Saviynt Certified IGA Professional Exam (L100) 온라인 연습
최종 업데이트 시간: 2025년06월06일
당신은 온라인 연습 문제를 통해 Saviynt SAVIGA-C01 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.
시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 SAVIGA-C01 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 60개의 시험 문제와 답을 포함하십시오.
정답:
Explanation:
To make an Entitlement request time-bound in Saviynt, the configuration used on the Entitlement Type is D. Start Date/End Date while raising a Request.
Here's a breakdown:
Saviynt's Entitlement Management: Entitlements represent specific access rights within an application. Saviynt allows fine-grained control over how these entitlements are requested and granted.
Entitlement Type Configuration: Within Saviynt, each Entitlement Type can be configured with various settings that govern its behavior during access requests.
Time-Bound Access: To enforce time-limited access, Saviynt provides the option to require a Start Date and End Date during the request process.
"Start Date/End Date while raising a Request": This configuration setting, when enabled on an Entitlement Type, forces the requester to specify a desired start and end date for the access. This ensures that the granted access will only be valid for a specific period.
Saviynt's Workflow Engine and Provisioning: When a request with a start and end date is approved,
Saviynt's workflow engine will typically handle the provisioning and de-provisioning based on these
dates. If connected integration is set up, it may schedule the activation and deactivation of the
access in the target system accordingly.
Other Options:
A. Ask for Start Date while revoking: This setting is related to revoking access, not granting time-bound access.
B. Allow update of Access End Date: This allows modification of the end date after the access has been granted, but it doesn't enforce a time-bound request from the outset.
C. Config JSON for Request Dates: While JSON might be used internally for configuration, this is not the specific setting that directly enables time-bound access requests.
In summary: The "Start Date/End Date while raising a Request" configuration on an Entitlement Type in Saviynt is the key to enforcing time-bound access, ensuring that access is granted only for a specific, pre-defined period.
정답:
Explanation:
The maximum file attachment limit for a request in Saviynt is typically 10.
Here's an explanation:
Saviynt's Access Request System (ARS): The ARS allows users to attach files to access requests to provide supporting documentation or justification.
Attachment Limits: To prevent excessive storage usage and potential performance issues, Saviynt imposes limits on the number and size of attachments allowed per request.
Default Limit: The default maximum number of attachments allowed per request in Saviynt is generally 10.
Configuration: While 10 is the common default, it's worth noting that this limit might be configurable within the ARS settings in some Saviynt deployments. However, significantly increasing this limit could impact performance.
File Size Limit: In addition to the number of attachments, there's also usually a limit on the individual file size and the total size of all attachments combined. This is also generally configurable. These file size limits are important for maintain system stability and performance.
Error Handling: If a user attempts to exceed the attachment limit, Saviynt will typically display an error message, preventing them from submitting the request until the number of attachments is reduced.
정답:
Explanation:
In Saviynt's Access Request configurations, the following can be set up as either optional or mandatory based on business requirements:
A. Approval comments: When an approver approves or rejects a request, they can be required to provide comments, or it can be made optional.
B. Add Attachment: Requesters can be allowed or required to attach supporting documentation to their access requests.
C. Business justification at Request level: Requesters can be obligated to provide a business justification for their access request, or it can be made optional. Here's a breakdown with Saviynt IGA references:
Saviynt's Access Request System (ARS) Configuration: Saviynt provides granular control over the ARS's behavior, allowing administrators to customize various aspects of the request process, including data validation and required fields.
Mandatory vs. Optional Fields: Many fields and actions within the ARS can be configured as either mandatory or optional. This allows organizations to tailor the request process to their specific needs and compliance requirements.
Configuration Locations: These settings are typically found within the ARS configuration section of Saviynt's administrative interface.
Approval Comments: Often configurable within the workflow definition, at the approval step level.
You can define whether comments are required for approval, rejection, or both.
Add Attachment: Generally found under general ARS settings, allowing you to enable or disable attachments and potentially set them as mandatory.
Business Justification: Also found within the ARS settings, allowing you to toggle the requirement for
a business justification at the request level or even at the individual entitlement level. Business Rationale: The flexibility to make these elements optional or mandatory allows organizations to balance the need for information with the desire for a streamlined user experience. For example, high-risk access requests might require detailed justification and attachments, while low-risk requests might not.
Saviynt's Audit Trail: Regardless of whether these fields are mandatory or optional, Saviynt's audit trail will capture the information provided, ensuring a complete record of the request and approval process.
In summary: Saviynt's ARS allows administrators to configure approval comments, attachments, and business justifications as either optional or mandatory, providing the flexibility to adapt the access request process to meet diverse organizational needs and compliance requirements.
정답:
Explanation:
The component that filters the requestable applications under "Request New Access" in Saviynt is the Access Query.
Here's a detailed explanation:
Saviynt's Access Request System (ARS): As the front end for requesting access, the ARS needs a mechanism to determine which applications (and entitlements) should be displayed to a user as requestable.
Access Query: This is a powerful feature within Saviynt that allows administrators to define specific criteria to control the visibility of applications and entitlements in the ARS. Think of it as a filter that determines what a user can see and request.
How Access Queries Work:
Defined on Applications/Entitlements: Access Queries are configured on individual applications or entitlements within Saviynt.
Based on User Attributes: They use user attributes (e.g., department, location, job title, group memberships) and other criteria (e.g., risk level) to determine if a user should see a particular application or entitlement.
Dynamic Filtering: When a user accesses the "Request New Access" section, Saviynt evaluates the Access Queries associated with each application and entitlement in real-time. Based on the user's attributes, the system dynamically filters the list, showing only the applications and entitlements that match the query conditions.
Saviynt's Security Model: Access Queries are a fundamental part of Saviynt's security model. They ensure that users are only presented with access options that are relevant and appropriate for their role and context, preventing accidental over-provisioning and reducing the attack surface.
Other Options:
Access Add Workflow: While essential for processing access requests, the workflow itself doesn't filter which applications are initially displayed.
Provisioning Connection: This relates to how Saviynt connects to target systems for automated provisioning. It doesn't control the initial visibility of applications in the ARS.
Whom to Request: This setting might determine the available approvers, but it doesn't filter the list of requestable applications.
In essence: Access Queries act as a dynamic filter, leveraging user attributes and defined criteria to determine which applications and entitlements are presented to a user within Saviynt's "Request New Access" interface, ensuring a personalized and secure access request experience.
정답:
Explanation:
When an "Add Access" task is successfully completed in Saviynt, the applicable status is typically "Provisioned." Here's a detailed explanation with Saviynt references:
Saviynt's Task Management: Saviynt uses tasks to track the progress of various operations, including access provisioning. These tasks are generated as part of workflows, such as the "Access Add Workflow."
"Add Access" Task Type: This specific task type is created when the access request is approved and the system is ready to grant the requested access to the target application.
Task Statuses in Saviynt: Saviynt uses different statuses to indicate the current state of a task.
Common statuses include:
Pending: The task is waiting to be processed.
In Progress: The task is currently being executed.
Provisioned: This status signifies that the requested access has been successfully granted to the user in the target system.
Failed: The task encountered an error and could not be completed.
Manually Provisioned: The task was completed manually by an administrator, rather than through automated provisioning.
Success: While sometimes used, this status is less specific than "Provisioned" in the context of "Add
Access" tasks, since it does not specify that the action completed was a provisioning action.
Active: Typically applies to accounts or users, not tasks.
Saviynt's Workflow Engine: The workflow engine in Saviynt updates the task status as it progresses through the defined steps. For connected applications, the workflow engine might directly interact
with the target system's API to provision the access. Once the provisioning is successful, the status is updated to "Provisioned."
Saviynt's Audit Trails: Saviynt maintains detailed audit trails, and the task status changes are logged.
This provides a clear record of when access was provisioned for a user.
Other Options:
Success: As mentioned above, this is a general status. While technically correct (the task succeeded), "Provisioned" provides more context.
Manually Provisioned: This status is only applicable if an administrator intervened and manually granted the access outside of the automated workflow.
Active: This status typically pertains to a user or account's overall status, not specifically to the completion of an "Add Access" task.
정답:
Explanation:
To make an application available for access requests (either self-service or requests for others), the Access Add Workflow needs to be configured within Saviynt. This workflow defines the process that governs how access to the application is granted. Here's a breakdown with Saviynt IGA references: Saviynt's Access Request System (ARS): This is the module within Saviynt that handles access requests. The ARS relies on defined workflows to manage the approval and provisioning process. Access Add Workflow: This specific type of workflow within Saviynt's ARS is triggered when a user requests access to an application or entitlement. It dictates the steps involved, such as: Requester Details: Capturing information about who is requesting access.
Application/Entitlement Selection: The user selects the application (and potentially specific roles or entitlements within that application) for which they are requesting access.
Approval Routing: Defining the approval chain (e.g., manager approval, application owner approval, etc.). This is configured within the workflow using various approval activities.
Provisioning: Upon approval, the workflow can trigger automated provisioning of access to the target system (if connected integration is set up).
Saviynt's Application Onboarding: For an application to be available in the ARS, it needs to be onboarded into Saviynt. During this process, you would typically define the relevant entitlements (access rights) associated with the application.
Workflow Configuration in Saviynt: Saviynt's admin interface allows administrators to create and customize workflows using a visual designer. This includes setting up conditions, defining approval steps, and configuring actions to be taken at each stage of the workflow.
Other options:
Proposed Accounts Workflow: This is less common, often used to suggest potential accounts during the request or account creation process. It's not the primary mechanism for making an application available for access requests.
Access Remove Workflow: This workflow is used when access needs to be revoked, not granted. Emergency Access ID Request Workflow: This workflow is specific to requesting temporary, elevated access in emergency situations. It's not the workflow for general access requests to applications.
정답:
Explanation:
User Account Correlation Rules in Saviynt are specifically designed to map imported accounts to existing users within the system. These rules define the logic for matching accounts to users based on various attributes, such as employee ID, email address, or username.
Why other options are incorrect:
Account to User Rule: This is not a standard rule type in Saviynt.
Account Name Rule: This might focus on naming conventions for accounts, not correlating them to users.
Technical Rule: This is a broader category of rules and doesn't specifically address account-user mapping.
Saviynt IGA
Reference: Saviynt Documentation: The section on Account Correlation Rules provides detailed information on how to configure these rules for different scenarios.
Saviynt Use Cases: Saviynt often provides examples and use cases demonstrating how to use User Account Correlation Rules to automate account mapping during imports.
정답:
Explanation:
Saviynt's Identity Repository is the central hub for storing and managing all identity-related information.
It includes:
Users: Representing individuals and their attributes.
Accounts: Representing user access to specific systems or applications.
Entitlements: Representing permissions and access rights within those systems.
Roles: Representing collections of entitlements that define job functions or responsibilities.
Why other options are incorrect:
A, B, and D: These options include elements like Identity Rules, Workflows, and SAV Roles, which are important components of Saviynt but are not core parts of the Identity Repository itself. Saviynt IGA
Reference: Saviynt Documentation: The section on the Identity Repository describes its function and the types of data it stores.
Saviynt User Interface: The Identity Repository is a key section within the Saviynt interface, where you can view and manage users, accounts, entitlements, and roles.
정답:
Explanation:
A Service Desk Connection in Saviynt is used to integrate with external ticketing systems.
This integration allows Saviynt to:
Automate request fulfillment: Access requests created in Saviynt can automatically generate tickets in the service desk system.
Track request status: Saviynt can update the status of access requests based on the corresponding ticket status in the service desk system.
Improve communication: Integration facilitates seamless communication and collaboration between
Saviynt and the service desk team.
Why other options are incorrect:
Service Ticket Connection, Ticket Connection, Provisioning Connection: These are not standard terms
used in Saviynt for service desk integration.
Saviynt IGA
Reference: Saviynt Documentation: The documentation on integrating with Service Desk systems explains the purpose and configuration of a Service Desk Connection.
Saviynt Connectors: Saviynt provides connectors for popular service desk solutions like ServiceNow, facilitating the integration process.
정답:
Explanation:
An AD Connection in Saviynt is required to establish communication and data exchange with an Active Directory (AD) domain. This connection enables Saviynt to automatically reconcile accounts from AD, ensuring that the identity information in Saviynt stays synchronized with the AD.
Why other options are incorrect:
AD Control, AD Rule, AD Role: These terms are not standard components within Saviynt's framework
for integrating with Active Directory.
Saviynt IGA
Reference: Saviynt Documentation: The section on integrating with Active Directory clearly outlines the need for an AD Connection and provides step-by-step instructions for configuring it.
Saviynt Connectors: Saviynt offers pre-built connectors for Active Directory that simplify the process of establishing the connection.
정답:
Explanation:
In Saviynt, a User represents the unique identity of a person. It's the central object that ties together all the information about an individual, including their accounts, entitlements, roles, and attributes.
Why other options are incorrect:
Endpoint: Represents a system or application, not a person.
Employee: While many users might be employees, the term "user" is more general and can include contractors, partners, etc.
Account: Represents a user's access to a specific system, not their overall identity.
Saviynt IGA
Reference: Saviynt Documentation: Throughout the documentation, "User" consistently refers to the individual's identity within the system.
Saviynt User Interface: The User Management section in Saviynt focuses on managing the lifecycle and access of individual users.
정답:
Explanation:
In Saviynt, Endpoints represent the systems or applications that Saviynt manages. Accounts, entitlement types, and entitlement data are all directly associated with these endpoints because they define how access is structured and granted within those specific systems.
Endpoints as the Foundation: Endpoints are the core objects in Saviynt's identity governance framework. They provide the context for managing access, as all entitlements and accounts exist within the context of a specific endpoint (application or system).
Why other options are incorrect:
Roles: Roles are collections of entitlements, but they are not the primary object that accounts and entitlements are directly linked to.
Workflows: Workflows are processes, not the systems or applications themselves.
Security Systems: While related to security, this term is too broad and doesn't specifically refer to the systems being managed.
Saviynt IGA
Reference: Saviynt Documentation: The section on Application Onboarding and Endpoint Management in Saviynt's documentation clarifies the role of endpoints as the central objects for managing access. Saviynt User Interface: When configuring applications or systems in Saviynt, you define them as endpoints, and all related accounts and entitlements are managed within that endpoint's context.
정답:
Explanation:
In Saviynt, "Entitlements" refers to any type of access granted to users within a managed system or application. This broad term encompasses various forms of access controls, including: Groups: Collections of users with shared access permissions.
Roles: Sets of permissions that define a user's job function or responsibilities.
Permissions: Specific access rights to resources or functionalities.
Responsibilities: Duties or tasks associated with a particular role.
Why other options are incorrect:
Endpoints: Refer to network devices or systems, not access rights.
Workflows: Are automated processes for tasks like approvals, not access itself.
Accounts: Represent user identities, not the specific access they have.
Saviynt IGA
Reference: Saviynt Documentation: Saviynt's documentation consistently uses the term "Entitlements" to describe the various types of access it manages.
Saviynt User Interface: The Saviynt interface uses "Entitlements" throughout its menus and features related to access management.
정답:
Explanation:
Disconnected applications in Saviynt are those that do not have real-time integration with the platform for provisioning and de-provisioning users. Therefore, automated provisioning would be turned OFF for these types of applications.
Disconnected Applications: These applications typically require manual intervention or custom scripts to manage user access. Saviynt can still manage entitlements and access requests for these applications, but it doesn't directly provision or de-provision accounts.
Other Application Types:
Service Desk Application: Usually integrated with Saviynt for automated request fulfillment. Hybrid Application: May have some level of automated provisioning, depending on the specific configuration.
Connected Application: Fully integrated with Saviynt for real-time, automated provisioning.
Saviynt IGA
Reference: Saviynt Documentation: The section on Application Onboarding in Saviynt's documentation explains the different application types and their integration capabilities, including the concept of disconnected applications.
정답:
Explanation:
The UIADMIN ROLE in Saviynt grants users the privilege to edit UI (User Interface) labels. This role is crucial for customizing the Saviynt interface to align with an organization's terminology and branding.
UI Customization: Saviynt allows administrators to modify various UI elements, including labels, to improve user experience and comprehension. The UIADMIN ROLE provides the necessary permissions for these modifications.
Why other options are incorrect:
The other options are not standard Saviynt roles and do not have any associated privileges for UI label editing.
Saviynt IGA
Reference: Saviynt Documentation: The documentation on Saviynt's administration and configuration settings includes information about UI customization and the associated UIADMIN ROLE.
Saviynt Support: Saviynt's support resources may contain articles or knowledge base entries related to UI customization and the permissions required.