Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

SailPoint Rule Development Kit Tutorial

Sailpoint
05/12/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • The SailPoint Rule Development Kit enables local development and testing of cloud rules using Java, Maven, and BeanShell, with IntelliSense support in IntelliJ for improved coding experience
  • The tutorial demonstrates building a generic rule that processes date arrays to find either the farthest future date or nearest date, with configurable input/output formats and switch-based operation selection
  • Test-driven development is showcased using JUnit tests with mocked data through the BeanShell interpreter, allowing validation of rule logic before submission to professional services
  • Integration with Identity Security Cloud is demonstrated through transform creation, showing how custom rules accept parameters from source attributes and return processed values for identity provisioning workflows
  • The SailPoint CLI provides functionality to download existing cloud rules from tenants directly into the development kit, streamlining the process of modifying and testing production rules locally

Rule Development Kit Overview and Setup

The SailPoint Rule Development Kit is a development tool that enables developers to write, test, and validate cloud rules locally before uploading them to production tenants. The kit requires Java and Apache Maven, and is available as an open-source project on GitHub. The presenter demonstrates the complete setup process, including cloning the repository, configuring IntelliJ for development, and using the SailPoint CLI to download existing cloud rules from tenants. A key feature highlighted is the ability to inject language references in XML files to enable IntelliSense code completion, significantly improving the development experience when writing BeanShell rules.

Building a Date Processing Rule

The tutorial walks through creating a generic rule that processes date arrays with two primary functions: identifying the farthest future date and finding the nearest date to today. The rule accepts comma-separated date values, input format specifications, and output format requirements. The presenter demonstrates test-driven development by creating JUnit tests that mock data using the BeanShell interpreter, setting variables, and validating rule logic before deployment. The implementation includes proper error handling, null checking, and uses Java's SimpleDateFormat for date parsing and comparison operations.

Testing and Integration with Identity Security Cloud

The session concludes with end-to-end testing of the developed rule within Identity Security Cloud. The presenter demonstrates how to create a transform that calls the custom rule, passing in account attributes from a delimited file source as parameters. Using a Python-based transform testing tool, the rule is validated against real identity data, confirming that it correctly identifies and returns the farthest date from a set of three dates in the specified output format. The presenter emphasizes that custom cloud rules must be submitted to SailPoint professional services for deployment to production tenants.

Chapters

0:00 - Introduction to Rule Development Kit
1:27 - Setup and Installation
3:38 - Downloading Rules with SailPoint CLI
5:48 - Creating a New Generic Rule
6:34 - Enabling IntelliSense in XML
8:09 - Setting Up JUnit Tests
11:13 - Mocking Data with BeanShell Interpreter
15:39 - Implementing Date Parsing Logic
20:23 - Writing Get Farthest Date Function
29:07 - Writing Get Nearest Date Function
34:03 - Testing in Identity Security Cloud
37:39 - Creating Transform with Rule
43:02 - End-to-End Validation

Key Quotes

0:14 "It is a kit that we've developed to help you write your cloud rules. So, you know, you can test these, you can, you know, make sure that your logic is sound before they're uploaded to your tenant."
3:30 "We wanted the ability to download our cloud rules to this tool. So, if you caught an earlier session, the SailPoint CLI, we actually have that functionality now in the CLI."
6:48 "When you're writing your rule, it's NICE to have code completion. So, what we can do is right-click inside of this XML source and click on Show Context Actions and then click on Inject Language or Reference."
18:50 "I'm actually going to make a mistake here on purpose, just to show you what it does when you do, in fact, make like a syntax error or anything like that."
37:25 "Typically with a cloud rule, you know, you'll develop it, and then you'll need to submit it to professional services. So, I did that in the background."
43:51 "We walked through developing a rule, you know, mocking our data. We tested it kind of end-to-end here. So, we're always looking to improve this experience."

Categories:
  • » Cybersecurity » Application Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Identity & Access
  • Technical Deep Dive
  • How-To
  • DevSecOps
  • Getting Started
  • Rule Development Kit
  • BeanShell Scripting
  • Identity Security Cloud
  • Test-Driven Development
  • Date Processing
  • Transform Development
  • SailPoint CLI
  • Local Rule Testing
  • Maven Integration
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: SailPoint Rule Development Kit Tutorial

              Upcoming Webinar Calendar

              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Reveal Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-reveal-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-phases/
              • 05/20/2026
                08:00 AM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1953/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Adopting AI: From Illusion to Intentional Control
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                Harnessing AI for Smaller Teams: Strategies for Secure Implementation
                https://www.truthinit.com/index.php/channel/1951/harnessing-ai-for-smaller-teams-strategies-for-secure-implementation/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: Essential Fixes First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-essential-fixes-first/

              Upcoming Events

              • May
                12

                Implementing Effective Strategies for Active Directory Security and Data Protection

                05/12/202611:30 PM ET
                • May
                  13

                  Transforming the Black Box: Reveal Hidden Threats and AI Risks through Data Lineage

                  05/13/202601:00 AM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage

                    05/13/202605:00 AM ET
                    • May
                      19

                      Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases

                      05/19/202601:00 PM ET
                      • May
                        20

                        Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                        05/20/202608:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version