Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Building Custom Identity Experiences with Low-Code Tools

Sailpoint
05/12/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • User experience directly drives technology adoption — 80% of failed projects cite poor UX as the primary cause, yet organizations rarely customize vendor-provided interfaces due to historically high development barriers.
  • Modern low-code platforms like UI Bakery, Retool, and DronaHQ enable citizen developers to build custom identity governance experiences in hours instead of months, using visual components and API integrations.
  • Real customer use cases demonstrate practical applications: a GRC team dashboard for managing thousands of certification campaigns, and an HR risk assessment tool for evaluating privileged access during workforce reductions.
  • AI-assisted development features in these platforms further reduce complexity, helping non-professional developers troubleshoot code and accelerate delivery of production-ready applications.
  • The barrier to creating contextual, business-specific experiences has dropped dramatically — organizations no longer need to accept vendor interfaces as-is or engage lengthy consultancy projects for customization.

The Experience-Adoption Connection

Nate Jackson, a SailPoint solution consultant and developer community member, opens by establishing a critical principle: adoption equals experience. Drawing from his career as a customer, consultant, and vendor, he argues that even the best technology fails if it's not consumable and intuitive for its intended audience. He supports this with compelling statistics — 80% of failed projects cite poor user experience as the primary cause, and 96% of unhappy employees report inadequate productivity tools. Conversely, organizations that refactor applications see a 135% increase in key performance indicators. The session challenges the traditional acceptance of vendor-provided experiences and explores what becomes possible when the barrier to customization drops significantly.

Live Build: Governance Campaign Dashboard

The demonstration centers on a real customer use case where a GRC team needed to manage thousands of certification campaigns with advanced filtering, sorting, and export capabilities — functionality not readily available in SailPoint's standard interface. Using UI Bakery, a rapid application development platform, Jackson walks through building a custom dashboard in real-time. The process involves connecting to SailPoint's Identity Security Cloud via API, creating data retrieval actions, and configuring a table component with inline filters and export functionality. The entire prototype takes minutes to build, transforming raw JSON API responses into a business-friendly interface without traditional development overhead. Jackson emphasizes that similar platforms like Retool, DronaHQ, and AppSmith offer comparable capabilities, making this approach accessible to citizen developers.

Advanced Use Case: HR Risk Assessment Tool

Jackson presents a more sophisticated application built for a customer facing workforce reductions. The HR team needed to assess termination risk based on privileged access without socializing layoff lists with IT. The resulting tool allows HR business partners to search for an employee, view basic information (department, location, manager), and instantly see if privileged access exists across connected systems. Users can drill into specific data sources to understand the nature of that access and make informed risk determinations. What would traditionally require months of consultancy engagement and multiple feedback cycles was prototyped in under an hour and deployed within weeks. The solution demonstrates how low-code platforms enable business-level developers to deliver production-ready applications that address sensitive, time-critical requirements.

AI-Assisted Development and Future Outlook

The session concludes with observations on how generative AI integration into low-code platforms has further lowered the barrier to entry. Jackson notes that AI assistance helps with contextual troubleshooting, code generation, and problem-solving, making these tools accessible even to non-professional developers. He positions this approach as a fundamental shift in how organizations should think about identity governance experiences — moving from acceptance of vendor-provided interfaces to rapid, iterative customization that matches specific business needs. The key message is that the technology, tools, and community resources (particularly SailPoint's developer community) now exist to make custom experience development a realistic option for organizations of any size.

Chapters

0:00 - Introduction and Experience Thesis
1:31 - The Business Case for Custom UX
4:43 - The 'What If' Vision
6:45 - Live Build: Platform Overview
8:32 - Configuring Data Sources and Actions
10:58 - Building the Certification Campaign Dashboard
17:49 - Preview and Testing
19:11 - Advanced Use Case: HR Risk Assessment
22:53 - Behind the Scenes: Actions and AI Assistance
24:11 - Closing Thoughts

Key Quotes

1:07 "Adoption is equivalent to experience."
1:45 "... 80% of them have failed because the technology used, the outcome delivered, the experience of that did not match the audience's audience. It wasn't intuitive. It wasn't insightful. It wasn't direct for them to use."
4:05 "I'm curious, I ask myself frequently why we don't have the same decisive focus on those experiences, why we've become so beholden to the experiences that vendors provide us."
5:07 "What if you could deliver those experiences to them with clicks and maybe a little bit of code? But more importantly, at the speed of business."
22:01 "All of this, the prototype, this was all built in less than an hour. Very easy to do. And I do not consider myself a professional developer by any stretch of the means."

Categories:
  • » Cybersecurity » Application Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Identity & Access
  • Technical Deep Dive
  • Demo
  • Best Practices
  • DevSecOps
  • Low-Code Application Development
  • Identity Governance User Experience
  • Certification Campaign Management
  • Privileged Access Risk Assessment
  • Citizen Developer Enablement
  • API Integration
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Building Custom Identity Experiences with Low-Code Tools

              Upcoming Webinar Calendar

              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Reveal Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-reveal-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-phases/
              • 05/20/2026
                08:00 AM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1953/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Adopting AI: From Illusion to Intentional Control
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                Harnessing AI for Smaller Teams: Strategies for Secure Implementation
                https://www.truthinit.com/index.php/channel/1951/harnessing-ai-for-smaller-teams-strategies-for-secure-implementation/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: Essential Fixes First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-essential-fixes-first/

              Upcoming Events

              • May
                12

                Implementing Effective Strategies for Active Directory Security and Data Protection

                05/12/202611:30 PM ET
                • May
                  13

                  Transforming the Black Box: Reveal Hidden Threats and AI Risks through Data Lineage

                  05/13/202601:00 AM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage

                    05/13/202605:00 AM ET
                    • May
                      19

                      Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases

                      05/19/202601:00 PM ET
                      • May
                        20

                        Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                        05/20/202608:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version