To answer the critical question, "Who is using what?", Sastrify relies on a rock-solid foundation of identity data. By connecting your Identity Provider (IdP)—such as Okta, Google Workspace, or Microsoft Entra ID—you establish a Single Source of Truth that powers usage tracking, Shadow IT discovery, and departmental enrichment.


IN THIS ARTICLE


The Three Pillars of Identity


Under Sastrify’s "End-to-End" identity model, we distinguish between three interconnected concepts:

  1. Identities (The Foundation): Created exclusively via your IdP sync. These are the "anchors" for all usage data. They cannot be manually added or edited.

  2. Employees (The Enrichment): Sourced from your HRIS (e.g., Workday). These enrich your Identities with metadata like departments and cost centers.

  3. Sastrify Users (The Stakeholders): Application accounts with specific permissions (Admin, Viewer, etc.) who can own subscriptions and receive tasks.


Why Connecting an IdP is Mandatory


Connecting your IdP is the first step in setting up your Sastrify environment, as it is the mandatory anchor for the following features:

  • Browser Extension: You cannot deploy the extension or collect usage data without an active IdP connection.

  • HRIS: While you can connect an HRIS first, the data remains "locked" or "inactive" until an IdP is connected to provide the matching identities.

  • Insights: All activity (login events, clicks, etc.) must be mapped to a verified IdP identity to appear in your Insights dashboard.


How to Connect Your Identity Provider



  1. Navigate to Integrations > Identity Provider.

  2. Select your provider (e.g., Okta, Google Workspace, Microsoft Entra ID), and click Connect.

  3. Follow the authentication steps (these vary by provider).
    • Google/Microsoft: Sign in and accept the authorization prompt.

    • Okta: Enter your OAuth 2.0 app credentials. (See our Okta Step-by-Step Guide for details).

  4. Once connected, your status will appear as “Connected” on the IdP integration setting page, and Sastrify will perform an initial sync to pull your identities.

  5. View and verify your imported list under the Identities tab within the integration page.



Data Retrieval & Handling


Sastrify performs a sync every 10 minutes, focusing on three data types: Identities, Assets (Applications), and Usage Events. For a detailed breakdown of the data retrieved by each Identity Provider (IdP) integration, please refer to the following:


In doing so, we maintain the following approaches to data handling:

  • User identifiers are cryptographically hashed to ensure anonymization.
  • Only whitelisted business SaaS applications are monitored. We apply automatic exclusion of certain domains, including career sites, job boards, and non-business application URLs.
  • Data is transmitted securely via HTTPS, using OAuth for authentication.
  • Only essential usage metrics are gathered to support organizational analytics.


Core Business Rules:

  • Source of Truth: If the IdP is disconnected, all dependent data (Usage, HRIS enrichment) becomes invalid. Reconnecting the IdP is required to restore these insights.

  • No Manual Creation: To ensure data integrity, identities can only be created via IdP sync.

  • Limits: Sastrify supports up to 20,000 identities by default. If your organization exceeds this, please contact our support team.



What's Next?


First Order of Business: Enrich with HRIS

  1. Connect your HRIS to add department and cost center context to your identities. Refer to the HRIS Setup Guide for step-by-step instructions.
  2. Next, navigate to Integrations > Identities to review the automatic matching between identities from your IdP and employees from your HRIS. Sastrify automatically matches records based on identical email addresses. You can manually review, adjust matches, and link any unmatched identities as needed.


  3. Finally, invite identities to Sastrify. Select the checkbox next to the identity (individually or in bulk), then click Invite to grant access.


Now that your foundation is set, follow this path to unlock the full power of the platform:

  1. Deploy the Extension: Roll out the browser extension to capture deep usage data and uncover Shadow IT across your organization.
  2. Monitor the Shadow IT Radar: Navigate to Risk Monitoring > Shadow IT Radar to review, approve, or sanction newly discovered assets. See the Radar Guide for detailed instructions.
  3. Analyze Insights: Visit the Insights page to visualize software activity by identity, department, and usage status. Refer to the Insights Guide to learn how to navigate the feature.



Frequently Asked Questions


Please refer to the Identity Provider (IdP) Integration FAQ page for a complete list of frequently asked questions