How should AD group–based application access be modeled in SailPoint ISC?

Hi @ebesamuel2,

You do not need to create separate application objects for these AD-governed systems in ISC. Creating duplicate AD sources pointing to the same directory is not supported or recommended. Instead, the application distinction happens at the Access Profile layer on your existing AD source. You model each logical application by:

Grouping the relevant AD groups into application-specific Access Profiles.

Using naming conventions (e.g., “App1 - Admin Access,” “App1 - Read Access”)

Making those Access Profiles requestable

This way, certifications and requests can be scoped by Access Profile naming patterns, giving you application-level governance without creating separate application/source objects. The AD source remains singular; governance becomes application-centric through Access Profile design. This is the standard ISC pattern for AD-governed apps.

Let us know if this was useful to you and helps you make decision.