Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Building Non-Employee Workflows in SailPoint NERM

Sailpoint
05/08/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • SailPoint NERM uses forms, workflows, and attributes to automate non-employee lifecycle management including onboarding, transfers, and offboarding
  • Four workflow types (create, update, batch, automated) handle different scenarios—create workflows appear on dashboards, update workflows trigger from profile pages, batch workflows process multiple profiles simultaneously, and automated workflows execute based on conditions
  • Value builders dynamically generate technical fields like usernames and employee IDs, similar to IdentityIQ transformer rules, eliminating manual data entry
  • The system includes built-in validations (date restrictions, conditional fields based on contractor type) and approval routing to supervisors before profile creation

Forms and Workflows for Non-Employee Management

This technical demonstration explores how SailPoint's Non-Employee Risk Management (NERM) platform uses forms and workflows to manage contractor lifecycles. The session covers the core components of the NERM system: attributes (data fields like text, dropdowns, and profile searches), forms (collections of attributes for data gathering), pages (structured collections of forms), and workflows (automated business processes). The presenter demonstrates four workflow types—create, update, batch, and automated—showing how they handle common non-employee scenarios including onboarding, transfers, and offboarding. The system includes value builders that dynamically generate values like usernames and employee numbers, similar to transformer rules in IdentityIQ.

Live Demonstration of Contractor Onboarding

The demonstration walks through creating a new contractor profile using a create workflow accessible from the dashboard. The process includes gathering personal information, setting start and end dates with built-in validations (preventing past start dates or end dates beyond 365 days), selecting supervisors with department-based filtering, and choosing contractor types that trigger conditional form fields. The system automatically generates technical identifiers like usernames, worker IDs, and email addresses through value builders. After form submission, an approval workflow routes the request to the selected supervisor. Once approved, the profile is created in NERM and can be aggregated into SailPoint IdentityIQ for access provisioning.

Chapters

0:00 - Introduction and Use Cases
0:50 - Attributes and Value Builders
1:51 - Forms and Pages Overview
3:55 - Workflow Types Explained
5:54 - Create Contractor Demo
10:21 - Transfer Contractor Workflow
12:00 - Recap and Conclusion

Key Quotes

0:23 "Some of the common use cases that we see for non-employees are onboarding, offboarding of the non-employees, transferring the contractor from a different department or manager or extending their end date and even sending a notification to the manager when their end date is approaching."
1:28 "There's another component called value builder which is, if I have to give you a reference, it's more like transformer rules that can be used to dynamically generate the value of the attribute and it can be used for attributes like employee number, usernames, email address."
4:26 "There are four types of workflows in create, update, batch and automated and as the name suggests create is to create the profile, update is to update the profile, batch is when you want to run the same action for multiple profiles and automated is when you want to trigger a workflow automatically based on certain conditions."
10:51 "If you want the non-employee to or the contractor to have the same area, department or group as the supervisor or the manager, you can automatically pull that from the sponsor profile."

Categories:
  • » Cybersecurity » Identity & Access Management (IAM)
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Identity & Access
  • Technical Deep Dive
  • Demo
  • Compliance & Governance
  • Non-Employee Risk Management
  • Contractor Lifecycle Management
  • Identity Governance
  • Workflow Automation
  • Form-Based Provisioning
  • SailPoint NERM
  • Access Management
  • Approval Workflows
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Building Non-Employee Workflows in SailPoint NERM

              Upcoming Webinar Calendar

              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                APAC: Establishing an AI Governance Framework for GenAI Throughout the Deployment Process
                https://www.truthinit.com/index.php/channel/1953/establishing-an-ai-governance-framework-for-genai-throughout-the-deployment-process/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Harnessing AI: Transforming Perception into Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transforming-perception-into-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                AI in the Fast Lane: Effectively Managing AI Security for Small Teams
                https://www.truthinit.com/index.php/channel/1951/ai-in-the-fast-lane-effectively-managing-ai-security-for-small-teams/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Satori Spring: Insights from Recent Research on the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/satori-spring-insights-from-recent-research-on-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: What to Address First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-what-to-address-first/

              Upcoming Events

              • May
                12

                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage

                05/12/202601:00 PM ET
                • May
                  12

                  Implementing Effective Strategies for Active Directory Security and Data Protection

                  05/12/202611:30 PM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage

                    05/13/202601:00 AM ET
                    • May
                      13

                      Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage

                      05/13/202605:00 AM ET
                      • May
                        19

                        Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                        05/19/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version