Understanding Identity Profiles in SailPoint IDNow

Identity Profiles:
Identity Profiles are used for creating Identities within the SailPoint IDNow.
Respective HR Source application is connected to single Identity Profile.
Setup Identity Profile:
Basic Settings:
Configure the Basic Identity Profile Settings, invitation configuration, sign-in methods, etc… other details.
Mappings:
Here in this tab we map the HR Source attributes to the respective identity attributes of sailpoint.
If we need to create new identity attribute, we can create by adding new attribute(It will reflect in all Identity Profiles) and also don’t delete any attribute configured in the Identity Profile bcz it will delete from other Identity Profiles too. So, be cautious while handling attributes.
Make the attributes searchable which needed for correlation.
We can make maximum of 15 attributes searchable in sailpoint and we can configure N number of identity attributes.
Map the Life Cycle State Variable from the HR Source application to perform the provisioning. Based on this attribute (active or inactive or any other custom attribute) we perform the provisioning actions.
Provisioning:
Enable the provisioning action under the attributes (active or inactive, etc..)
Configure required settings
Now we are ready to run the Identity Profile . click the apply changes.
New Identities will be created for the accounts from the mapped HR Source application.
Based on the correlation with in the HR Source application configured (If accounts not presented with the sailpoint with the correlation condition) the identity will be created.
Manager correlation will be perform and manager will be attached to the Identity based its manger name in the HR Source application.
Now we can check Identites tab, we see Identites are created for the accounts and manager will be mapped to the identity.
I appreciate you reading till the end! Let me know your thoughts or if there's anything I should add. Cheers! 🎉
Subscribe to my newsletter
Read articles from Kranthi directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
Kranthi
Kranthi
👋 Hi, I’m Kranthi Kumar Puttapaka, a Certified SailPoint IAM Engineer with over 5 years of experience in building secure and scalable identity solutions. I help organizations streamline their Identity & Access Management (IAM) processes and strengthen their security posture. I specialize in designing and implementing enterprise-grade IAM systems using technologies like SailPoint IdentityIQ, Identity Security Cloud (ISC), Okta, Azure AD (Entra ID), and CyberArk. My focus areas include identity governance, access lifecycle automation, role-based access control, and Zero Trust security architectures. Over the years, I’ve led multiple SailPoint IIQ to ISC migration projects with zero downtime, developed custom connectors for seamless integrations, and implemented compliance frameworks like SOX, GDPR, HIPAA, and NIST. I also have hands-on experience with cloud platforms such as AWS and Azure, enabling organizations to adopt cloud-native identity governance. On the technical side, I work with Java, JavaScript, Python, and BeanShell for customization and automation. My toolkit includes Spring Boot, Spring Security, Docker, Terraform, and databases like MySQL, Oracle, MongoDB, and LDAP. Here on Hashnode, I write about IAM architecture patterns, SailPoint implementation deep dives, cloud identity strategies, Zero Trust security models, and real-world challenges I’ve solved in Identity Governance. Always excited to connect with fellow IAM professionals and share knowledge about building secure, scalable identity solutions. Let’s make the digital world more secure, one identity at a time!