Creating Identity Profiles
Most organizations have one or two authoritative sources: sources that provide a complete list of their users, such as an HR source or Active Directory. When you define a source as authoritative in IdentityNow, an identity is created for each of its accounts.
You make a source authoritative by configuring an identity profile for it. The identity profile determines:
- Security settings for the identities associated to the identity profile, such as authentication settings.
- Mappings for populating identity attributes for those identities.
- The access granted to or removed from those identities when Provisioning is enabled and their lifecycle states change.
Prioritizing Authoritative Sources
Each identity can be associated to only one identity profile. If a user can exist in multiple authoritative sources for your organization, it is important to set the priority order of those sources' identity profiles correctly. Identities will be associated with the highest priority identity profile where they have an account on its authoritative source.
By default, IdentityNow prioritizes identity profiles based on the order they were created. The earlier an identity profile is created, the higher priority it is assigned.
If you need to change this order, you can use the Update Identity Profile API to change the identity profiles'
priority attribute values.
Setting Up Identity Profiles
Go to Admin > Identities > Identity Profiles.
Select Create New.
Enter a name for your identity profile. As a best practice, describe the source for this identity profile.
Choose a source from the dropdown list. This source will become an authoritative source, and the source's users will become identities in IdentityNow.
Enter a description for this identity profile.
Configure the identity profile's sign-in and security settings:
- Unless you configure external authentication options (such as pass-through authentication or single sign-on), only invited users can sign in to IdentityNow. You can choose to invite users manually or automatically. If you have the provisioning service enabled for your org, you can configure the identity profile to automatically invite users to join IdentityNow when they enter a specific lifecycle state.
- Refer to Inviting Users to Register with IdentityNow for details.
< Site >User Name & Password - Users in this identity profile sign in to IdentityNow with the username and password created during their IdentityNow registration process.
- Directory Connection - Users loaded from the identity profile sign in using the password associated with the source selected from the Authentication Source dropdown list. This type of authentication is also referred to as pass-through authentication.
- Multifactor Authentication - Users in this identity profile sign in using a mobile authenticator application such as Google Authenticator or Duo Mobile.
Block Access From
- Off Network - If you select this option, users with IP addresses outside of your specified network block won't be able to sign in to IdentityNow. Configure a network block in Restricting IdentityNow Access.
- Untrusted Geography - You might have configured a list of untrusted countries. If you select this option, users in those countries won't be able to access IdentityNow.
- Alternatively, you might have created a list of trusted countries. If this is the case, and you select this option, users outside of those trusted countries won't be able to access IdentityNow.
Password Reset and User Unlock Settings
- Enable Two-Factor Authentication - Select this option to require users to complete two (rather than the standard one) of the enabled Password Reset and User Unlock Methods before resetting their passwords or unlocking their IdentityNow accounts. Refer to Enabling Two-Factor Authorization for more information.
- Mask Phone Numbers - Select this option to enable phone number masking when users are resetting their passwords.
Password Reset and User Unlock Methods
- Select the checkbox beside the options you want users to have for resetting their IdentityNow passwords or unlocking their accounts. You can learn about the available methods in Configuring User Authentication for Password Resets.
- Define the error message to present when issues occur with strong authentication or password reset. The error message should provide users a course of action, such as "Please contact your administrator."
An identity profile cannot be created while an account aggregation is running.
Now that you've set up an identity profile in IdentityNow, you are ready to map the identity profile attributes to the appropriate source attributes.
Defining Identity Profile Attributes
Mappings define how each identity profile's attributes, also known as identity attributes, should be populated for its identities. Identity attributes can be mapped from account attributes on any source and can differ for each identity profile.
For example, your Employees identity profile could map most attributes from your HR system while the email attribute is sourced from Active Directory. At the same time, contractors' information might come exclusively from Active Directory.
You can also configure and apply a transform or rule if you need to make changes to a source value in setting your identity attributes.
The special characters
* ( ) & ! cannot be used in the source attribute mapped to a username or alternative sign-in attribute. If the username or other sign-in attribute includes any of these special characters, the user associated with the identity may not be able to sign in to or otherwise access IdentityNow.
Mapping Identity Attribute Values
The Mappings page contains the list of identity attributes. This includes both the default attributes included with IdentityNow and any identity attributes you have added for your site.
To map identity attributes for identities in an identity profile:
Open the identity profile you want to edit and select the Mappings tab.
- The identity attributes User Name (uid), Work Email (email), and Last Name (lastname) are required. They must be set with a mapping for each identity profile and cannot be null for any identity.
- User Name must be unique across all identities from any identity profile.
- Work Email cannot be null but is not validated as an email address.
To change or set the source attribute mapping for an identity attribute:
- Select the desired source from the Source dropdown list.
- Select a source attribute from the Attribute dropdown list.
If an identity attribute cannot be set directly from a source attribute, you can use a transform or rule to calculate the attribute value.
To apply a transform, choose a source and an attribute, then choose a transform from the Transform drop-down list.
To use a rule, choose Complex Data Source from the Source dropdown list and select a rule from the Transform dropdown list.
To unmap an attribute, select None from the Source dropdown list.
- If you have Provisioning and want to use lifecycle states to perform provisioning tasks, the Lifecycle State attribute must be mapped.
- If you plan to use functionality that requires users to have a manager, make sure the Manager Name attribute is mapped, and then define manager correlation logic for the source. Download an audit report for a list of identities without managers.
Adding Identity Attributes
You can define custom identity attributes for your site. Any attribute you add under any identity profile will appear in all of your identity profiles, but you do not have to map and use all attributes in all identity profiles.
To add a new attribute for your site:
Select Add New Attribute at the bottom of the Mappings tab.
In the Add New Attribute dialog box, enter the name for the new attribute. The Name field only accepts letters, numbers, and spaces. The Technical Name field populates automatically with a camel case version of the name you typed in the Name field.
Select OK to save and add the new attribute.
Map the attribute to a source and source attribute as described in the mapping instructions above.
Repeat these steps for any additional attributes, and then select Save.
Use the Preview feature to verify your mappings. Make any needed adjustments and save your changes.
Select Apply Changes in the bar at the top of the page to apply your changes to the identity profile's identities.
Verifying Mappings with Preview
Use preview to verify your mappings using your data.
Select Preview at the upper-right corner of the Mapping tab of an identity profile.
Select an Identity to Preview and verify that your mappings populate their identity attributes as expected.
Deleting Identity Attributes
You can delete custom attributes you no longer need. This deletes them from all identity profiles. Be mindful of where the attribute may be in use in your implementation and the implications of deleting them.
To delete a custom attribute:
- Select the X on the attribute you want to delete. This immediately removes the attribute from the mappings list, though it is not yet deleted.
- Select Save.
Review the warning message about deleting custom attributes. Select OK to proceed with the deletion, or select Cancel to abort the deletion and restore the attribute to the mappings list.
If you select Cancel, all other unsaved changes will also be reverted.
Impact of Deleting a Custom Identity Attribute
Deleting a custom identity attribute may have unintended consequences.
Deleting a custom attribute from an identity profile deletes the attribute from all identity profiles, not just the identity profile you are editing.
You must individually run identity processing on each identity profile in the Identity Profiles list. This is required even if the attribute is not mapped in the identity profile.
Deleting the attribute could cause data integrity issues if it's used in other areas of IdentityNow, such as:
Any roles whose membership criteria are based on the value of this attribute.
The IdentityNow User Name field if it has been configured to use this attribute.
A custom app's User Name field if it has been configured to use this attribute.
SAML attributes including the attribute maps. Refer to SAML Configuration Guide for details.
Any rules or transforms that call this attribute in the related code.
This can include calculations to determine:
Viewing Identity Profiles
An identity exception occurs when an account on an authoritative source is missing values for one or more of the required attributes. If an identity profile contains identity exceptions, you can select the Identity Exceptions icon to download a .csv or .pdf file to resolve the identity exceptions.
IdentityNow prioritizes identity profiles based on the order they were created. The earlier an identity profile is created, the higher priority it is assigned. By default, the first identity profile created will be assigned 10 as a priority and will have the highest priority. The next identity profile created will be assigned 20 and will have a lower priority. This pattern continues for each identity profile you create. You can change the priority order of identity profiles through the Update the Identity Profile API. For more information about an identity profile’s priority, refer to Prioritizing Authoritative Sources.
An identity profile will be marked as having scheduled processing if it has an identity attribute mapped to a rule or transform that is tagged with
@requiresPeriodicRefresh. For more information, refer to Scheduled Processing.
An identity profile can have an Active or Needs Processing status. For identity profiles that need processing, you can select Actions > Apply Changes to apply changes made to that identity profile. For example, if you make changes to your mappings, the identity profile needs processing to apply those changes.
Resolving Identity Exceptions
When you aggregate data from an authoritative source, if an account on that source is missing values for one or more of the required attributes, IdentityNow generates an identity exception. A duplicate User Name (uid) also generates an exception.
Identities missing required attributes also appear as Incomplete Identities in the identity list.
To resolve these, complete the following steps:
Go to Admin > Identities > Identity Profiles.
Find an identity profile with the Identity Exceptions icon . Select either Download CSV or Download PDF to download the report. The CSV option downloads the report as a zip file.
If these buttons are disabled, there are currently no identity exceptions for the identity profile.
Review the report and determine which attributes are missing for the associated accounts.
Edit the account in the source to resolve the data problem.
Manually aggregate the source again or wait for a regularly scheduled aggregation to confirm that the exceptions were resolved.
IdentityNow automatically processes identity data changed in aggregation, so you can be sure you're working with the latest identity data.
Deleting Identity Profiles
When you attempt to delete an identity profile, you'll receive a warning message that describes the implications of deleting the identity profile. Deleting an identity profile:
- Does not delete its account source, but it does make the source non-authoritative.
- Does not delete the source's accounts in IdentityNow or deprovision them from the source system.
- Deletes its identities unless they can be reassigned to other identity profiles in your system. When identities get deleted, all of their source accounts become uncorrelated.
Before deleting an identity profile, verify that any associated identities are not source or app owners. If they are, you won't be able to delete the identity profile until those connections are removed.
To delete an identity profile:
- Go to Admin > Identities > Identity Profiles.
- Select the Actions icon next to the identity profile you want to delete.
- Select Delete Identity Profile.
- Select Delete.
An identity profile cannot be deleted while an account aggregation is running.