Account Lifecycle

Identity

53 sections
3904 source tickets

Last synthesized: 2026-02-12 16:45 | Model: gpt-5-mini
Table of Contents

1. Freelancer worker account creation and provisioning

472 tickets

2. External-user reactivation via Automation for Jira and Atlassian API

1127 tickets

3. Account expiration/termination date causing license/login failures

559 tickets

4. Salesforce SSO failures caused by automatic deactivation and password reset delivery/expiry issues

338 tickets

5. Workday-driven username/email rename (name change)

266 tickets

6. Offboarding: scheduled account suspension and hardware return (Apple ID handling)

165 tickets

7. Reinstated memberships triggering honours and welcome letters before payment

2 tickets

8. Duplicate instructor accounts with wrong community designation and email on inactive/correct profile

117 tickets

9. New OASIS account provisioning with secure delivery of credentials

158 tickets

10. Calendly organization ownership transfer to a service account

55 tickets

11. Dedicated Okta service account for API tokens used in incident response

2 tickets

12. User unable to sign into corporate laptop due to forgotten/unknown credentials

43 tickets

13. Salesforce Service Cloud access gaps due to missing profile/campus/team and permission-set assignments

11 tickets

14. Persistent macOS admin/root access via AdminGroup and Self Service

3 tickets

15. OTRS access appearing deactivated after queue migration to ServiceCloud

1 tickets

16. Atlassian customer-portal access failure due to email/identity mismatch across AAD and Okta

12 tickets

17. Decommissioning of discontinued service/podcast mailboxes

14 tickets

18. iCloud Keychain inaccessible due to Apple ID sign-in failure

27 tickets

19. Okta access failure for external/instructor email addresses requiring account/password reset

116 tickets

20. Okta account/password reset requests for individual users

40 tickets

21. Salesforce user record deactivated causing immediate login failure

98 tickets

22. External worker termination-date extension via Automation for Jira and Okta

166 tickets

23. External worker termination-date extension stalled awaiting Jira-automation approval

27 tickets

24. Scheduled Okta report for active employee accounts with specific attributes

2 tickets

25. Account request form showed pre-submitted entry and provisioning stalled by automation approval

3 tickets

26. Application form fields disabled despite active Okta/IU Office account and license

3 tickets

27. Salesforce access blocked with no password‑reset email delivery and Okta SSO dependency

3 tickets

28. Workday-driven username/email rename with FileVault/T2 Mac requiring device erase and downstream service updates

1 tickets

29. External teaching account appeared expired in self-service but was active; password reset restored access

9 tickets

30. Re-import and reactivation of Okta accounts when provisioning connector retains record

4 tickets

31. Temporary/test account provisioning with automation due-date/lead-time warnings

1 tickets

32. Salesforce account reactivation and password-reset after inactivity/decay

5 tickets

33. Third-party PMS account requests requiring vendor-specific request forms

5 tickets

34. Instructor Microsoft 365 licenses converted to web-only, removing desktop Office app access

3 tickets

35. Automated suspension from HR data changes (future hire date/job update) disabling accounts across Microsoft and Jira

2 tickets

36. Salesforce production/reactive access and separate UAT account provisioning

1 tickets

37. Instructor/external user requested full credential regeneration for personal and external IU addresses

3 tickets

38. Department/shared LIBF account provisioning requested and handled by central administrator

3 tickets

39. Salesforce account creation by cloning another user's permissions

3 tickets

40. Third-party vendor business account reactivation routed to procurement

1 tickets

41. Workday-driven username/email rename with local macOS account conflict requiring in-person handling

2 tickets

42. Staff portal / IU email access restored after account password reset

3 tickets

43. Manual legal name/surname change for external/instructor accounts with non-editable Okta identity fields

1 tickets

44. Manual offboarding: disabling accounts and removing user from Jira teams/tags

5 tickets

45. Offboarding ticket with incorrect date causing premature account deactivation

2 tickets

46. Corporate Vonage (telephony) account provisioning for individual users

3 tickets

47. Workday ID change creating duplicate identities requiring consolidation

7 tickets

48. Monitoring probe using individual user account for RADIUS authentication

1 tickets

49. Salesforce login blocked by unverified account email causing automatic deactivation

1 tickets

50. Access and permission requests routed to application-owner teams (misrouted service-catalog requests)

4 tickets

51. Application login blocked despite active Okta record and valid license

2 tickets

52. Access failure caused by duplicate user accounts

1 tickets

53. Active Directory account creation from existing account/template with Okta group cleanup

1 tickets

1. Freelancer worker account creation and provisioning
95% confidence
Problem Pattern

Missing, incorrect or unlinked contingent/external‑worker metadata and erroneous contact elements in source systems or asynchronous identity synchronisations (for example AD <> EntraID delays) caused automated provisioning and deprovisioning failures. Symptoms included 'user not found' or 'account disabled' errors, accounts incorrectly created or listed in the external namespace (for example .ext addresses), missing or wrong work email addresses, license or group‑assignment failures, immediate deactivations when start and termination dates matched, duplicate external identities, and unexpected exposure of contact details. Affected systems included Okta and downstream targets such as Atlassian/Jira, Microsoft 365/Exchange, AD/EntraID, LMS/PMS and partner portals.

Solution

Contingent and external‑worker lifecycles were audited across the external namespace and source systems (PMS, partner portals, Meldeportale and HR feeds) and source contact records were corrected when erroneous elements produced external identities (for example pension‑insurance signature elements). Technicians repaired or recreated contingent‑worker records using managed forms so Okta and downstream systems could provision correctly, corrected employment type/employer associations with HR, and rebuilt or reconfigured misclassified accounts so work email addresses, licence entitlements and group memberships matched the employment type. Unique external usernames (for example .ext suffixes or numeric variants) were used to avoid collisions where true externals were required; in some cases internal sign‑in names were moved into the external namespace while retaining existing credentials so users kept immediate sign‑in while credential delivery and password resets were routed to private contacts. When automations reported failures such as 'user not found' or missing licences, technicians reactivated Okta/contingent‑worker records, repaired identifier mappings (deleting, merging or renaming duplicate or misspelled external identifiers), and retriggered or monitored downstream synchronisations to Atlassian, Microsoft 365/Exchange, AD/EntraID and other systems. Where asynchronous synchronisation was the root cause (for example AD <> EntraID sync failures or delays after mass deletions) technicians confirmed which accounts had been created in each system, re‑ran or waited for directory synchronisation, created missing EntraID objects when required, and then reapplied group and licence assignments; password‑reset flows scheduled for start dates were executed or reissued as part of remediation. Accounts that deactivated immediately due to erroneous start/end dates had end dates corrected, expiry flags cleared for indefinite engagements and accounts reactivated; anomalous source data (for example termination dates earlier than start dates) was recorded and later corrected via extension or reactivation workflows with written approvals captured in ticket metadata. Mailbox delivery and retention requests (for example researchers retaining institutional contact addresses for publications) were handled by externalization or by creating externalized mail profiles, aliases or forwarding so mail and historical data remained accessible while the primary address moved to an external namespace; where external employer associations interfered with personal subscriptions technicians unlinked external IU email records or used Okta flows to restore access. For large‑scale expiry or reactivation events technicians compiled validated account lists (cross‑checked against active contracts), executed controlled bulk Okta end‑date updates or bulk reactivations, and verified downstream licence reapplication; temporary application admin accounts with data‑protection reviewer oversight were used when central provisioning was blocked. When reactivation covered onboarding gaps required hardware and credentials were ordered and MFA provisioning was reissued to recorded private contacts. Authentication or MFA problems after reactivation were resolved by revoking stale sessions and tokens, reconciling and removing duplicate external accounts to leave a single active identity, and reissuing authenticator/MFA provisioning to the correct account. Atlassian‑created and automation‑driven accounts were reconciled with Okta identities to remove duplicates and ensure the correct account state and downstream synchronisations or application APIs were retriggered where required. Operational notes recorded written approvals and ticket metadata for manual interventions, though some tickets contained only final status entries.

Source Tickets (472)
2. External-user reactivation via Automation for Jira and Atlassian API
95% confidence
Problem Pattern

Automation-for-Jira workflows that call the Atlassian API intermittently failed to update external (Contingent Worker) users’ terminationDateExternal in Okta and to re-provision entitlements, causing reactivation/extension requests to stall, auto-close, or remain pending. Symptoms included users receiving reactivation notifications while accounts remained deactivated, approver records missing or approvers not receiving requests, approvals timing out, transient RECOVERY/API states, bilingual API responses, and explicit API errors such as “already active”, “Could not find any account with this address <email>”, “The termination date could not be extended... could not be found in Okta”, or “The provided address <email> is not a valid external Contingent Worker account in Okta.” Affected systems included Automation for Jira, the Atlassian API, Okta, and downstream services such as email, 1Password, and invoicing/billing tools.

Solution

Routine external-user reactivations and termination-date extensions normally completed when Automation-for-Jira processed approvals, the Atlassian API recorded the change (API notes sometimes appeared in German), and Okta automation set terminationDateExternal and assigned products/licenses. Where intermittent failures occurred, incidents were resolved using a consistent set of actions applied as needed. Transient RECOVERY/API states were cleared and Automation-for-Jira rules were re-run or targeted Atlassian API calls were issued when the platform returned inconsistent results; API logs sometimes contained German confirmation text (for example, “wurde gemacht”). Okta account classification errors and misclassified/deactivated records were corrected and manually reactivated when required. Username/email mismatches (including ".ext" variants and alternate personal emails) were reconciled so downstream reconcilers could find accounts. Password-reset or credential issues were addressed by reissuing password-reset notifications or resetting credentials when they were rejected. Entitlement gaps after reactivation were resolved by explicitly assigning Jira products/licenses or adding users to the appropriate Okta groups (examples included EPOS and other non-default apps) and by re-provisioning downstream services such as email, 1Password, and invoicing/billing tools. Profile updates recorded in the Atlassian API (manager, cost center, terminationDateExternal) were applied when present and confirmed in API logs. Stalled or misrouted approvals were fixed by updating authoritative approver records in upstream HR/source-of-truth systems, adjusting Jira workflow approver fields and CC-approvers, or by manually re-opening tickets and adding missing approvers; some workflows were validated to require only one of multiple approvers. Duplicate requests and locked form submissions were handled by cancelling duplicates, temporarily reactivating duplicates to allow processing, or accepting locked submissions and processing profile corrections via subsequent data-change tickets. When the Atlassian API reported an account as already ACTIVE, no reactivation was attempted and tickets were closed after contract/owner checks; when the API returned “Could not find any account with this address ” support marked the ticket as “Won’t Do” and required a valid existing account or a new account before reactivation. Separately, an Okta user-disable workflow was found to omit users because the user-search did not implement pagination and returned only the first 200 users; affected external users were manually disabled, the workflow was updated to add pagination so all users beyond the initial 200 were returned and handled, and the change was verified to return the full user set.

Source Tickets (1127)
3. Account expiration/termination date causing license/login failures
95% confidence
Problem Pattern

Expired, suspended, disabled, or locked user and group records caused authentication and access failures across SSO and downstream services (SSO portals, device enrollment, mail, file sync/collaboration, LMS, PowerApps/Power App forms, and third‑party apps requiring an institutional email). Reported symptoms included failed sign‑ins and token errors (for example “Gesperrtes Nutzerkonto”), UI blocks or stuck app screens (for example invoice PowerApp showing “wait for access”), missing or blocked password‑reset or activation emails, SMTP bounces such as “550 5.1.1 user unknown” or “550‑5.2.1 … inactive”, lost group/workspace memberships, and recurring expiry notifications where UI “extend” actions had no effect. Common triggers were HR/course/contract end dates, incorrect or misaligned provisioning/feed mappings, scheduled group/team expirations, inactivity suspensions, Deleted Users purges, and premature deactivation when authoritative termination data was absent or incorrect.

Solution

Incidents were resolved by restoring authoritative identity and application state and reconciling upstream records that produced lifecycle or classification changes. Administrators reactivated, unsuspended or extended accounts while preserving immutable IDs where feasible; when reactivation was denied for policy or privacy reasons, replacement vendor/guest accounts were provisioned and permissions were reassigned. Teams corrected HR/course/provisioning feeds and mappings (for example Workday IDs and course/section mappings), normalized extension/classification attributes, repaired dynamic‑group rules, removed stale external/domain accounts that caused misclassification, and reconciled or reconnected provisioning connectors and Deleted Users entries that blocked reprovisioning. Microsoft 365/Teams entitlement and workspace expiry failures were resolved by reapplying or extending licenses, disabling or renewing scheduled group/team expirations, confirming or reassigning active group owners so auto‑renewal flows completed, and re‑adding removed members/owners when source records required it; one lifecycle was manually extended in the Microsoft 365 admin center after the tenant UI button produced no action. Token and session errors cleared after account state restoration by reissuing tokens or prompting reauthentication; service principals and app registrations were rotated or reactivated when secrets had expired. Device and client issues were addressed by reconciling enrollment/licensing and local authentication state, clearing cached credentials or forcing sign‑out/sign‑in to apply new entitlements, and replacing hardware when necessary — one recurring JAMF Connect chain cleared after a password‑never‑expires flag was set which restored downstream Okta and GitLab access. Mail delivery and mailbox availability issues were investigated from Mail Delivery Subsystem transcripts and SMTP responses; suspended mailboxes were reactivated when appropriate. Confirmed cases showed deactivated accounts did not receive password‑reset or activation emails, so reactivation preceded successful self‑service resets. External/vendor or contingent accounts that only had a personal contact address sometimes required manager‑requested extensions; where alternate‑email recovery was missing, administrative extension or reactivation restored access. PowerApps (Power App) and form‑based workflows were impacted when the institutional account was terminated, producing stuck app screens or “wait for access” messages until the IU account state was restored or an alternate account was provided for invoice submission. Operational notes recorded provider timelines and helpdesk automation behaviours (including observed auto‑closure of no‑reply tickets) and typical propagation delays (minutes to ~30 minutes for most flows, with some classification/tagging changes taking up to 24–48 hours). As an operational safeguard, teams verified authoritative HR termination fields (for example Workday “Last day of Work”) before suspending access, accepted explicit stakeholder instructions not to suspend before an agreed exit date, and set helpdesk tickets to pending with a follow‑up date on the agreed exit date so suspension actions occurred at the correct time. Outcomes included restored application access and mailboxes, normalized dynamic‑group classification for SOC alerting, straightforward SaaS reactivations after HR or course‑owner confirmations, and replacement account provisioning when required; some requests were permanently denied after data‑protection or privacy review.

Source Tickets (559)
4. Salesforce SSO failures caused by automatic deactivation and password reset delivery/expiry issues
95% confidence
Problem Pattern

Users could not authenticate to Okta‑integrated SSO or direct sign‑in for services (notably Salesforce/Care, Microsoft 365/Office/Teams, Power BI, Vonage Contact Center, Miro, Atlassian) and saw explicit SSO errors (e.g., “Single Sign On Error”, “account does not exist”), account disabled/locked/archived messages, missing app tiles, failed redirects, or app‑specific failures (e.g., Vonage “Screen Lock”, Power BI web/desktop mismatch, Miro stuck on “Free”). Failures commonly followed automatic inactivity deactivation (typically 14–60 days), stalled or incomplete provisioning, mid‑reset/verification states, stale aliases or sandbox/domain mismatches, incorrect or outdated email addresses on the account, or non‑production accounts that lacked Okta/password sync. Symptoms included inability to authenticate despite password resets, password‑reset emails not delivering, and users not knowing app‑specific usernames; post‑reactivation, dashboard/report access or app‑specific permissions sometimes remained broken.

Solution

Access was restored by correcting account state and completing provisioning, and by resolving password, email delivery and MFA state issues. Administrators reactivated, unarchived, unlocked or recreated disabled/archived/locked/deleted accounts and re‑assigned Okta app assignments, permission groups and required licenses; some reactivations required manager or delegated approver authorization or submission to the owning service for non‑production environments. In several cases an incorrect or outdated email address on the account prevented a valid password‑reset flow; after correcting the account email a subsequent password reset completed successfully. Where self‑service was blocked, support performed admin‑initiated Okta account/password resets and reissued fresh password‑reset or verification links after correcting username/alias/sandbox typos, fixing wrong email addresses, and clearing or redirecting emails flagged as phishing. It was observed that password‑reset emails sometimes did not deliver while accounts were deactivated, so reactivation preceded successful reset delivery in those cases. Password‑reset and verification loops were resolved by issuing new valid tokens or by support performing the reset on behalf of the user. MFA issues were cleared by removing stale authenticator enrollments to allow re‑enrollment, launching apps from the Okta portal tile to clear app‑specific MFA state or to complete SSO when users lacked app usernames, generating temporary MFA bypass codes when devices or recovery codes were unavailable, or applying documented MFA exemptions for machine/bot accounts after owner approval. Browser, session and client specific failures were cleared by removing cookies/cache or exiting private/incognito sessions. Power BI paginated‑report access required signing into both Power BI web and Report Builder desktop with the same account. Vonage Contact Center access was restored by reactivating inactive/archived accounts and correcting per‑user Contact Pad/options, callback/outbound settings, supervisor/permission groups and inbound numbers (a disabled Vonage account produced the Chrome add‑in “Screen Lock” symptom). Miro access was restored by enabling the Miro app/license in Okta or converting a “Free”/“Free Restricted” account to a paid/full account and allowing short propagation time. In Care environments that lacked Okta connectivity and password sync, access was restored by using the care‑admin password‑based account after confirming the app lacked SSO. Administratively applied changes typically propagated within about 5–10 minutes; inactivity deactivation windows varied roughly 14–60 days (commonly ~30 days) and some services required a sign‑in within ~24 hours after reactivation to avoid immediate re‑deactivation. When dashboard or report access remained broken after reactivation, administrators validated and re‑assigned report/dashboard permissions and licenses or engaged report owners/owning services to restore access.

Source Tickets (338)
5. Workday-driven username/email rename (name change)
95% confidence
Problem Pattern

Workday edits to legal name, employee ID, affiliation, or UPN/domain frequently triggered immediate or staged Okta renames and directory synchronizations that left downstream systems inconsistent. Common symptoms included Azure AD/UPN duplicates with numeric suffixes, primary SMTP addresses being demoted to aliases or mismatched proxyAddresses, mailbox routing/ownership anomalies, and SSO failures such as Okta “user not found,” MFA or authenticator enrollment failures, or password‑reset errors. Device‑local username mismatches, Microsoft Teams/profile presence or display anomalies, and third‑party tenants refusing actions or access after an email/UPN change were reported. Automated renaming flows sometimes produced spurious automation noise — for example triggers on test/provisioning accounts that generated multiple automated tickets or external API errors when test addresses could not be used as ticket authors.

Solution

Workday changes were treated as the authoritative source and edits were classified (simple edit, reactivation to original HR ID, reprovision under a new HR ID, or Workday‑ID backswitch) before any renaming or reprovisioning. Operators recorded Okta rename invocations and originating Okta Workflows links and only executed renaming/reactivation/reprovisioning after identifying persona conflicts and downstream risks; automated renames preserved user formatting and preferred/display‑name preferences and were held or cancelled when unresolved conflicts or downstream risks existed. Renames were commonly scheduled in a 30–60 minute user‑offline window. Automation notifications and ready‑to‑run workflow links were observed to appear without explicit user confirmation; such automation‑only tickets were monitored and allowed to auto‑close after a 14‑day waiting period when no user confirmation arrived. When an expected rename trigger did not appear within ~1–2 days staff contacted Workday support. For Workday‑ID backswitches and reactivations directory objects were remapped to original employee IDs and Okta key‑user tools or UID resets were used to relink assignments and reapply entitlements. Staged or numeric‑suffixed Azure AD/UPN duplicates were consolidated or removed via tenant‑side merges, admin re‑invites, or account consolidations when downstream tenants retained separate identities. proxyAddresses and primary SMTP values were adjusted so legacy primary addresses were preserved as aliases (hidden from the GAL where appropriate); mailbox and license ownerships were reassigned and verified across HR/Okta/Azure logs to prevent mail routing or mailbox‑ownership anomalies. Observed directory/Office propagation windows were documented (primary SMTP/aliases: minutes to ~1 hour; Office profile/master data: ~48 hours; full directory metadata: ~2–14 days, with some sync paths completing in ~2–3 hours). MFA and authenticator enrollment failures tied to stale registrations were resolved by removing stale registrations or performing admin resets and re‑enrolling authenticators. Outlook and Teams profile inconsistencies were treated as directory/profile propagation issues and cleared by sign‑outs, client cache clears, profile rebuilds or local profile recreation and user reauthentication. OneDrive/SharePoint and notebook‑owner anomalies generally cleared after directory and Office metadata propagation. Devices with mismatched local usernames sometimes required local account rebuilds, device replacement, or Workday reverts; BitLocker or FileVault recovery keys were used when necessary. Downstream non‑SSO and third‑party tenants were remediated by tenant‑side merges, admin re‑invites, reauthentication or unlink/relink flows; vendor‑controlled tenancy issues were escalated to procurement or vendor support, and where internal support lacked access (for example a vendor PMS) users were directed to the vendor's service portal and the escalation was recorded. Legacy aliases or mail forwarding were preserved when immediate vendor changes were not possible to keep users reachable. Migration planning used automated availability checks to verify target UPN/SMTP availability and avoid duplicate aliases or routing collisions. Inventories identified which services used email/UPN as the user identifier versus a stable academyID/UUID to decide vendor mappings case‑by‑case. All rename invocations, remediation actions and vendor/procurement escalations were logged in a renaming checklist and communicated to affected users, including the final username/display/title and expected propagation timings. It was also observed that Okta renaming automations occasionally triggered on test/provisioning accounts and produced multiple automated tickets and external API errors when test addresses could not be used as ticket authors; those events were recorded as automation‑origin noise and handled according to the automation‑ticket monitoring and auto‑close policy. Separate incidents of post‑rename loss of access to VPN or mapped network drives were reported and treated as downstream SSO/credential anomalies; support noted that credentials remained unchanged in at least one case and the ticket was closed without further technical remediation when the user elected not to pursue additional action.

Source Tickets (266)
6. Offboarding: scheduled account suspension and hardware return (Apple ID handling)
95% confidence
Problem Pattern

Scheduled offboarding and ad‑hoc deactivations produced inconsistent identity and device states across directory/SSO (Azure AD/Entra, Okta), MDM (Jamf/Intune) and downstream SaaS. Symptoms included suspended accounts being fully deactivated or later reinstated by periodic imports, devices remaining active or unenrolled after their user was disabled, domain/Apple ID claim conflicts that blocked macOS/iOS sign‑in, eSIM or unmanaged‑device provisioning failures preventing mobile logins, and improper deactivation sequencing that disrupted mailbox and corporate telephony routing. Ownership/notification confusion for devices (active machines assigned to deactivated accounts or different employees) and failed hardware returns produced unrecovered assets and HR/legal escalations.

Solution

Inconsistent offboarding and device state issues were resolved by coordinating identity controls, fixing automation race conditions, introducing device‑quarantine actions, reconciling accounts, re‑enrolling devices, auditing downstream entitlements, and tightening hardware‑return logistics and communications. Key outcomes included:

• Identity state controls and sequencing: Deactivation events were recorded and time‑bounded suspension windows were enforced; manager‑approved early deactivations and urgent isolations were logged. Okta’s “Suspend User” flow was used for JIRA‑managed suspensions while Okta disable workflows and Entra/Azure AD session revocation were applied for urgent isolations. Deactivation steps were sequenced to preserve mailbox and telephony routing when required.

• Device quarantine and Windows handling: Devices that remained active after account deactivation were quarantined or locked in directory/device management (Azure AD/Intune) so they could not reconnect unless formally reset; Windows 10 endpoints that continued to appear online were explicitly locked to force a reset before reuse. Devices were re‑enrolled in MDM (Jamf/Intune) and device/user assignments were reconciled during reactivation or retirement.

• Mailbox and telephony handling: Email forwarding and mailbox retention or access choices were confirmed with HR or requesters; forwarding and mailbox routing were configured and validated before full account deactivation when needed. Corporate mobile lines had routing or call‑forwarding configured and confirmed as part of offboarding.

• Automation fixes and limits: Faulty bots, cronjobs and Power Apps actions were paused and corrected. Okta Workflows were staggered to respect run limits and conflicts from Power Apps ‘‘Delete Student Account’’ actions were worked around with direct Azure AD/Microsoft 365 actions and owner notification. Additional logging and monitoring were added around suspend/unsuspend flows to detect race conditions and prevent periodic imports from undoing suspensions.

• Account reconciliation and downstream access: Duplicate and legacy identities were consolidated before reactivation. Group memberships, roles, AWS IAM and vendor‑portal entitlements were audited and corrected. Time‑limited Okta/SAML reactivation was provided to recover access when vendor accounts blocked data retrieval.

• MFA and returning employees: Okta authenticator credentials that were unusable for returning staff were reprovisioned via Okta admin flows; users were assisted with QR provisioning or device migration to restore MFA access.

• Device lifecycle and Apple ID handling: Replacement devices and provisioning tickets were used for reissues. Apple ID and domain‑claim conflicts that blocked macOS/Jamf Connect authentication or device reuse were resolved by migrating users off personal Apple IDs, freeing addresses and re‑binding devices under Apple Business Manager. Devices with personal Apple IDs left signed in were treated as non‑reusable and retired when sign‑out could not be completed.

• Hardware return logistics and legal escalation: Returns were coordinated with procurement and refurbishers; delivery details, PO/cost‑centre approvals, packaging and shipping labels were confirmed prior to shipment. Where return labels had been sent to private emails and remained unused, cases were escalated to HR and legal and alternate recovery steps were executed. Intake verified declared inventory against incoming packages and reconciled charges with procurement and finance.

• Data and credential handling: Exchange/OneDrive retention or deletion choices were confirmed with HR; mailboxes were deleted only with explicit authorization and temporary mailbox or OneDrive access was granted only after HR approval. Shared administrative credentials and SSH keys were reviewed and removed or rotated during offboarding.

Recurrence was reduced by documenting partial‑offboarding cases in Jira, fixing cleanup scripts and unreliable imports, adding logging/monitoring around suspend/unsuspend flows, and tightening return‑label generation, delivery confirmation and inventory verification to avoid mismatches, unrecovered assets and reimbursement disputes.

Source Tickets (165)
7. Reinstated memberships triggering honours and welcome letters before payment
60% confidence
Problem Pattern

Reinstating memberships immediately created invoices and was misclassified as automatic renewals due to batch logic that relied on MT.Entered_Date, causing premature honours/designation and welcome-letter scheduling before payment. In some cases member access/expiry periods were derived from invoice raise date (not payment/validation date), producing stored expiry dates that conflicted with confirmation emails and actual access activation. Affected systems included the Membership System, MEMBWE/LetterWriter, invoicing/payment allocation (MF), CRT/registration systems and membership DB tables MT/MTI.

Solution

Investigators found the MEMBWE bulk selection and downstream workflows relied on MT.Entered_Date and related logic that misclassified reinstatements as automatic renewals and triggered honours, access activation, and MEMBWE communications before payments were allocated. Remediation combined two changes. First, the bulk-selection and workflow logic was changed to reference MT/MTI indicators that distinguish reinstatements from renewals so reinstatements were excluded from automatic-renewal classification. Second, all send/assignment/activation paths (welcome-letter/honours assignment and access activation/expiry calculation) were gated by membership/payment state: invoices continued to be created on reinstatement, but honours, welcome-mail scheduling and access activation/expiry were deferred until payment allocation/validation was confirmed. The access/expiry calculation was corrected to use payment/validation (allocation) date as the activation baseline so stored expiry dates matched confirmation emails from the registration/CRT systems. The changes touched Membership System batch jobs, MEMBWE/LetterWriter send logic, invoicing/payment allocation checks, and registration/CRT expiry sources; membership DB usage was standardised to MT/MTI indicators and allocation/date fields to prevent recurrence.

Source Tickets (2)
8. Duplicate instructor accounts with wrong community designation and email on inactive/correct profile
95% confidence
Problem Pattern

Duplicate, legacy or pre‑migration external and self‑registered identities produced fragmented enterprise identities across directories and applications (Okta, Entra/Azure AD, EPOS, CARE, Salesforce, myCampus, MyLIBF). Typical symptoms included multiple distinct login names for the same person (for example separate employee and student profiles), SSO 'User not found' responses, explicit portal errors such as 'User account approval needed' after merges, HTTP 400 errors during password resets, repeated Outlook/Exchange credential prompts and NDRs from stale mailboxes, orphaned MFA bindings, and application license or booking emails routed to duplicate accounts. Common triggers were incorrect provisioning, typographical/name‑order variants, non‑enterprise addresses, administrative deactivations, preexisting third‑party accounts and legacy on‑prem Active Directory accounts.

Solution

Investigations identified duplicate, legacy or preexisting external identities and restored access by consolidating authoritative credentials, identifiers and attributes onto a single active canonical iu.org account whenever possible. Primary enterprise addresses, Academy‑IDs/EPOS AcIDs, course bookings, permissions and permission mappings were moved to the active profile and erroneous records were archived, set inactive, or removed so mailbox ownership and password‑reset flows routed to the canonical identity. Directory and mail remediation work included consolidating primary login names and enterprise addresses, adjusting aliases, clearing stale sessions and cached credentials, re‑triggering directory synchronisations, and removing duplicate LDAP/AD entries (including legacy on‑prem accounts that co‑existed with cloud identities). Stale or inactive Exchange/Office365 mailboxes that produced NDRs or repeated Outlook password prompts were hidden, deactivated or consolidated; mailbox contents were copied from legacy mailboxes into the active mailbox when preservation was required. Duplicate Okta entries were removed or matched to the canonical Okta user (actions performed in the Okta Admin Console when appropriate) so the active Okta ID owned the enterprise address and attributes; old/deactivated records were left inactive when appropriate. Orphaned MFA bindings were removed and users were allowed to re‑enrol. Partial service states (for example myCampus and Teams operating on different accounts) were resolved by reassigning active account ownership for each service or removing legacy/external bindings so services authenticated consistently against the canonical identity; Microsoft Teams chat histories remained associated with the original identity and could not be merged. EPOS/myCampus disparities were resolved by verifying authoritative EPOS mappings, transferring enrollments and links to the correct account, and setting duplicate EPOS entries inactive rather than deleting them when appropriate. Where CARE merges were blocked because of EPOS and IAM dependencies, teams documented which bookings and accounts belonged together as a pragmatic workaround. Salesforce and vendor merge errors were corrected and missing IAM profiles were recreated (for example by replaying academic-profile.ProfileUpdated events via Conduktor) so downstream systems recovered records. Where directory writes or vendor merges were blocked, accounts were dissociated or legacy third‑party accounts deleted after owner verification and licences, group memberships and permission mappings were reassigned so project data became accessible. Support manually set or reset passwords in authoritative stores when self‑service password resets failed (including HTTP 400 errors) and validated that authentication flows subsequently routed to the canonical identity. Incorrect email mappings that blocked application licence assignment were corrected so the active identity matched the enterprise address and licensing could be applied. Duplicate provisioning requests were handled by confirming existing accounts and performing password resets rather than creating new profiles when appropriate. Investigations identified IAM/UI search limitations that hid archived profiles; duplicates hidden by that behaviour were located, merged or removed and email addresses (for example non‑enterprise addresses mistakenly assigned to duplicates) were reassigned to the correct active account, and the IAM/usability issue was raised with the owning team. Operational teams confirmed queue and capacity limits and escalated or redirected consolidation requests to the authoritative team, vendor or service portal when necessary; where full consolidation was prevented by third‑party product limitations, ownership was reassigned and mitigations preserved. For externally linked social profiles (for example LinkedIn) that could not be removed via the internal UI, users were directed to the People‑Projects team to request removal and advised to escalate to LinkedIn Support if People‑Projects could not resolve the linkage. Additionally, investigations discovered application‑level approval states (for example MyLIBF/DCWeb surfacing 'User account approval needed') that could remain set after accounts were merged and block portal logins or certificate downloads; these incidents were resolved by updating the application approval state and re‑provisioning the merged identity or by coordinating approval with the portal owners so the canonical account became usable.

Source Tickets (117)
9. New OASIS account provisioning with secure delivery of credentials
95% confidence
Problem Pattern

Authoritative identity or registration records failed to reach downstream tenants and services, causing users to be unable to sign in or receive account verification/activation messages. Reported symptoms included “access denied”, “user not found”, expired or missing activation/invite links and verification codes, missing or misassigned mailboxes, display names, aliases or application/license entitlements, and lost application or vendor-held data after migrations. Failures often coincided with provisioning sync errors (SCIM/HR/vendor), tenant segregation, vendor-side account merges (for example personal and institutional accounts sharing the same email), or corrupted/malformed attributes such as hidden whitespace, duplicates or typos.

Solution

Account provisioning, activation and verification failures were resolved by restoring alignment between authoritative identity records and downstream tenant/service records, repairing or reprovisioning downstream identities, and coordinating with application or vendor owners when vendor-side state prevented recovery. Key actions taken included:

• Fixed registration/transfer pipeline defects (including recurring OASIS cases where “Not Transferred” states blocked verification-email delivery) so verification and activation messages became deliverable.
• Recreated, corrected or reactivated Entra/Azure AD user objects and downstream identifiers; activated external/guest accounts; and updated user records (for example adding full given names) so email addresses, salutations and participant lists displayed correctly.
• Provisioned, reactivated or cloned service, worker, team, shared, test and bot accounts from templates to preserve ownership and metrics; when cloning failed due to invalid references those references were corrected or placeholder usernames applied.
• Reconciled license SKUs and application assignments so signed-in users saw expected apps and entitlements; fixes addressed license‑tier mismatches, missing mailboxes/aliases (including plus‑addressing), and stale GAL/proxyAddress attributes.
• Corrected corrupted attributes such as hidden/whitespace characters, typos and duplicate contact/phone records; reconciled extension attributes and vendor identifiers used for group‑based licensing and automated workflows so mailbox creation, licensing and downstream flows resumed.
• Resolved expired or missing activation links and one‑time codes by reissuing activation links or password resets and ensuring time‑limited codes were used promptly.
• Updated Okta provisioning/import flows and inline‑hook username generation to handle employee‑ID lookups, special bot/service accounts and entitlement/state reconciliation.
• Migrated Power Platform flows run under personal credentials to dedicated svc.* accounts, transferred ownership/execution, applied required Power Platform Premium licenses, and set manager/owner attributes.
• Made bot and service accounts usable by provisioning mailboxes/aliases to receive resets or by coordinating vendor console provisioning when mailboxes were not supported.
• Investigated audit history when edits caused failures, removed unintended personal emails from shared accounts, restored or recreated accounts, and rotated credentials; initial passwords or credentials were delivered through secure channels when required.
• Addressed vendor and tenant constraints by reissuing invites or vendor reset flows and escalating vendor master‑data mismatches to procurement; where vendor-side merges or migrations had suppressed verification delivery (for example a user’s personal and institutional vendor accounts sharing the same email), cases were escalated to vendor support and relevant service owners (Library and Information Services for EBSCO in the matched ticket) to unlink or recover accounts and restore migrated data when possible.
• Coordinated with separate application owners when application-managed assignments or UI behavior required escalation; created dedicated Entra ID admin accounts and a PIM/admin group for vendor/on‑site privileged access and documented MFA/encryption/compliance constraints.
• When historical sign‑in logs were outside retention windows, examined authentication token timestamps to infer activity.

These combined actions restored expected account activation and verification email delivery, mailbox and alias creation, display name accuracy, application and license entitlements, and where applicable recovered or escalated vendor-held data after migrations.

Source Tickets (158)
10. Calendly organization ownership transfer to a service account
93% confidence
Problem Pattern

Third‑party SaaS, vendor, and internal service accounts (including items embedded in SharePoint such as Microsoft Forms) became inaccessible, orphaned, suspended, deactivated, or unclaimable and produced access‑denied, credential‑rejected, or login‑failure errors. Common symptoms included expired or invalid invitation/reset links, invitations routed to departed or deleted mailboxes, SSO or phone‑number verification tied to personal accounts, licences bound to deleted Azure AD/Microsoft 365 users, missing API/bot invitations, inconsistent account email domains, inactive accounts (last login > 6 months), and platform UIs showing the wrong organisation or billing context that prevented switching to the intended institutional account. Owner‑initiated transfers were blocked when the recorded owner account was inactive or deactivated.

Solution

Ownership, access, and suspension failures across third‑party SaaS, vendor, and internal service accounts were resolved by reassigning ownership and sign‑ins to canonical IT‑managed service accounts or verified shared mailboxes after mailbox access was confirmed. Microsoft Forms ownership cases (including forms embedded in SharePoint) were resolved by applying Microsoft’s Forms ownership‑transfer guidance to reassign ownership when the recorded owner was a departed or inactive user. Where secrets or credentials had been lost because values were retrieved from a secret manager without being recorded, credentials were rotated and temporary one‑time secrets were issued via the organisation’s secret manager with passwords set to change at first login; secret delivery channels were controlled and users were informed about secure storage. Archived or deactivated vendor accounts were located (including under alternate or maiden names) and reactivated where possible; when invitations or resets had expired or accounts were unrecoverable, affected accounts were recreated, permissions were replicated from reference users, and functionality was tested before closure. Gated API/bot claims and first‑time invitations were accepted using dedicated service mailboxes or reissued invitations; provider sign‑in reset flows and vendor support were used to regain control when available. SSO, phone‑number verification, and licence‑portal bindings that prevented transfers were addressed through coordination with licence administrators, procurement, or vendor support to detach personal verification methods, reassign billing contacts or cost centres, or authorise institutional sign‑ups. Deleted or inactive Azure AD/Entra and Microsoft 365 user states were reviewed and cleaned; licences were freed in licence‑management portals and effective dates were recorded before subscription changes. Vendor billing holds and account suspensions tied to invoices were handled with accounts‑receivable and procurement to clear or dispute invoices or to arrange temporary backup accounts to maintain critical vendor functionality. Unused IT service accounts and associated platform artifacts were retired and unsupported account requests were closed with clarified ownership and links to the organisation’s business‑account process and secure credential storage guidance. Login failures caused by platforms that required a username rather than an email address were resolved by using the platform’s expected identifier during recovery flows. Platform organisation/billing context issues were resolved by switching the account/organisation selector to the intended institutional account. For SaaS cleanup cases, accounts were updated to unify inconsistent email domains and inactive employee accounts (last login > 6 months) were removed; individual account migrations or relocations were performed where required to preserve active user access and continuity.

11. Dedicated Okta service account for API tokens used in incident response
90% confidence
Problem Pattern

Service/API tokens authenticated successfully but API calls returned 403 Forbidden (rather than 401), indicating tokens lacked required authorization or used an incorrect audience. Tokens inherited the permissions of the account that created them, producing risks of over-privilege or ambiguous ownership. Affected systems included IdP-issued tokens (Okta, Auth0) and downstream APIs such as EPOS and IAM/API across prod/dev/stage environments.

Solution

A dedicated service/admin account was provisioned and assigned only the admin/roles needed for incident-response actions (for Okta this included password reset and session management; for Auth0 it included the appropriate API scopes). API tokens were created under that service account so tokens inherited only the scoped permissions of a team-owned account rather than an individual. The active token and account credentials were stored in the Incident Response vault in 1Password to centralize ownership and lifecycle management; the service account required a password reset email to activate access after creation. It was observed that authenticated tokens with insufficient authorization or wrong audience returned 403 Forbidden from downstream APIs (examples: GET /student-enrolment/v1/profiles returned 403). Misconfigured audiences had been a cause; the correct audience values for the affected systems were https://iam.iu.org for EPOS and https://api.iu.org for the API. The approach was applied consistently across production, staging, and development environments.

Source Tickets (2)
12. User unable to sign into corporate laptop due to forgotten/unknown credentials
93% confidence
Problem Pattern

Users were unable to sign into corporate devices and cloud services because credentials or profile bindings were forgotten, unknown, expired, cached, device‑bound, misconfigured, or blocked by local rate‑limits. Symptoms included rejected or cached passwords, account lockout timers on the login screen, missing or unavailable FileVault/BitLocker recovery prompts, absent Wi‑Fi/network controls at pre‑login screens, Okta/SSO and Okta Verify factor failures or locale mismatches, Intune/MDM enrollment blocks, and application license loss after OS reinstall. Affected systems included Windows and macOS device activation/initial setup, Okta SSO/Okta Verify, Intune, 1Password, Adobe Creative Cloud, and campus portals (OnCampus/myCampus/EPOS/Moodle).

Solution

Support first located the user’s corporate account and any recovery contacts and confirmed usernames when they were unknown or duplicated. When passwords were at issue, Okta and application passwords were reset and reset notifications were delivered to recovery/private email addresses; after users set new passwords they regained SSO and cloud service access where endpoints accepted the updated credentials. For 1Password Secret Key loss, users either completed the vendor recovery flow from the 1Password recovery email (self‑service) or administrators performed an administrator‑initiated account recovery and completed required admin confirmations; support verified the recovery and restored access. Campus account lock conditions were unlocked in EPOS/MyCampus or referred to Study Support for administratively locked student accounts. Temporary local device locks or rate‑limits were observed to expire and allowed subsequent sign‑in retries. When authentication was blocked by device‑bound factors or misbound methods, administrators removed or reset Okta authentication‑method bindings and reconfigured Okta Verify and Windows Hello so users could re‑enroll; activation codes for Windows sign‑in were provided when required. Okta factor language/locale mismatches were resolved by adjusting factor/account locale or verification bindings; persistent keyboard/locale mismatches sometimes required re‑enrollment or OS reinstallation. Devices absent from Intune were added to inventory or re‑enrolled so enrollment and device policies could complete. In multiple cases where newly reset passwords were accepted elsewhere but rejected by the corporate device and profile setup repeatedly failed, a full OS reinstall/reimage or re‑enrollment restored sign‑in, profile setup, and correct keyboard/locale behavior; some devices continued to use a cached old password until reinstallation or re‑enrollment. When Windows presented unfamiliar login or drive‑encryption recovery screens (including BitLocker prompts), support retrieved the device recovery key from escrow or an authorized colleague and guided the user through entry of the recovery key; access was restored without reimage where the recovery key cleared the encryption lock. Windows initial setup failures reporting error 801c03ed were resolved after the user’s account/profile settings and Windows management/group membership were corrected. Temporary profile issues on shared servers (for example JUMP) were resolved by removing temporary profile registry entries so normal Start menu, desktop shortcuts, and saved profile settings returned. For users returning from extended leave, account status was verified before resets and on‑site hardware inspection was offered when long inactivity suggested hardware issues. On macOS (including Apple Silicon), some initial‑enrollment failures required wiping and reinstalling macOS via macOS Recovery and removal of FileVault‑protected volumes (for example using erase‑volume‑group) so the device could be re‑enrolled and accept SSO credentials. After macOS reinstall and enrollment, SSO and Microsoft Teams authentication/screen‑sharing resumed and previously inaccessible internal KB links became reachable once account acceptance was restored. In several incidents a macOS login showed an account‑lock countdown and both old and new passwords failed while the FileVault recovery prompt or Wi‑Fi/network icon was not present at the pre‑login screen; these cases were resolved during interactive remote support sessions where support used the provided FileVault recovery key and restored the device to an unlocked state, or otherwise completed remote remediation that restored network/recovery visibility. Following OS reinstall, application licensing (for example Adobe Creative Cloud) sometimes required license reassignment or re‑provisioning; support verified licenses were assigned and restored access to licensed applications. Support provided step‑by‑step reinstallation guidance where needed and verified device enrollment and account unlocks.

13. Salesforce Service Cloud access gaps due to missing profile/campus/team and permission-set assignments
91% confidence
Problem Pattern

After administrative or provisioning changes (for example contract reassignments, role/position updates, account state changes, or IdP/group-sync events), users lost required Salesforce attributes or role assignments and observed loss of Service Cloud access and related system access. Symptoms included inability to see or access Salesforce case queues, Lightning email templates or template folders, manage activities, and missing MyCampus menu items or accounts appearing as student accounts. Additional symptoms included mismatched Salesforce profile mappings created by Okta/group provisioning and login differences where Okta SSO succeeded but direct Salesforce login failed due to MFA (YubiKey) registration or deprovisioning. Incidents typically produced no explicit Salesforce error messages and sometimes affected Office, EPOS/CARE and myCampus access.

Solution

Access failures were resolved by restoring user records and account state to a known-good configuration and synchronizing entitlements across related systems. Work that resolved incidents included reactivating or unfreezing accounts (sometimes temporarily for contract work before re-deactivation); correcting Salesforce Profile, Campus, Team and position attributes to match a functioning reference account; restoring permission-set assignments (examples applied in incidents included Case Management - DS - OnCampus - Basic, ConsentManagement, DS Campus Office, Lightning Email Templates Access Permission - Basic, and Manage Activities); and reinstating public-group and queue memberships so case queues and case-management workflows became visible. Several incidents traced to contract reassignments or contract records not shared with required teams, which removed position memberships and thereby revoked permissions; re-establishing the correct contract/position sharing or reassigning positions restored access. Support mirrored a reference user’s entitlements across systems (examples included Office account entitlements, EPOS/CARE permissions and myCampus access) and verified that permissions matched the reference account. Missing MyCampus menu items were resolved by assigning the appropriate MyCampus role (for example assigning the Academic Lecturer role to accounts that appeared as student accounts), with propagation delays noted. When repair was impractical, a new Salesforce user was provisioned and the settings of a functioning account were cloned; accounts were preserved via deactivation or freezing rather than deletion for temporary absences or administrative transitions. For incidents involving identity provider provisioning, additional steps resolved mapping and login discrepancies: Okta–Salesforce group/provisioning mappings that created duplicate or incorrectly profiled Salesforce users were corrected by restoring the intended Okta group memberships or updating the provisioning mapping so the Okta account linked to the correct Salesforce user; Okta deprovisioning/reactivation was reverted where it had removed entitlements. Cases where direct Salesforce login failed while Okta SSO still worked were traced to hardware MFA (YubiKey) registration or PIN changes; these were addressed by re-registering or restoring the user’s MFA device registration or by resolving Okta mapping so SSO authenticated into the correctly profiled Salesforce account. Administrative attempts to rename or re-link Salesforce usernames were sometimes blocked by Salesforce–Okta sync constraints and were handled by making the corresponding change in the IdP/provisioning layer or by reinstating the original provisioning state. Support teams performed the corrections or provisioning and notified users directly (for example via Microsoft Teams) or provided the Jira Service Desk self-service portal link when reactivation or entitlement updates were completed.

14. Persistent macOS admin/root access via AdminGroup and Self Service
90% confidence
Problem Pattern

macOS users were unable to obtain expected admin elevation options in Self Service: the Minion entry was missing or specific duration options (for example, a 30-minute temporary admin or a 3-year long-term admin) did not appear. Affected systems included Self Service on macOS, the Minion/Service Portal entries, and AD/AdminGroup membership. Users reported inability to elevate privileges for tasks such as screen sharing or extended administrative sessions.

Solution

Access options shown in the Self Service Minion were tied to the device's AdminGroup membership in AD. Two resolved scenarios were documented: short-term temporary admin: the user had no Minion entry and could not obtain the 30-minute admin session; the user was added to the appropriate AD short-term Mac admin group, the Minion entry then appeared in Self Service, and the user obtained the 30-minute admin rights needed for screen sharing. long-term persistent admin: the Mac's AdminGroup membership was changed from Shortterm to Longterm, the device was restarted, and the Service Portal Minion entry was used to request/grant the 3-year admin session in Self Service; the 3-year option then appeared and the user confirmed elevated access functioned as expected.

15. OTRS access appearing deactivated after queue migration to ServiceCloud
90% confidence
Problem Pattern

Users reported that their OTRS access appeared to be deactivated and they could not open or confirm an older notification message. The symptom was a perceived inability to access OTRS or locate a specific ticket/email; affected systems referenced OTRS, ServiceCloud/Salesforce, and the Munich StudSek queue. The issue arose around internal forwarding/queue migration and a change in the destination email address for that queue.

Solution

Support validated that the inquiry related to the Munich StudSek queue and confirmed the Munich queues had already been migrated to ServiceCloud. The queue's email address had been switched so new requests were routed to ServiceCloud (Salesforce) rather than OTRS, so there was no need to individually reactivate the user's OTRS account. The user was informed of the migration and the ticket was closed.

Source Tickets (1)
16. Atlassian customer-portal access failure due to email/identity mismatch across AAD and Okta
91% confidence
Problem Pattern

Users lost access to Atlassian, Microsoft 365, and other corporate resources when application identities did not match corporate identity records or when SSO/provisioning created duplicate, legacy, or mis-mapped accounts. Symptoms included failed sign-in or partial access (for example My Campus accessible while email or Teams failed), SSO flows creating a second Atlassian account that hid original Jira/Confluence content, error messages such as "Actions on this content limited by admin," inability to change issue status or post service‑desk comments, password‑reset emails sent to legacy/private addresses, removal from OpsGenie, and device/app provisioning remaining associated with legacy identities. Affected systems included Atlassian SSO (Jira/Confluence/Service Management), Okta, Azure AD, Microsoft 365 (email/Teams), OpsGenie, Company/Enterprise Portal, and other account‑managed services.

Solution

Support reconciled application identities with corporate identity records so primary account email and username values matched the corporate identity and duplicate or legacy application accounts were merged or removed. Where content, memberships, or licenses were split across identities, ownership or space permissions were reassigned or content was transferred to the primary account and Atlassian accounts were reactivated when required. Legacy external addresses on application identities were replaced with the corporate address (private addresses were retained as secondary contacts in some cases) so password‑reset emails and notifications were delivered to the corrected identity. Okta‑to‑application assignments and SSO/provisioning mappings were verified and corrected and surname/username values were fixed so sign‑in and password‑reset flows completed. OpsGenie memberships and Atlassian Service Management license associations were restored after merges/reactivations. In cases where device or Office provisioning remained associated with a legacy identity, locating the user’s Company/Enterprise Portal welcome email and reinstalling Office via that portal resolved missing Office apps on new hardware. Support also advised users to explicitly sign in with their specific primary email alias when multiple aliases existed (this resolved an email/Teams access failure in at least one case) and escalated to Digital Technologies/IT Helpdesk when necessary. Support observed that permission or reactivation changes sometimes took time to propagate, that explicit owner‑level permissions were required to access specific Jira boards or Confluence spaces, and that clearing browser cache/cookies helped persistent sign‑in issues.

17. Decommissioning of discontinued service/podcast mailboxes
91% confidence
Problem Pattern

Administrative requests to delete, close, or deactivate organizational and student Microsoft 365 accounts, service or podcast mailboxes, and externally linked accounts. Requests commonly arrived without error messages and sometimes without the user's IU email address, with identifying information provided as external emails (for example Gmail) visible only in application records. Affected systems included Microsoft 365 and connected applications such as MyCampus, Care, Epos, and community access across multiple domains (for example iu.org, iu-study.org, iubh-dualesstudium.de).

Solution

Support confirmed whether mailbox or account contents required retention. When no retention was required, administrators removed, deleted, or deactivated the specified Microsoft 365 user accounts (including student accounts on organizational and personal domains, e.g., iu-study.org and freenet.de), decommissioned service and podcast mailboxes, and deactivated external .ext accounts. Related application accesses — including MyCampus, Care, Epos, and community access — were locked, suspended, or revoked as requested. When requesters did not provide an IU email address, staff searched connected application records (for example Care) for external email identifiers to locate the account; when no Microsoft 365 account was found, that result was recorded and communicated to the requester. All deletion and access-lock actions were recorded by administrators (for example Microsoft 365 deletions recorded by Sabrina Filz; Epos and community locks recorded by Magdalena Kügel). No deletion or deactivation errors were reported and requesters were informed when actions completed.

18. iCloud Keychain inaccessible due to Apple ID sign-in failure
92% confidence
Problem Pattern

Apple IDs using institutional email addresses were sometimes classified by Apple as claimed/private, producing repeated Apple ID/iCloud sign‑in or “Apple ID Validation” prompts and warnings that institutional addresses would be replaced with @icloud.com addresses. Symptoms included blocked App Store updates, failed in‑device password resets, app authentication failures, errors changing or creating Apple IDs (for example “This email address is not available” or “Apple ID ending with this domain is not allowed”), two‑factor codes being sent to decommissioned company phone numbers, and sign‑in failures on iOS/macOS devices. On macOS, the iCloud “Sign Out” process occasionally hung with a spinning icon, affected Macs sometimes failed to display devices correctly, and some Macs could not log into iCloud.com while other devices continued to work. Affected systems included Apple ID/iCloud, iOS/macOS devices, the App Store, and MDM‑managed devices.

Solution

Support observed that Apple had begun classifying the institution’s domain as claimed and in some cases treated IT‑provisioned institutional addresses as private Apple IDs. Many accounts were restored when users completed Apple’s “Forgot password” flow or reactivated the account through a browser on the device; reactivation in several instances freed the institutional address so administrators could proceed with domain‑claim/Apple Business Manager tasks. Accepting or creating a free @icloud.com address (including Apple‑offered temporary addresses) stopped repeated sign‑in prompts and restored App Store update capability and app access; creating a new free @icloud.com address also permitted App Store updates while an original account remained disabled. Adding and verifying a private (non‑institutional) email on the Apple ID enabled migration in numerous cases, though some attempts to change sign‑in emails failed with “This email address is not available.” Accounts that lacked a valid password, recovery contacts, or had two‑factor authentication tied to decommissioned company phone numbers required Apple Support–assisted account recovery and identity verification; support was unable to change trusted phone numbers for private Apple IDs without account owner or Apple intervention. When users were blocked from creating a new Apple ID with their institutional email, alternatives included creating an Apple ID with a different email domain or creating a Business Apple ID (the latter limited independent purchasing/downloading in several cases). In at least one case changing the account’s sign‑in email to an appropriate business address caused Apple to treat the account as a Business account and resolved migration notifications. Support validated the legitimacy of Apple’s notices when users suspected phishing and inspected device/App Store/MDM state when relevant. Additional observed macOS behavior included the iCloud “Sign Out” hanging with a spinning icon and affected Macs not listing devices correctly; multiple restarts often did not resolve the hang, support offered remote sessions to investigate, and some situations required Apple intervention or remained unresolved in the ticket record.

19. Okta access failure for external/instructor email addresses requiring account/password reset
95% confidence
Problem Pattern

Users with external or personal recovery/primary email addresses (for example ext@iu.org and consumer providers such as Gmail, Yahoo, iCloud, posteo, gmx, web.de, outlook.de) experienced Okta authentication failures or could not complete first‑time activation. Reported symptoms included immediate “Access not possible” or generic login failures despite correct credentials, expired or undelivered activation or reset emails, inability to complete self‑service resets when no second factor was registered, locked/disabled accounts, and device‑specific behavior where a recent password worked on one device but failed on others or desktop apps. Some cases traced to missing, disabled, or incorrectly internalized identity records (including no external Okta account), and downstream services (Microsoft 365/Outlook/Teams, myCampus, Care, Vonage, 1Password, Atlassian, PowerApps) were affected. Automated provisioning/monitoring sometimes reported accounts as active or in a RECOVERY state even when activation links had expired, causing confusion about whether manual reactivation was required.

Solution

Support restored Okta and downstream access by reconciling identity records and performing targeted administrative account actions. Technicians reactivated or re‑imported missing or disabled Okta accounts, corrected or consolidated alternate IU usernames and identity records, and reconciled internalization changes (external→internal) that blocked activation or reset flows. Administrators performed admin‑initiated Okta password resets to generate new activation/password‑setup tokens and regenerated or resent expired activation/reset notifications to external/private recovery addresses; they also updated locked or greyed‑out primary‑email fields so notifications delivered to the correct address. For contingent workers, reactivations and term/extension changes were completed via the Manage Contingent Worker Account form or by routing requests to the Dozierendenguides team; Okta license renewals/extensions or end dates were applied as needed. Support cleared application‑specific access blocks by prompting hostkey/notification resends, remediating app‑side tokens, refreshing application‑level credentials and regenerating tokens when a recently reset password worked on one device but not others, and confirmed users were signing in via the correct Okta URL (okta.iu.org) when URL confusion was a factor. Cases where a successful Okta sign‑in did not surface application tiles were escalated for application‑access investigation. Automation and provisioning APIs (Atlassian/automation) sometimes reported accounts as active or in a RECOVERY state even when activation links had expired; in those cases tickets were occasionally closed when automation indicated an active account and no further requester confirmation was provided. These combined actions restored downstream access to Microsoft 365/Office 365 (Outlook, Teams), myCampus, Care, Vonage, 1Password, Atlassian and PowerApps.

Source Tickets (116)
20. Okta account/password reset requests for individual users
93% confidence
Problem Pattern

Users could not sign in to Okta or SSO‑protected applications (MyCampus, Atlassian, Microsoft 365/OneDrive, Salesforce, Twilio, Workday, etc.) via web, desktop, tablet, or mobile. Symptoms included missing, undelivered, or expired activation or password‑reset emails; missing or delayed Okta Verify enrollment prompts (QR); reset flows that looped or left accounts in “Password Reset Mode”; accounts locked or blocked by repeated failed attempts or suspicious‑activity detection (emails titled “Blocked Access Attempt” referencing IPs); unblock links or password changes that did not clear blocks; authentication at the wrong endpoint; and device sync failures such as desktop Office becoming read‑only or OneDrive failing to sync.

Solution

Support first determined whether authentication was controlled by Okta or by the application owner and then applied the appropriate remediation. For Okta‑managed accounts, support verified the primary Okta authentication state, checked for expired credentials, and unlocked or reactivated accounts that were locked or blocked by repeated failures or suspicious‑activity detection. Support retriggered or resent activation and password‑reset emails to users’ registered or alternate/external addresses (including personal Gmail/Hotmail/GMX) when delivery failed or links expired and confirmed the correct recipient before proceeding. Administrative unblocks or clearances of security block flags were performed when unblock links or password changes did not clear blocks; support investigated “Blocked Access Attempt” notifications (including referenced IPs) as part of that work. Admin‑initiated password resets were used when self‑service flows failed because a second factor or mailbox access was unavailable; in one instance a user set a new password via the workstation startup password change flow. Support corrected cases of users authenticating at the wrong endpoint and replaced expired or delayed links. For device‑specific failures, affected devices were re‑authenticated after credential changes to restore OneDrive sync and cloud access; desktop Office apps returned from read‑only to editable after re‑authentication in reported cases. For applications not controlled through Okta (for example Atlassian via a Shibboleth proxy, FONTO via the IU Portal, or Workday), support either referred users to the application owner or performed account resets when the request was within support scope; a Workday account reset was completed on request in one incident. Okta Verify enrollment prompts (QR) sometimes did not appear in the client UI; logs occasionally showed Okta Verify authentication occurring shortly after without further intervention, and tickets were closed once the user confirmed access was restored. Temporary credentials, reset instructions, or status updates were sometimes communicated via Microsoft Teams or email. After unlocking/reactivation, password resets, administrative unblocks, or referral/resets to the appropriate owner, Okta and downstream SSO access was restored in the reported incidents.

21. Salesforce user record deactivated causing immediate login failure
95% confidence
Problem Pattern

Salesforce users and service accounts failed to authenticate (direct login or IdP/SSO) because the Salesforce user record was inactive. Reported symptoms included generic authentication failures or “contact a Salesforce administrator” prompts, IdP launches that failed to open Salesforce, undelivered or looping password‑reset links, Salesforce Authenticator reporting “cannot connect to the server,” and inability to @‑mention or link the inactive user in records. Triggers included prolonged absence (sabbatical, hospital leave), administrative disablement at assignment/contract end, or automatic inactivity deactivation; automatic inactivity windows varied widely (observed as short as 24 hours and commonly ~30+ days).

Solution

Incidents were resolved by reactivating the inactive Salesforce user record in the org’s backend/admin console. Reactivation typically restored direct and SSO sign‑ins after a short propagation period (generally a few minutes up to about 5–10 minutes). Where password‑reset links had failed or reset flows had looped while the record was inactive, reactivation followed by issuing a new password‑reset link allowed the user to set a new password and sign in; delivery of password‑reset links to alternate emails was handled case‑by‑case. Reactivation restored the ability to be @‑mentioned/linked in Salesforce records and cleared Salesforce Authenticator “cannot connect to the server” errors (one case required re‑linking the Authenticator app after a phone change). Reactivation did not automatically restore mirrored or downstream entitlements (for example Care or Academy5), which required separate access requests. Administrators sometimes updated team/contact fields on the user record during reactivation. Reactivation occasionally exposed unrelated in‑product integration errors (for example Vonage) that required separate incidents; in one case the user’s Salesforce signature image remained missing after reactivation and required profile support. Reported environments enforced automatic inactivity deactivation with varying windows — in some orgs this window was extremely short (an observed example of 24 hours), in others ~14–30+ days — and support sometimes declined reactivation when an immediate re‑deactivation was expected. Support reassured requesters that inactive status did not equate to account deletion. Tickets in the reported set were typically marked Done and auto‑closed by Automation for Jira after 14 days with no user reply.

22. External worker termination-date extension via Automation for Jira and Okta
95% confidence
Problem Pattern

Requests to extend, reactivate, or deactivate external/service accounts submitted via the IT Service Portal or Atlassian Assist were routed into Automation for Jira and Okta workflows but often exhibited workflow failures: approvals remained pending, were misassigned/unavailable, or auto‑closed after a 14‑day timeout labeled “Won’t Do,” leaving Okta termination/expiration dates unchanged and causing unexpected deactivations or continued access. Portal/Assist submissions frequently lacked clear identifiers, expiration dates, or justification, were misclassified or immutable after submission, and some deactivation requests were processed incorrectly as termination‑date extensions. Automated systems typically emitted no technical error codes; operational logs sometimes contained localized German messages.

Solution

Standard external‑worker termination‑date extensions and reactivations had been processed through the IT Service Portal (and occasionally Atlassian Assist) into Automation for Jira approval workflows and Okta automation. When approvals completed an Atlassian API service account recorded the updated termination/exit date and Okta automation applied that termination_date to the Okta account and downstream IU provisioning; the change was logged in Jira and technicians closed the ticket. Approval reminders were sent by Automation for Jira and requests were auto‑closed as “Won’t Do” after a configured 14‑day approval timeout; in timed‑out or explicitly declined cases the Okta termination/expiration date often remained unchanged, which led to unexpected deactivations. In some incidents deactivation requests were incorrectly handled as termination‑date extensions rather than account disablements, requiring corrective follow‑up. Nonstandard renewals, reactivations, and expired accounts were handled manually on a case‑by‑case basis and included manually updating Okta termination/expiration dates and licenses, reactivating Okta accounts, adjusting or reactivating downstream system accounts (for example AB Tasty and Office365/mailboxes), and sending Okta password‑reset messages to a user’s private email after reactivation. Short interim extensions were sometimes applied to prevent immediate deactivation while account or email attributes were clarified. At year‑end batches of external accounts were deactivated when managers did not respond to expiry reminders; several reactivated accounts entered a “Pending user action. User password selection required” state after reactivation. Automated systems typically did not emit technical error codes and operational logs sometimes contained localized German messages. The Automation for Jira approval reminder had previously used an outdated portal link and was updated so subsequent reminders pointed to the correct Jira ticket/ticket type.

Source Tickets (166)
23. External worker termination-date extension stalled awaiting Jira-automation approval
95% confidence
Problem Pattern

Requests to extend external workers' termination/end dates remained stuck in Automation for Jira in a 'waiting approver' state when approver metadata was incorrect (wrong manager, CC-only approver, or cost-center/approver mismatch), when the designated approver did not act or did not recognize the external user, or when requesters lacked permissions to reassign or cancel the request. While in the pending state the Atlassian API and downstream Okta automation did not confirm or apply updated termination dates; Automation for Jira sent repeated email reminders and, if no approval occurred within the system timeout (~14 days), requests could be automatically declined and closed. Some tickets also showed data discrepancies between the requested date and authoritative reports.

Solution

Extension requests remained in a pending 'waiting approver' state until a valid approver acted, an approver field was corrected, the request was canceled, or Automation for Jira auto-declined the request after extended inactivity (~14 days). Where a CC-only approver had been set the workflow awaited the designated approver's approval; once that approval occurred the Atlassian API returned confirmation and the Okta automation applied the updated termination/end date. Where wrong approver or cost-center ownership was entered technicians either corrected approver metadata or closed/canceled the request; in those cases no change to the existing termination date was applied. When the designated approver did not recognize the external user Automation for Jira sent repeated email reminders and the request was automatically declined and closed after the system timeout. Technicians informed requesters about correct approver and cost-center ownership and noted when ticket-permission limitations prevented requesters from closing or reassigning requests, which required resubmission by the proper approver. IT teams indicated they did not have visibility into academic contracts and therefore could not initiate or approve extensions on behalf of academic departments; requesters were instructed to have the academic responsible person or department submit the extension request or to escalate to Dozierenden Guides. Incidents showing discrepancies between requested dates and authoritative reports were handled case-by-case (for example, closed as “Won't Do” and resubmitted to the correct approver), and account termination dates were verified after approval, cancellation, or resubmission.

24. Scheduled Okta report for active employee accounts with specific attributes
90% confidence
Problem Pattern

Request for a recurring (weekly) export of active Okta-enabled users corresponding to institutional employees, including specific user attributes (email, status, termination date, business unit, cost center, employee type). No automated report existed and stakeholders needed a reliable weekly delivery of those Okta attributes.

Solution

An Okta attribute review was completed with the stakeholder to confirm available fields. A report was created containing the agreed fields: E-mail, Status, terminationdate, businessUnit, Cost_Center2, and employeeType. An initial report export was sent to the stakeholder for validation. Automation for Jira was then configured to deliver the report every Monday at 07:00. The scheduled delivery was confirmed and the ticket was closed.

Source Tickets (2)
25. Account request form showed pre-submitted entry and provisioning stalled by automation approval
90% confidence
Problem Pattern

Account provisioning requests were blocked or redundant due to Microsoft Forms and automation behavior. Symptoms included Microsoft Forms showing phantom pre-submissions with old timestamps that prevented new submissions, Forms enforcing one-entry-per-user that prevented re-requests when external activation links expired, missing confirmation emails leaving provisioning queued in Automation for Jira, and Automation for Jira generating notifications or due-date alerts for access requests where the account already existed and had recent logins. Affected systems included Microsoft Forms, Automation for Jira, Jira, email notifications, and external identity providers (e.g., OpenAI).

Solution

Two resolution patterns were used depending on the root cause. For phantom Microsoft Forms submissions that prevented creating a new request and left provisioning queued in Automation for Jira, support sent a manual invitation email that allowed the user to create the account with their email; this bypassed the Automation for Jira approval queue and restored provisioning. For requests that were redundant because the account already existed (including external provider accounts such as OpenAI), support checked the user directory and the external provider account status (for example, OpenAI showed the account as 'normaluser'), confirmed prior login activity where present, and cancelled/closed the Jira ticket as unnecessary (resolution: Won't Do). When Microsoft Forms enforced a single-entry-per-user and an external provider's activation/invitation link had expired, support noted the form limitation, verified the external account state, and informed the requester; if the provider would not reissue an activation link, users were redirected to alternate support channels (e.g., Microsoft Teams) or the ticket was closed as not actionable from the internal provisioning workflow.

26. Application form fields disabled despite active Okta/IU Office account and license
80% confidence
Problem Pattern

Users could sign into the Preference Survey (Präferenzabfrage) with their IU Office/Okta credentials but were unable to interact with form fields (fields remained disabled/grayed/'not blue'). In some cases the app UI displayed the user's account status as 'Nicht aktiv' (not active), blocking form completion. The symptom involved the Preference Survey / Lehrenden‑Apps frontend and the IU Office/Okta identity, with the visible inactive state potentially originating from the app's own account management rather than an Okta/license issue.

Solution

Support inspected affected users' Okta profiles and linked IU Office accounts and verified the Okta account state and Preference Survey app license assignment. In cases where Okta and the IU Office account were active and a license was present, support found no account freeze or license misassignment and concluded the disabled form fields were not caused by Okta/IU Office account status. For tickets where the Preference Survey showed the account status as 'Nicht aktiv', support identified the app as part of the Lehrenden‑Apps suite and noted that that app-managed account state was outside IT's remit; support did not change the account and directed requesters to the Lehrenden‑Apps team (s.ds-lehrplanungsapp@iu.org) and the Lehrenden semester‑planning SharePoint page for further handling. The combined observations indicated two common outcomes: (1) UI/ app-side interaction problems despite active Okta/IU Office accounts and licenses, and (2) app-managed 'Nicht aktiv' account states that required Lehrenden‑Apps team action.

27. Salesforce access blocked with no password‑reset email delivery and Okta SSO dependency
90% confidence
Problem Pattern

Users reported inability to access Salesforce: signing in with their last-used password failed and the 'Forgot password' flow did not deliver a password‑reset email. Symptoms indicated the user’s Salesforce account was deactivated or not provisioned (commonly after >30 days inactivity) and often involved Okta SSO/Okta Dashboard sign-in. Reactivated accounts sometimes exhibited a short reactivation window (about 1–2 days) during which the user had to sign in before the account was deactivated again.

Solution

The issue was caused by a deactivated or unprovisioned Salesforce account (often due to >30 days of inactivity) and was resolved by reactivating the user’s Salesforce account in the appropriate org (including Salesforce Production when applicable). Support verified the user signed into Okta and launched Salesforce via Okta SSO; verifying the Okta session and signing in through Okta restored interactive access. When users attempted to sign in with a previous password and did not receive password‑reset emails, support confirmed the account state and reactivated the account; teams noted and acted on a short post‑reactivation window (about 1–2 days) during which the user needed to sign in to avoid immediate re‑deactivation. In cases where entitlements or API access remained missing after reactivation, support identified a reference user (for example, Laura Hörterer or Steffen Slavetinsky) and copied that user’s Salesforce profile/permissions to the affected account so entitlements matched the required profile. Requests for Salesforce API access and client credentials (client key/secret) were processed in conjunction with the profile/permission change to ensure the account had the appropriate API/profile privileges.

Source Tickets (3)
28. Workday-driven username/email rename with FileVault/T2 Mac requiring device erase and downstream service updates
85% confidence
Problem Pattern

Workday reported a legal name change requiring a username/email change for the user's corporate identity. The user had a FileVault‑encrypted T2 Mac that required backup and a full device erase/reinstall as part of the transition. Multiple downstream services (VPN, Egencia, myCampus) and device recovery keys were impacted by the rename.

Solution

The Okta renaming automation was triggered and the username/email was updated (old username/email changed to the new Workday-provided identity). VPN access instructions were sent to the user's private email address. Egencia and myCampus update requests were created/assigned to the appropriate contacts, and the Mac was backed up and fully erased/reinstalled to handle the FileVault/T2 requirements prior to re-provisioning.

Source Tickets (1)
29. External teaching account appeared expired in self-service but was active; password reset restored access
91% confidence
Problem Pattern

External teaching/external‑employee accounts sometimes appeared expired, inactive, or unselectable in the onboarding/extension self‑service portal or were actually expired after missed reactivation deadlines. Affected systems included Okta sign‑in, IU‑Mail, Office/Outlook, Teams, myCampus, and downstream apps; users reported inability to sign in, receive password‑reset emails, or get 2‑factor prompts. Error symptoms included sign‑in failures (for example the German message “Anmeldung nicht möglich”), failed ticket creation in the portal, and cases where some services (for example myCampus) still worked while mail/Teams/Office failed; some accounts had no IU email so notifications were routed to external addresses.

Solution

Technicians first verified the account record and status in Okta to determine whether the identity account remained active or had reached its institutional end date. When the Okta identity was active but users could not sign in, support initiated identity‑level password/account resets and, when necessary, application‑level resets (for example Office/Outlook and myCampus). Reset messages were delivered to the email address on file—typically the user’s IU‑Mail account but sometimes an external address (for example gmx.de or aol.com)—and those resets restored access to Okta, IU‑Mail, Office/myCampus and downstream services in documented cases. Several incidents recorded no delivery of 2‑factor authentication prompts. Where the account had actually reached its end date or been deactivated after a missed extension window, support advised that a supervisor‑initiated extension (via the Dozierenden Guide) was required to reactivate the account; in some tickets agents closed after advising supervisors to request an extension when reactivation had not yet been completed.

30. Re-import and reactivation of Okta accounts when provisioning connector retains record
90% confidence
Problem Pattern

Accounts in target applications remained active after the user's central account was deactivated, removed, or exmatriculated. Affected users either could not sign in via the identity provider (generic authentication failures such as “unable to sign in” or “no app assignment”) while the target app still held an active account and license, or continued to have access after exmatriculation because the source system retained the account. Incidents occurred when provisioning connectors retained records after deactivation, when SAML Just‑In‑Time provisioning emitted no deprovision events, or when source‑of‑truth processes (for example, delayed M365 deletion after exmatriculation recorded in Salesforce) and administrative ownership/retention policies prevented timely account deletion. Target applications frequently did not emit explicit deprovision errors.

Solution

Two distinct classes of root cause produced the same symptom (a user could not sign in via SSO or continued to consume a license while the target app account remained active), and both classes were observed and resolved in production cases. For connector-backed provisioning where the connector retained a matching record after the central account was deactivated, support re-imported the user via the provisioning/import process, reactivated the central account, and matched the reactivated account to the existing record on the provisioning connector; restoring that linkage returned the account to a usable state. For SAML/JIT provisioning (which does not emit deprovision events) teams moved affected apps to a provisioning method that supported deprovisioning (for example, enabling SCIM where available) or implemented an out‑of‑band deprovision mechanism; examples of out‑of‑band approaches included Okta Workflows or webhooks that deactivated or deleted the target application account when the central account or app assignment was removed. Separately, incidents were caused by source‑of‑truth lifecycle and administrative‑ownership issues (for example, exmatriculation recorded in Salesforce while the M365 account remained due to retention windows or delegated administration). Those cases were resolved by engaging the owning team (for example, student‑account support) or using the appropriate delegated admin tool (for example, manual M365 account deletion via a Powerapp) to remove the account in the target application. Reported user‑facing symptoms included generic authentication failures from the identity provider and no explicit deprovision error from the target application; resolution required either restoring the provisioning linkage or ensuring the source system and administrative owner completed account deletion or an out‑of‑band deprovision.

31. Temporary/test account provisioning with automation due-date/lead-time warnings
85% confidence
Problem Pattern

Request to create a temporary/test user account via the provisioning system for Windows 11 testing triggered an automation warning that the chosen due/start date was in the past or lead time was too short. The requester needed a usable test account and a password-reset delivery scheduled to the user's private email.

Solution

A temporary test account (alex.vasiliauskas-test.ext@iu.org) was created via the provisioning system using the Atlassian API. The account was configured so that on the scheduled start date a password-reset email would be sent to the user's private email address. The ticket was completed after the account was created and the password-reset delivery was scheduled despite the earlier automation warning.

Source Tickets (1)
32. Salesforce account reactivation and password-reset after inactivity/decay
95% confidence
Problem Pattern

Users could not log into Salesforce because their Salesforce user records had been set inactive or disabled after prolonged inactivity (commonly ~90 days). Login attempts often failed without informative error messages. Password-reset requests or password-change attempts sometimes did not restore access while the user record remained inactive, preventing access to Lightning and Classic Salesforce URLs.

Solution

Administrators reactivated Salesforce user records that had been disabled by inactivity/decay; re-enabling the user restored login access. In some cases credentials were expired or unknown and support also reset passwords and sent password-reset emails, but password-reset attempts performed while the user record remained inactive often did not succeed. After reactivation, users were advised to log in promptly (typically within 24 hours) to avoid automated re-deactivation; affected users subsequently confirmed successful login.

33. Third-party PMS account requests requiring vendor-specific request forms
76% confidence
Problem Pattern

Users were unable to access third-party PMS accounts due to account lockouts after multiple failed login attempts. The system displayed "account is locked" errors; password-reset/"forgot password" functions were sometimes unavailable while the account remained locked, and saved browser credentials did not bypass the lock. Affected systems included third-party PMS applications (e.g., SiteFusion) and vendor Service Portals. Requesters reported internal support could not resolve the issue because the internal team lacked access to the vendor's account-management tools.

Solution

Support confirmed they did not have access to third-party PMS account-management tools (for example, SiteFusion). For new account requests, account-unlock errors ("account is locked"), and permission changes in vendor-managed PMS, support routed requesters to the vendor's dedicated Service Portal or vendor-specific account-request form and closed tickets after rerouting. Support noted that password-reset/"forgot password" workflows were sometimes disabled while the account remained locked and that saved browser credentials did not bypass a locked account. Where requesters completed the vendor portal/form request, the vendor provisioned or unlocked the PMS account and referenced the user specified in the vendor request. Support informed users to contact the responsible application/PMS owners when vendor intervention was required.

34. Instructor Microsoft 365 licenses converted to web-only, removing desktop Office app access
85% confidence
Problem Pattern

Instructor Microsoft 365 accounts were assigned SKUs that allowed only web-based Office (office.com), causing loss of desktop Office apps (Word/Excel/Outlook). Affected systems included Okta, Microsoft 365 licensing, and office.com; users reported inability to open or edit resources (for example, evaluation forms in the My IU Teacher Portal) and sometimes saw UI messages such as 'license was locked/disabled.'

Solution

Immediate access for an affected user was restored by extending the account termination/end date via Okta automation so the Office account remained active. Investigation showed instructor accounts had been reassigned to Microsoft 365 SKUs that were web-only (office.com), which removed entitlement to desktop Office applications. Where users could not open or complete documents (for example, evaluation forms in the My IU Teacher Portal) and reported messages like 'license was locked/disabled,' they were informed that the assigned SKU did not include desktop app access and were directed to sign in through the Okta dashboard and use the Office web applications to access and edit those documents. The web-only SKU assignments persisted beyond termination-date changes and required separate corrective license reassignment to restore desktop Office access.

35. Automated suspension from HR data changes (future hire date/job update) disabling accounts across Microsoft and Jira
90% confidence
Problem Pattern

A user account in Azure AD/Microsoft and Jira became blocked/disabled with symptoms such as inability to be mentioned in Jira, missing Teams presence, and loss of access to services. The timing correlated with recent HR data changes—specifically a job-title update and a hire date set to a future date—which appeared to trigger automated suspension workflows. No explicit error codes were provided.

Solution

Support manually reactivated the affected Microsoft/Azure AD and Jira accounts, after which the user confirmed service access and presence were restored. Investigation noted that no manual administrative lock had been applied; a recent HR record change (job-title update and hire date set to 1.7.2024) likely triggered the automated suspension rules that disabled the accounts.

Source Tickets (2)
36. Salesforce production/reactive access and separate UAT account provisioning
72% confidence
Problem Pattern

User requested a Production Salesforce account plus a separate Staging/UAT account and asked for the 'Profile Switch' feature. The user reported being unable to access Production because their Salesforce production account was deactivated. A non-related GitLab access issue was mentioned but was out-of-scope.

Solution

The incident was resolved by reactivating the user's Production Salesforce account to restore immediate access and provisioning a separate Staging/UAT account to satisfy the request for an isolated test environment. The request for profile-switching between Production and UAT was recorded alongside the account provisioning actions. The unrelated GitLab issue was acknowledged but not handled as part of this work.

Source Tickets (1)
37. Instructor/external user requested full credential regeneration for personal and external IU addresses
90% confidence
Problem Pattern

A user requested complete credential regeneration (a full or "All Over Reset") for one or more identities, commonly including a personal external email (Gmail/GMX) and an IU external address. No error messages or specific symptoms were reported; the request was user-initiated and affected identity platforms such as Okta, Microsoft 365, and Atlassian.

Solution

Support executed a full credential regeneration ("All Over Reset") for the affected identities across identity platforms (Okta, Microsoft 365, Atlassian). New access credentials were generated and delivered, and reset notifications/instructions were sent to the user for the affected addresses (including personal Gmail/GMX and IU external addresses). The action was documented in the ticket and no further follow-up was recorded.

38. Department/shared LIBF account provisioning requested and handled by central administrator
90% confidence
Problem Pattern

Users reported either missing or inaccessible LIBF accounts tied to libfStudy (no existing libfStudy account under their IU.org identity) or inability to sign in to libfStudy M365, LIBF myCampus, Outlook, or EPOS. Symptoms included authentication failures, loss of access, or explicit requests for new account provisioning and credentials delivery for booking calendars, instructor/EPOS access, or M365/Outlook services.

Solution

Provisioning and access issues were handled by coordinating with the LIBF team and by central administrators. New libfStudy accounts were created by LIBF colleagues when requested and account details (usernames and initial credentials or next-step instructions) were sent to the user's IU.org email address. When instructor/EPOS accounts were required, IU support created EPOS instructor accounts using the libfStudy address and delivered the account details to the user’s IU email. For lost-access/password issues, support provided a self-service password-reset manual for LIBF myCampus and escalated M365/libfStudy password resets to LIBF IT; LIBF IT reset affected M365 passwords and communicated the new credentials via IU email. Tickets were closed after users confirmed access was restored.

Source Tickets (3)
39. Salesforce account creation by cloning another user's permissions
90% confidence
Problem Pattern

Requesters asked for new Salesforce accounts that matched the permissions of a named existing user (including in UAT), sometimes requesting the original account be preserved for reporting but made inactive. Affected systems included Salesforce, the identity provider (Okta), and email provisioning; symptoms included inability to access required records, stalled provisioning when support teams lacked rights to clone permissions, and workflow blocks caused by missing or incorrect provisioning forms or email requirements.

Solution

New Salesforce user accounts (including UAT environment accounts where requested) were created for the requesters and the referenced user's permission set/profile was replicated so they could access the previously unavailable records. Where reporting history needed to be preserved, the original Salesforce account was left inactive. Identity-provider and email provisioning blockers were handled by coordinating with Okta and the mail team: valid or placeholder email addresses were assigned where required and explicit consent from the original user was obtained before deactivation. When frontline support lacked the rights to perform the cloning, requests were forwarded to the specialist team and requesters were in some cases asked to resubmit via the appropriate Microsoft Form before provisioning proceeded. Requesters were provided the new account details and confirmed they could access the required objects.

Source Tickets (3)
40. Third-party vendor business account reactivation routed to procurement
95% confidence
Problem Pattern

A vendor-managed business account (Amazon Business) became inactive/expired and the user was unable to access business purchasing. The user requested reactivation but the account appeared to be governed outside central IT.

Solution

Support confirmed the Amazon Business accounts were managed by Strategic Procurement and responded with contact details for that team. The user was directed to contact the procurement mailbox (einkauf@iu.org) to request reactivation rather than having IT perform the reactivation.

Source Tickets (1)
41. Workday-driven username/email rename with local macOS account conflict requiring in-person handling
90% confidence
Problem Pattern

A Workday-driven family/name change triggered upstream email and Okta username renames while the affected user had a separate local macOS account on a corporate Mac. After the remote rename the device either rejected the old local login or a new blank local account was created, leaving the user unable to access their original home folder. Users reported missing personal files, application preferences, and software configurations despite applications launching. Affected systems included macOS (MacBook), Jamf-managed devices, Okta, local user accounts, and FileVault-encrypted disks.

Solution

Renames were coordinated in person with on-site device-support staff so local macOS account credentials and FileVault access could be reconciled before upstream Okta/email changes. When a remote rename had already resulted in a new blank local account, device support located the original home directory, restored ownership/permissions, migrated user files and application preference data into the active account, and re-established the device-specific credentials so the user could log in. Jamf device state and the Okta-to-local account mapping were validated and adjusted to prevent duplicate-local-account creation or unnecessary reimages. These actions restored the user’s files, application settings, and Mac login without full device reimage.

Source Tickets (2)
42. Staff portal / IU email access restored after account password reset
90% confidence
Problem Pattern

Users reported inability to access IU staff systems — notably staff portal/myCampus, Okta, and institutional email (IU mailbox/Outlook). Symptoms included account-locked errors or silent authentication failures, inaccessible or deactivated IU mailboxes (including mailboxes deactivated while on leave), and inability to complete self-service password resets because reset links or notifications were sent to the institutional mailbox the user could not access. Confusion frequently occurred when services used separate credential scopes (for example, myCampus vs Okta).

Solution

Support reviewed prior ticket history and authentication logs and noted recent password changes, lockouts, or mailbox deactivation where present. Because users' self-service reset messages were delivered to an institutional IU mailbox they could not access — or because the mailbox had been deactivated after leave — support performed administrative account actions: account unlocks and/or administrative password resets and, when required, invoked the reset-workflow to reactivate the IU mailbox. Support clarified which services used separate credential scopes (for example, myCampus vs Okta), tested authentication to affected services (staff portal/myCampus, Okta, Outlook/ticketing), confirmed successful logins via authentication logs, and notified the user that access was restored.

Source Tickets (3)
43. Manual legal name/surname change for external/instructor accounts with non-editable Okta identity fields
95% confidence
Problem Pattern

An instructor requested a legal surname change affecting external IU email and personal email addresses. The user reported login-related issues and administrators found Okta identity records with no editable name fields, preventing standard name updates. Multiple downstream systems (third-party tools and email) required coordinated name updates.

Solution

The administrator updated the user's surname across the affected systems (IU external email and linked services including AB Tasty and the personal email record where applicable). The Okta identity record was corrected where it initially showed no editable name attributes so the canonical surname matched the updated accounts. The user was informed once the name change propagation completed.

Source Tickets (1)
44. Manual offboarding: disabling accounts and removing user from Jira teams/tags
95% confidence
Problem Pattern

Requests to disable or deactivate a departing employee's or external contractor's IT accounts and administrative privileges, often submitted by HR or team managers, with no error messages reported. Affected systems commonly include identity providers (Okta, Microsoft Entra/Azure AD), on‑premises Active Directory, institutional tenants (e.g., IU tenant), email accounts and domains (e.g., iu-it.org), management tools such as TeamViewer, and collaboration metadata like Jira teams and tags. Tickets typically requested straightforward account disabling or removal from teams/tags rather than troubleshooting system errors.

Solution

Users were removed from Jira teams and associated tags when required. Relevant accounts and administrative privileges were identified and disabled or deactivated in the corresponding systems: Okta (Okta Admin Console), on‑prem Active Directory (AD administration tools), Microsoft Entra ID/Azure AD (Entra/Azure admin center), institutional tenant(s) (IU tenant), TeamViewer (TeamViewer management console), and the user’s email account/mail system (including domains such as iu.org and iu-it.org). External contractor accounts were deactivated (examples: matthias.bauer.ext@iu.org and aleks.zamyarski.ext@iu-it.org). Deactivations were verified and no additional follow-up actions were identified.

45. Offboarding ticket with incorrect date causing premature account deactivation
90% confidence
Problem Pattern

An incorrectly scheduled deactivation/exmatriculation date in the source admin or offboarding system caused premature disabling of an institutional account. The scheduled date triggered automated or manual deactivation, resulting in loss of email and device sign‑in (corporate laptop) without explicit error codes. Affected systems included institutional account/email, device sign‑in, and student/admin portals.

Solution

Support located the affected user record, reactivated the disabled institutional account, and restored email and device sign‑in access. Investigation consistently found that an incorrect scheduled deactivation/exmatriculation date had been entered in the source system (for example, an offboarding request or a manual "ExMa" date in the student admin portal), and that automation or the deactivation process acted on that date rather than performing an independent error. The issue was resolved by correcting or removing the erroneous scheduled date in the authoritative admin record (for example, the user profile in care-admin.iubh.de), after which normal account lifecycle behavior resumed. In cases where the premature deactivation originated from an offboarding request, users were advised to submit the correct/scheduled deactivation request so the formal closure would occur at the intended time.

Source Tickets (2)
46. Corporate Vonage (telephony) account provisioning for individual users
80% confidence
Problem Pattern

Requests to create corporate Vonage telephony accounts for named employees, frequently submitted via Salesforce. Symptoms included inability to access accounts or need for credential resets, duplicate requests from inconsistent name spellings or template-based submissions, and missing Vonage–Salesforce linkage when a Salesforce user record did not exist despite a Vonage account. Users typically reported no system error codes.

Solution

Technicians provisioned new corporate Vonage accounts under the name provided or, when an account already existed, confirmed the existing account and restored access by sending a password reset. Duplicate records caused by inconsistent name spellings or template-based requests were identified and handled by confirming the canonical account before proceeding. When a Vonage account existed but no Salesforce user record was present, technicians noted that the Vonage–Salesforce linkage could not be configured until the Salesforce account existed; they coordinated or awaited Salesforce account creation and then configured the integration. Tickets commonly arrived via Salesforce and were closed after the account was provisioned, access was restored, or the Salesforce linkage had been established.

47. Workday ID change creating duplicate identities requiring consolidation
90% confidence
Problem Pattern

A change in employment status or HR record created a new or incorrect Workday ID mapping, producing duplicate or mismatched identity records. Affected users experienced Workday sign-in failures (for example “Workday Sign In Error”), inability to access SSO-protected services such as Okta and Jira, duplicated or deactivated accounts, incorrect entitlements (for example wrong Microsoft 365 license), and loss of device (laptop) access.

Solution

Accounts were reactivated when required and the Workday ID mapping was corrected (back-switched/updated) to consolidate duplicate or mismapped identity records under the employee’s correct Workday identifier. Identity records were merged so the employee operated under a single Workday ID and retained laptop and associated account access. SSO mappings (Okta) and downstream service access (for example Jira) were restored after the consolidation, resolving observed Workday sign-in errors. Microsoft 365 licensing discrepancies were corrected (for example replacing Office A1 with the proper Office A5 entitlement). Access and functionality were verified across affected clients and browsers (Chrome, Edge) after changes.

48. Monitoring probe using individual user account for RADIUS authentication
90% confidence
Problem Pattern

An Intermapper RADIUS probe was authenticating with an individual user account (reinhard.koeppl) instead of a dedicated service account, requiring a change of the probe's identity. No explicit error messages were reported, but the configuration needed to be migrated to a service account to meet service-account policies. Affected systems: Intermapper monitoring probe and RADIUS authentication.

Solution

A new dedicated service account named "s.radiusprobe" was created and the Intermapper RADIUS probe configuration was changed to use the s.radiusprobe account in place of the individual account reinhard.koeppl. The change was confirmed in Intermapper and no subsequent errors were reported.

Source Tickets (1)
49. Salesforce login blocked by unverified account email causing automatic deactivation
90% confidence
Problem Pattern

User could not sign in to Salesforce because the account was deactivated; support discovered the account's email address was unverified and login attempts continued to fail after an attempted restore. No explicit error codes were reported; the account re-deactivated when not verified and required intervention by the responsible identity/support team.

Solution

Support investigated and found the Salesforce user record had been deactivated due to an unverified email. An attempted reactivation reverted when the email remained unverified. The incident was escalated out of the team's remit and the requester was instructed to either complete the email verification link in the user's mailbox or to open a ticket with the responsible identity/support team to request reactivation if verification could not be completed.

Source Tickets (1)
50. Access and permission requests routed to application-owner teams (misrouted service-catalog requests)
95% confidence
Problem Pattern

Users submitted application-specific account creation, permission, or configuration requests (for example Metabase access/reactivation, Salesforce account creation or event-type changes, Twilio configuration, or Site Fusion Portal unlocks) through the central account-provisioning/service-catalog form. Requests often failed to complete or produced no actionable error, or the catalog did not present the correct application. Reported symptoms included locked/disabled accounts, cross-program account-creation failures, or missing application options in the catalog.

Solution

Service desk triage identified the correct application/product-owner teams for requests that were misrouted to the central account-provisioning/service-catalog. Metabase access and reactivation requests were handled by the DevOps team. Salesforce account-creation, permission, and event-type-change requests required SalesTech privileges and requesters were directed to the SalesTech Service Portal (Atlassian Service Desk, careerpartner.atlassian.net). Twilio configuration and other application feature/permission changes were routed to the respective product or feature owners. Site Fusion Portal account-unlock requests were referred to the SiteFusion account team (cfe-teaq@iu.org). Tickets were closed after triage once requesters had been directed to the responsible team and given the appropriate submission path when central support lacked the necessary permissions.

51. Application login blocked despite active Okta record and valid license
90% confidence
Problem Pattern

Users were unable to access third-party applications via Okta SSO despite an active Okta identity record, assigned licenses, and correct SSO/group assignments. Symptoms included application error messages such as "User account is disabled" and application-specific error tags (for example, [532f95a7]), or generic failed sign-in attempts without Okta error codes. Affected systems included Okta and downstream SaaS apps (e.g., Jira, Qualtrics) where the application-side account state appeared to block access.

Solution

Administrators verified the user's Okta account status, application license/assignment, and termination/expiry dates. To isolate authentication, users were asked to sign in directly via Okta and an Okta password reset was initiated. Application-side checks showed that some SaaS products maintained their own account state: IT confirmed SSO and group assignments but found the account disabled inside the application (Qualtrics) with error tag [532f95a7], and Okta administration could not re-enable or modify the app-side account. IT advised escalation to the application owner/vendor (research@iu.org in the reported case) to investigate the application error tag and reactivate the user account. Where no further user response or vendor action occurred, tickets were left unresolved and auto-closed after these remediation steps.

Source Tickets (2)
52. Access failure caused by duplicate user accounts
90% confidence
Problem Pattern

User reported being unable to access their account via Teams with no specific error code. Investigation found the user had two distinct accounts/identities which appeared to conflict and prevent successful sign-in. The issue manifested as an access outage without clear service error messages.

Solution

Support staff investigated the Teams access report, discovered the user had two separate accounts, and performed a reset of the affected account. The reset (performed by Schumacher on 2024-07-09 13:51) resolved the authentication conflict and restored the user's access to Teams.

Source Tickets (1)
53. Active Directory account creation from existing account/template with Okta group cleanup
95% confidence
Problem Pattern

Request to provision a new Active Directory user by copying an existing AD account as a template; the copied account contained Okta group memberships that should not apply to the new user. No errors were reported; the work required creating the AD object with the appropriate attributes and reconciling Okta group assignments.

Solution

The support team created the new AD account by duplicating the requested template account's attributes and settings. After provisioning the AD object, they removed the unintended Okta group memberships that had been copied to the new account and confirmed the AD/Okta mappings. The provisioning and group cleanup completed successfully and the ticket was closed.

Source Tickets (1)
Back to Summaries
An unhandled error has occurred. Reload X