New Capability: Privilege Classification in Identity Security Cloud

Description

:bangbang: This is NOT a breaking change.

SailPoint is proud to present the new Privilege Classification feature in Identity Security Cloud (ISC). This features allows customers to use new classifications levels to assign privilege indicators on entitlements. These new levels will replace the existing privilege boolean flag on entitlements, providing more granular insight into risk on entitlements.

New Capabilities

Privilege Classification introduces new levels of privilege that can be assigned to entitlements. Assigning High, Medium or Low level of Privilege allows a more granular approach to privilege classification within ISC. This allows more focus on High privilege access first, then followed by medium and low risk entitlements etc.These privilege levels can be assigned automatically through building criteria. Criteria can be configured for each of the High, Medium and Low levels. The privilege level can also be manually overwritten on individual entitlements, allowing the level to be increased, decreased or set to none, allowing complete control.

Problem

  • The current entitlement boolean flag is no longer adequate reflection of privilege in the current complex world of privileged entitlements. Also, the boolean flag can only be set manually which is a huge manual effort to utilize.
  • Many source vendors publish lists of privilege entitlements. These aggregated entitlements are not automatically set to privileged in ISC, which causes significant friction.
  • Classification of entitlements as privileged is a manual process in both the UI and API.

Solution

The privilege boolean flag on entitlements will be replaced with a new Direct Privilege Classification level. These privilege levels can be assigned automatically through building criteria. Criteria can be configured for each of the High, Medium and Low levels. The privilege level can also be manually overwritten on individual entitlements, allowing the level to be increased, decreased or set to none, allowing complete control.

Below is a screenshot of a source with the setting selected to assign the High privilege level to all entitlements on that source.

Below is a screenshot of custom criteria defined to assign the High privilege level based on admin defined criteria:

Manually overriding the direct privilege for a single entitlement:

Who is affected?

All IdentityNow and ISC suites customers will have access to Privilege Classification

:double_exclamation_mark: Pending final packaging decisions. Post will be updated once final decisions are confirmed.

Action Required

No action is required. This is not a breaking change.

As part of the migration, all existing entitlements that currently use the privilege boolean flag will automatically be mapped to the High Privilege Classification level. Customers can then adjust classifications as needed using criteria or manual overrides.

Important Dates

Rollout will begin in early Feb 2026 and will end in March 2026.

1 Like

So a rollout has already begun? That seems like very little notice for people to adapt to this breaking change.

If I were a customer that relied on the privileged flag returning a Boolean value to determine the approval flow in something like servicenow or sailpoint workflows as part of my access request process, I wouldn’t be very happy with the fire drill I’m suddenly finding myself in.

I find it odd that something like the API versioning strategy gives you YEARS to adapt to potential breaking changes, but this group has given customers DAYS.

I know @angelo_mekenkamp has given this feedback so many times without much movement, but product groups need to get behind a unified roll out schedule for any breaking changes so your customers have adequate time to adapt.

The first time I heard about this feature was a couple of weeks ago when an ASC was presenting about it. When I asked if the plan was to create a new field with these values or replace the existing field, the answer was “I don’t know, I’ll have to check with the product team on this”

I guess I have my answer now.

5 Likes

Just so I’m clear, is this the change?

Before

{
“privileged”: true
}

After

{
“privileged”: “high”
}

I disagree with the ‘no action required’ part - I assume we’re not the only customer who actually uses the current’ ‘privileged’ flag outside of the visible UI. For example, all our privileged accesses are certified differently through scripts to leverage governance groups instead of managers.
All of these processes will need to be updated.

Is it possible to get a more concrete rollout date? If not rescheduling this at a later quarter so customers have more time to prepare and documentation to be ready to support this change.

Also echoing previous sentiments - it’s jarring that this is is announced in the middle of February with rollout starting ‘early Feb’ and is just assumed to not be a breaking change for any customer. The API docs are not even updated with this change that could theoretically already be present on our tenant so I have no way of preparing for this in advance.

Hi Mark/all,

Please let me reassure you this is NOT a breaking change.

We are introducing the new Privilege Levels, but we are maintaining 100% backward compatibility with the existing boolean flag.

All existing entitlements with privileged=true will be migrated to privilegeLevel.direct=high, and then internally all privilegeLevel.direct=high entitlements will map back to privileged=true.

Any API calls, saved searches, certification campaigns etc that utilise the ‘privileged’ boolean attribute will continue to work correctly because any privilegeLevel.direct=high will map back to privileged=true.

We are committed to supporting all API calls for 2 years, so the internal mapping of high->true will still work as expected for the next 2 years.

Like I say, this is NOT a breaking change.

You can continue to use, without any changes:

{
  "privileged": true
}

And you can also, in parallel (using a new API version), use the new levels with:

{

  "privilegeLevel.direct": "high"

}

or

{

  "privilegeLevel.direct": "medium"

}

etc.

So to be clear, filtering on privileged=true or privilegeLevel.direct=high will return the exact same results.

The same applies to any POST/PATCH API calls that use privileged=true, they will set privilegeLevel.direct=high and also map back to privilged=true.

Regards

Kev/.

2 Likes

See comment on main post.

Please see the comment on the main post.

That’s great news, thank you

1 Like

Thank you for the clarification. The language of “replacing” was unclear as to how that replacement was going to happen.