Skip to content

Creating Identity Profiles

Most organizations have one or two authoritative sources: sources that provide a complete list of their users, such as an HR source or Active Directory. When you define a source as authoritative in IdentityNow, an identity is created for each of its accounts.

You make a source authoritative by configuring an identity profile for it. The identity profile determines:

  • Security settings for the identities associated to the identity profile, such as authentication settings.
  • Mappings for populating identity attributes for those identities.
  • The access granted to or removed from those identities when Provisioning is enabled and their lifecycle states change.

Prioritizing Authoritative Sources

Each identity can be associated to only one identity profile. If a user can exist in multiple authoritative sources for your organization, it is important to set the priority order of those sources' identity profiles correctly. Identities will be associated with the highest priority identity profile where they have an account on its authoritative source.

By default, IdentityNow prioritizes identity profiles based on the order they were created. The earlier an identity profile is created, the higher priority it is assigned.

If you need to change this order, you can use the Update Identity Profile API to change the identity profiles' priority attribute values.

Setting Up Identity Profiles

  1. Go to Admin > Identities > Identity Profiles.

  2. Select Create New.

  3. Enter a name for your identity profile. As a best practice, describe the source for this identity profile.

  4. Choose a source from the dropdown list. This source will become an authoritative source, and the source's users will become identities in IdentityNow.

  5. Enter a description for this identity profile.

  6. Configure the identity profile's sign-in and security settings:

    Invitation Options

    • Unless you configure external authentication options (such as pass-through authentication or single sign-on), only invited users can sign in to IdentityNow. You can choose to invite users manually or automatically. If you have the provisioning service enabled for your org, you can configure the identity profile to automatically invite users to join IdentityNow when they enter a specific lifecycle state.
    • Refer to Inviting Users to Register with IdentityNow for details.

    Sign-in Method

    • < Site > User Name & Password - Users in this identity profile sign in to IdentityNow with the username and password created during their IdentityNow registration process.
    • Directory Connection - Users loaded from the identity profile sign in using the password associated with the source selected from the Authentication Source dropdown list. This type of authentication is also referred to as pass-through authentication.
    • Multifactor Authentication - Users in this identity profile sign in using a mobile authenticator application such as Google Authenticator or Duo Mobile.

    Block Access From

    • Off Network - If you select this option, users with IP addresses outside of your specified network block won't be able to sign in to IdentityNow. Configure a network block in Restricting IdentityNow Access.
    • Untrusted Geography - You might have configured a list of untrusted countries. If you select this option, users in those countries won't be able to access IdentityNow.
    • Alternatively, you might have created a list of trusted countries. If this is the case, and you select this option, users outside of those trusted countries won't be able to access IdentityNow.

    Password Reset and User Unlock Settings

    • Enable Two-Factor Authentication - Select this option to require users to complete two (rather than the standard one) of the enabled Password Reset and User Unlock Methods before resetting their passwords or unlocking their IdentityNow accounts. Refer to Enabling Two-Factor Authorization for more information.
    • Mask Phone Numbers - Select this option to enable phone number masking when users are resetting their passwords.

    Password Reset and User Unlock Methods

  7. Select Save.

Note

An identity profile cannot be created while an account aggregation is running.

Now that you've set up an identity profile in IdentityNow, you are ready to map the identity profile attributes to the appropriate source attributes.

Defining Identity Profile Attributes

Mappings define how each identity profile's attributes, also known as identity attributes, should be populated for its identities. Identity attributes can be mapped from account attributes on any source and can differ for each identity profile.

For example, your Employees identity profile could map most attributes from your HR system while the email attribute is sourced from Active Directory. At the same time, contractors' information might come exclusively from Active Directory.

You can also configure and apply a transform or rule if you need to make changes to a source value in setting your identity attributes.

Important

The special characters * ( ) & ! cannot be used in the source attribute mapped to a username or alternative sign-in attribute. If the username or other sign-in attribute includes any of these special characters, the user associated with the identity may not be able to sign in to or otherwise access IdentityNow.

Mapping Identity Attribute Values

The Mappings page contains the list of identity attributes. This includes both the default attributes included with IdentityNow and identity attributes you have added for your site.

To map identity attributes for identities in an identity profile:

  1. Open the identity profile you want to edit and select the Mappings tab.

    In some cases, IdentityNow sets a default mapping from attributes on the account source. Match IdentityNow attributes to source attributes.

    Required Attributes

    • The identity attributes User Name (uid), Work Email (email), and Last Name (lastname) are required. They must be set with a mapping for each identity profile and cannot be null for any identity.
    • User Name must be unique across all identities from any identity profile.
    • Work Email cannot be null but is not validated as an email address.
  2. To change or set the source attribute mapping for an identity attribute:

    • Select the desired source from the Source dropdown list.
    • Select a source attribute from the Attribute dropdown list.
  3. If an identity attribute cannot be set directly from a source attribute, you can use a transform or rule to calculate the attribute value.

    • To apply a transform, choose a source and an attribute, then choose a transform from the Transform dropdown list.

      Transforms

      IdentityNow provides the following simple transforms: Transform dropdown menu with the default transforms shown. Refer to the next section for the default options.

      • E.164 Phone Format - Converts a phone number into the E.164 standard for phone numbers.
      • ISO3166 Country Format - Converts the name of a country into the two-character ISO 3166 format for countries.
      • Remove Diacritical Marks - Converts diacritical marks to their base characters.
      • ToLower - Converts the value in the selected attribute to lowercase letters.
      • ToUpper - Converts the value in the selected attribute to uppercase letters.

      You can combine simple transforms to create complex transforms that perform multiple operations on a single attribute, like automatically calculating an identity's lifecycle state based on the start date attribute. You can also create and upload transforms. Note that if you contact SailPoint Services to help with this effort, it will be considered a billable service.

      Important

      To allow identities with this profile to use international phone numbers, you must apply the E.164 Phone Format transform to the Work Phone attribute.

    • To use a rule, choose Complex Data Source from the Source dropdown list and select a rule from the Transform dropdown list.

      Note

      Rules can provide more flexibility to perform complex calculations of identity attributes, modify provisioning instructions, interact with a connector, and more. Unlike transforms, rules must be reviewed by SailPoint Services before they can be implemented for your org. Refer to the Developer Community Rules documentation for guidelines and review information.

  4. To unmap an attribute, select None from the Source dropdown list.

Special Attributes

  • If you have Provisioning and want to use lifecycle states to perform provisioning tasks, the Lifecycle State attribute must be mapped.
  • If you plan to use functionality that requires users to have a manager, make sure the Manager Name attribute is mapped, and then define manager correlation logic for the source. Download an audit report for a list of identities without managers.

Adding Identity Attributes

You can define custom identity attributes for your site. Any attribute you add under any identity profile will appear in all of your identity profiles, but you do not have to map and use all attributes in all identity profiles.

To add a new attribute for your site:

  1. Select Add New Attribute at the bottom of the Mappings tab.

  2. In the Add New Attribute dialog box, enter the name for the new attribute. The Name field only accepts letters, numbers, and spaces. The Technical Name field populates automatically with a camel case version of the name you typed in the Name field.

    The Name and Technical Name fields when adding a new attribute.

  3. Select OK to save and add the new attribute.

  4. Map the attribute to a source and source attribute as described in the mapping instructions above.

  5. Repeat these steps for any additional attributes, and then select Save.

  6. Use the Preview feature to verify your mappings. Make any needed adjustments and save your changes.

  7. Select Apply Changes in the bar at the top of the page to apply your changes to the identity profile's identities.

    Select Apply Changes in the bar at the top of the page to apply your changes.

Verifying Mappings with Preview

Use preview to verify your mappings using your data.

  1. Select Preview at the upper-right corner of the Mapping tab of an identity profile.

  2. Select an Identity to Preview and verify that your mappings populate their identity attributes as expected.

  3. To return to the Mappings tab to edit or apply your changes, select the tab's back button .

Deleting Identity Attributes

You can delete custom attributes you no longer need. This deletes them from all identity profiles. Be mindful of where the attribute may be in use in your implementation and the implications of deleting them.

To delete a custom attribute:

  1. Select the X on the attribute you want to delete. This immediately removes the attribute from the mappings list, though it is not yet deleted.
  2. Select Save.
  3. Review the warning message about deleting custom attributes. Select OK to proceed with the deletion, or select Cancel to abort the deletion and restore the attribute to the mappings list.

    Note

    If you select Cancel, all other unsaved changes will also be reverted.

Impact of Deleting a Custom Identity Attribute

Deleting a custom identity attribute may have unintended consequences.

  • Deleting a custom attribute from an identity profile deletes the attribute from all identity profiles, not just the identity profile you are editing.

    You must individually run identity processing on each identity profile in the Identity Profiles list. This is required even if the attribute is not mapped in the identity profile.

  • Deleting the attribute could cause data integrity issues if it's used in other areas of IdentityNow, such as:

    • Roles whose membership criteria are based on the value of this attribute.

    • The IdentityNow User Name field if it has been configured to use this attribute.

    • A custom app's User Name field if it has been configured to use this attribute.

    • SAML attributes including the attribute maps. Refer to SAML Configuration Guide​ for details.

    • Rules or transforms that call this attribute in the related code.

    This can include calculations to determine:

Viewing Identity Profiles

You can view your identity profiles, as well as their identity exceptions, priority, and statuses, by going to Admin > Identities > Identity Profiles.

Identity Exceptions

An identity exception occurs when an account on an authoritative source is missing values for one or more of the required attributes. If an identity profile contains identity exceptions, you can select the Identity Exceptions icon to download a .csv or .pdf file to resolve the identity exceptions.

Priority

IdentityNow prioritizes identity profiles based on the order they were created. The earlier an identity profile is created, the higher priority it is assigned. By default, the first identity profile created will be assigned 10 as a priority and will have the highest priority. The next identity profile created will be assigned 20 and will have a lower priority. This pattern continues for each identity profile you create. You can change the priority order of identity profiles through the Update the Identity Profile API. For more information about an identity profile’s priority, refer to Prioritizing Authoritative Sources.

Scheduled Processing

An identity profile will be marked as having scheduled processing if it has an identity attribute mapped to a rule or transform that is tagged with @requiresPeriodicRefresh. For more information, refer to Scheduled Processing.

Status

An identity profile can have an Active or Needs Processing status. For identity profiles that need processing, you can select Actions > Apply Changes to apply changes made to that identity profile. For example, if you make changes to your mappings, the identity profile needs processing to apply those changes.

Resolving Identity Exceptions

When you aggregate data from an authoritative source, if an account on that source is missing values for one or more of the required attributes, IdentityNow generates an identity exception. A duplicate User Name (uid) also generates an exception.

Note

Identities missing required attributes also appear as Incomplete Identities in the identity list.

To resolve these, complete the following steps:

  1. Go to Admin > Identities > Identity Profiles.

  2. Find an identity profile with the Identity Exceptions icon . Select either Download CSV or Download PDF to download the report. The CSV option downloads the report as a zip file.

    If these buttons are disabled, there are currently no identity exceptions for the identity profile.

  3. Review the report and determine which attributes are missing for the associated accounts.

  4. Edit the account in the source to resolve the data problem.

  5. Manually aggregate the source again or wait for a regularly scheduled aggregation to confirm that the exceptions were resolved.

    IdentityNow automatically processes identity data changed in aggregation, so you can be sure you're working with the latest identity data.

Deleting Identity Profiles

When you attempt to delete an identity profile, you'll receive a warning message that describes the implications of deleting the identity profile. Deleting an identity profile:

  • Does not delete its account source, but it does make the source non-authoritative.
  • Does not delete the source's accounts in IdentityNow or deprovision them from the source system.
  • Deletes its identities unless they can be reassigned to other identity profiles in your system. When identities get deleted, all of their source accounts become uncorrelated.

Before deleting an identity profile, verify that any associated identities are not source or app owners. If they are, you won't be able to delete the identity profile until those connections are removed.

To delete an identity profile:

  1. Go to Admin > Identities > Identity Profiles.
  2. Select the Actions icon next to the identity profile you want to delete.
  3. Select Delete Identity Profile.
  4. Select Delete.

Note

An identity profile cannot be deleted while an account aggregation is running.