/

Sailpoint

Sailpoint

1Kosmos is a Sailpoint Partner currently building out an identity verification integration with Sailpoint.

Integration type

IGA

What we solve

Identity governance and lifecycle workflows can be undermined by “trust on first use”—accounts and access requests may be created for the wrong person, enabling impersonation and onboarding fraud. This SailPoint integration adds high-assurance identity verification (document + biometric + liveness) to SailPoint-driven joiner and access flows so organizations can confirm the real person behind an identity before provisioning access and meeting compliance requirements.

How it works

1Kosmos provides government-grade biometric identity verification using document authentication, facial biometrics, and liveness detection. Our platform ensures privacy-first, high-assurance identity proofing for workforce and customer identities. Integration with SailPoint verifies employees and users—reducing fraud, impersonation, and synthetic identity attacks while meeting compliance requirements and delivering frictionless experiences at scale.

Integration architecture

SailPoint focuses on identity governance and administration (IGA), making it the control plane for identity lifecycle events. Integration operates through three mechanisms.

Lifecycle event triggers

SailPoint's identity lifecycle workflows (joiner, mover, leaver) trigger 1Kosmos identity proofing as a prerequisite for provisioning access. When a new employee (joiner) is provisioned, the SailPoint workflow pauses provisioning until the user completes 1Kosmos identity verification.








Step-up verification flow

SailPoint governs access across the enterprise application portfolio. Step-up verification applies to governance operations.

Step-up use cases within SailPoint:

  • Access request approval: User requesting elevated privileges must complete LiveID verification before the request enters the approval queue

  • Access certification: Reviewer must verify their identity before certifying high-risk entitlements (prevents delegation of certification authority)

  • Role mining / access intelligence: Biometric verification as a gate before sensitive access analytics dashboards are displayed

  • Separation of duties (SoD) override: When a user requests access that violates an SoD policy and an exception is being considered, LiveID verification is required for both the requester and the approver


Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.