpoint_identity_sc.events.orgOrganization associated with the event. Example: acme.keyword
sailpoint_identity_sc.events.podName of the pod involved in the event. Example: stg03-useast1.keyword
sailpoint_identity_sc.events.stackThe event stack. Example: Type.keyword
sailpoint_identity_sc.events.statusStatus of the event.keyword
sailpoint_identity_sc.events.syncedISO-8601 date-time indicating when the object was queued for synchronization into the search database for API use.date
sailpoint_identity_sc.events.target.nameName of the target or recipient of the event.keyword
sailpoint_identity_sc.events.technical_nameNormalized event name following the pattern 'objects_operation_status'.keyword
sailpoint_identity_sc.events.tracking_numberIdentifier for the group of events.keyword
sailpoint_identity_sc.events.typeType of event. Refer to the Event Types list for more details. Example: "IDENTITY_PROCESSING".keyword

This integration includes one or more Kibana dashboards that visualizes the data collected by the integration. The screenshots below illustrate how the ingested data is displayed.

Dashboard
Changelog
VersionDetailsMinimum Kibana version
1.2.0Enhancement (View pull request)
Pass events from the agent as serialized JSON strings.

Enhancement (View pull request)
Improve ingest pipeline error handling.

Enhancement (View pull request)
Improve agent request error handling.
9.0.0
8.16.1
1.1.0Enhancement (View pull request)
Add option to select the API version to use.

Bug fix (View pull request)
Fix POST request format for events data stream.
9.0.0
8.16.1
1.0.0Enhancement (View pull request)
Release package as GA.
9.0.0
8.16.1
0.3.1Bug fix (View pull request)
Fix default request trace enabled behavior.
9.0.0
8.16.1
0.3.0Enhancement (View pull request)
Enable request trace log removal.
9.0.0
8.16.1
0.2.1Bug fix (View pull request)
Added description to ssl nodes in package level manifest.yml file to including links to documentation.
9.0.0
8.16.1
0.2.0Enhancement (View pull request)
Update Kibana constraint to support 9.0.0.
9.0.0
8.16.1
0.1.0Enhancement (View pull request)
Initial release.
8.16.1

[8]ページ先頭

©2009-2026 Movatter.jp