Application Access

Identity

475 sections
6432 source tickets

Last synthesized: 2026-02-13 00:55 | Model: gpt-5-mini
Table of Contents

1. Okta SSO: 'user is not assigned to this application' blocking app access

701 tickets

2. Missing product licenses, approvals or invitations preventing access

1325 tickets

3. Care / Care Stage: account creation, permissions and environment access issues

1258 tickets

4. External / contingent-worker accounts for guest access and collaboration

179 tickets

5. Local network/router issues preventing Okta/SSO, VPN and email access

7 tickets

6. Self Service+ visibility for long-term macOS admin access

13 tickets

7. Azure Portal VM visibility missing due to VM access group membership

8 tickets

8. Microsoft Dataverse table ownership and Dynamics security-role mapping blocking Power App access

30 tickets

9. Third‑party meeting notetaker (Fireflies.ai) auto-joining Teams and persistent Enterprise App assignment

1 tickets

10. Managed Identity missing Microsoft Graph appRole permissions blocked Sentinel automation

14 tickets

11. Okta OIDC application registration and client credentials provisioning (redirect URI mismatch)

14 tickets

12. Okta dashboard tile linking to wrong portal

16 tickets

13. Jira board/project admin permissions missing after owner departure blocking edits

124 tickets

14. Azure AD / MS Graph application client secret expiring and requiring renewal

3 tickets

15. Azure AD consent policy gap allowing user-consent to high‑privilege Enterprise Apps

1 tickets

16. PebblePad course content and submission permissions controlled by examination office

26 tickets

17. Cost-center approver/owner entries in Workday causing incorrect tool access-request routing

8 tickets

18. Applicant unable to submit 'Anerkennung von Vorleistungen' online form in Bewerbungsportal

4 tickets

19. SSO access blocked by duplicate/conflicting Atlassian accounts

11 tickets

20. Approval routing stuck due to stale Workday cost-center approver mapping

10 tickets

21. No vendor invitation received after corporate SaaS provisioning request (OpenAI/ChatGPT)

167 tickets

22. Shared SaaS subscription provisioning requiring requester-supplied credentials (Midjourney)

10 tickets

23. Internal service portal and sandbox access provisioning and agent role activation

33 tickets

24. Application license requests via self-service requiring correct approver assignment

89 tickets

25. SaaS access blocked by outdated superadmin ownership or missing superadmin contact

8 tickets

26. Vague report/dashboard access request that had no reproducible access failure

15 tickets

27. Third‑party SaaS access stuck because app wasn't in company catalog or approver was unresponsive

40 tickets

28. Access provisioning for internal transfers blocked by incorrect cost‑center selection and per‑app request requirements

11 tickets

29. On‑prem application inaccessible due to unresponsive host blocking data access

1 tickets

30. Copilot for M365 access gated by IT Service Portal automated request/approval workflow

23 tickets

31. Okta application provisioning propagation delay causing Miro login failures

33 tickets

32. Workday tile in Okta returned error where user had multiple IU addresses and Okta account flagged 'PW Reset' (no resolution recorded)

4 tickets

33. Monday.com board-level edit access blocked despite valid licenses

23 tickets

34. Atlassian sign-in failure due to username/character mismatch resolved via Okta SSO dashboard

16 tickets

35. Corporate ChatGPT access blocked by approval workflow and pending invitation acceptance

109 tickets

36. Legacy AcademyFive account and username-based login blocking access

4 tickets

37. Existing Salesforce account with Okta SSO but missing Salesforce profile/roles prevented access

24 tickets

38. Specialist-delivered credentials or invites for third‑party SaaS access

59 tickets

39. Missing role/group membership in internal apps (PowerApps/Custom apps) blocking user tasks

78 tickets

40. Role‑based onboarding automation requiring event sequencing (SalesTechDev)

1 tickets

41. Jira/Atlassian access gated by Automation for Jira approval then admin provisioning

62 tickets

42. External attendees blocked from Teams training by conditional access

1 tickets

43. Application access blocked by missing assignment, pending approval or vendor invitation

149 tickets

44. Power BI Self-Service Portal report access blocked by missing Power BI entitlement and owner-controlled report permissions

10 tickets

45. Access request for unsupported SaaS (Metabase) routed to owning service desk

20 tickets

46. Okta application not present in dashboard blocking GitLab access

38 tickets

47. SSO-linked third‑party SaaS embedded in Salesforce required active Salesforce session for access

3 tickets

48. Salesforce account provisioning and Okta dashboard tile addition using a reference user

31 tickets

49. Confluence space admin access requests, accidental submissions and license guidance

36 tickets

50. myCampus area access blocked by missing area-specific roles requiring escalation and synchronization

21 tickets

51. Access requests for analytics/dev platforms requiring platform‑owner provisioning

17 tickets

52. Confluence account creation and basic access provisioning

25 tickets

53. Jira access missing due to absent Jira product license; project permissions remained separate

14 tickets

54. Access request auto-closed after approval workflow timeout

16 tickets

55. Policy‑gated SaaS provisioning requiring training enrollment (ChatGPT/GPT‑4)

5 tickets

56. Application access owned by a non‑IT team requiring request redirection

93 tickets

57. Jira board access blocked by missing product license and pending approval

3 tickets

58. Adobe Sign SSO access pending invitations and service-mailbox restrictions

6 tickets

59. Miro team membership, license and admin-rights blocking board creation and internal-board access

17 tickets

60. Enterprise SaaS access provisioning after approver approval and license assignment (Miro)

16 tickets

61. Access requests blocked by product being in pilot/internal test (Copilot)

9 tickets

62. Provisioning blocked by vendor license shortage; re-triggered by toggling Okta group membership after license procurement

1 tickets

63. SAML/SSO workspace‑booking app access requests (Deskbird) for campus presence

60 tickets

64. Dataverse / Power Apps: inability to create Dataverse tables due to missing environment permissions/licenses

1 tickets

65. Miro access failures caused by Okta SSO sessions, locked app state or license-seat mismatches

9 tickets

66. Approval workflow links in Automation for Jira were unclickable, causing pending provisioning

2 tickets

67. External lecturer Okta password/authentication blocking Atlassian access

2 tickets

68. Power Apps 'Präferenzabfrage' entry locked or inactive requiring app-team reset

2 tickets

69. SSO login succeeded but missing product license or feature permission blocked full app functionality

6 tickets

70. Jira project invitation redirected to service portal due to missing project assignment or project-level release

9 tickets

71. Requests for licenses or access where Enterprise SSO / Okta already provided the app

8 tickets

72. Applications requiring Self‑Service assignment before content or Okta tile becomes available

10 tickets

73. Access requests stalled by approval/invitation workflows and Automation for Jira closures

19 tickets

74. Permission alignment for internal systems by replicating a reference user's roles

42 tickets

75. Application login errors for services owned by another internal team — routing to the owning service

8 tickets

76. Office add-in blocked by required administrator approval (Zebra BI for Office)

3 tickets

77. Power Platform environment access blocked by missing environment security-group membership

8 tickets

78. SaaS team seats/tokens consumed or deactivated causing lost team access (Claude team seats)

2 tickets

79. Miro Enterprise access missing from Okta dashboard due to license/assignment and approval workflow

6 tickets

80. Corporate ChatGPT/OpenAI access requests stuck in approval or invitation workflow

31 tickets

81. AI SaaS account creation blocked by organization-level restriction (Claude)

2 tickets

82. SSO access loss due to missing Okta app assignment or group membership and short propagation delays

8 tickets

83. Vonage desktop app access and account provisioning for Windows 11 users

2 tickets

84. Approval workflow mis‑handled (accidental approver action causing state confusion)

1 tickets

85. ChatGPT Team account migration and chat-history preservation concerns

1 tickets

86. Automation-for-Jira auto-declined Software Catalog requests when approver was missing or unavailable

16 tickets

87. Time-limited SaaS account provisioning via approval automation (Storyblok)

1 tickets

88. Staging environment access separate from production (EPOS Stage assignment required)

2 tickets

89. User moved teams but app permissions already present — Okta dashboard visibility confusion

1 tickets

90. SaaS access requests resolved by approver approval and invitation/provisioning (ProductFruits, ChatGPT, Calendly)

8 tickets

91. Access requests stalled by missing or unassigned approver in Automation-for-Jira workflows

14 tickets

92. Playground Assistant capacity and instruction-size limits causing imprecise responses

1 tickets

93. LMS365 course creation/editing blocked by missing LMS group membership

1 tickets

94. Trello board admin requests owned by application team — redirect and owner provisioning

1 tickets

95. Service account provisioning stalled by missing Workday cost‑centre approver

1 tickets

96. No existing accounts for multiple internal portals (myCampus, EPOS, CARE) — manual account creation and credential provisioning

10 tickets

97. 1Password access issues: separate master-password/Emergency Key model and account recovery

12 tickets

98. Okta application assignment / user entitlement missing (SaaS provisioning)

43 tickets

99. Okta app access blocked by cost-center / group assignment mismatch (USU)

2 tickets

100. Internal test environment access blocked by pending approval and request channel

1 tickets

101. Post-device-change access and application-specific 403 error (EPOS / d.velop)

4 tickets

102. Corrupted browser profile causing loss of saved credentials and blocked web app access

1 tickets

103. myCampus staff/backend access missing due to absent staff account or permissions

2 tickets

104. SaaS dashboard or workspace access blocked by missing license/entitlement

2 tickets

105. Salesforce new-user provisioning and credential activation for employee onboarding

5 tickets

106. Service account provisioning for Power Automate / Power Apps automation

3 tickets

107. Access requests resolved by sending invitation or direct admin assignment

24 tickets

108. Temporary admin-elevation option not visible in portals — Self Service app required

2 tickets

109. Okta account state or credential reset required after unexplained SSO login failure

12 tickets

110. Access requests for SharePoint‑managed resource ('Index') pending approval outside IT

7 tickets

111. Access blocked by missing group membership, Okta app enablement or reference-user permission mapping

8 tickets

112. Stage environment access to third‑party testing tool required vendor invitations

1 tickets

113. Application access blocked by missing assignment or unapproved provisioning request

3 tickets

114. SSO login failure caused by account deactivation after prolonged inactivity

2 tickets

115. GitLab repository access requested via Atlassian service portal

6 tickets

116. Broad myCampus authentication outage caused by faulty deployment

1 tickets

117. EPOS access failures due to account profile or missing EPOS-specific permissions

18 tickets

118. Power BI / Power App dashboard sharing for academic users using IT groups and RLS

1 tickets

119. Atlassian site access denied despite Okta SSO and asset assignment

2 tickets

120. User/employee visibility missing in Academy Five due to location-specific permission

2 tickets

121. Developer access provisioning in vendor DB portal (MongoDB Atlas) for collection-level use

1 tickets

122. GitLab access activated by enabling the Okta GitLab application for new user

27 tickets

123. SSO group assigned but no provisioned user account in target SaaS (SSO authentication without app user mapping)

16 tickets

124. SaaS access tied to legacy email after legal name/email change

3 tickets

125. Application edit/repository permissions missing (Confluence, GitLab)

2 tickets

126. Account invitation email delivered to junk/spam preventing onboarding (1Password)

1 tickets

127. Lost Confluence spaces and Jira boards after extended absence (SSO/assignment propagation)

1 tickets

128. Access requests for non‑IT‑managed systems (Workday) redirected to product support

7 tickets

129. Scheduled/integration service inactive blocking Twilio Power Outbound calls

1 tickets

130. Missing Jira project permissions blocking basic ticket operations

10 tickets

131. SSO provisioning mismatch causing 'Unknown User' error in DataDog

2 tickets

132. Missing Okta app assignment or account linking preventing dashboard access (Lucid, GitLab)

5 tickets

133. Jira Service Management access redirected to Service Portal due to missing product entitlement

2 tickets

134. Existing account regained access after password reset or invite delivery

5 tickets

135. App access restored by assigning app roles/groups or enabling SSO entitlement

5 tickets

136. SaaS access contingent on formal Software‑Request approval

1 tickets

137. Sandbox / Playground account provisioned by manual invitation

1 tickets

138. LMS course content and progress not visible due to missing LMS permission group

2 tickets

139. Onboarding bulk SaaS access requests with Salesforce provisioning needing a reference user

1 tickets

140. Existing SaaS account but user unable to sign in due to credentials (password reset resolved)

1 tickets

141. Access blocked until both Okta SSO entitlement and application-owner group membership were provisioned

2 tickets

142. Department‑managed course app (Charly) linked from MyCampus but access controlled by Exams Office

8 tickets

143. SaaS access requiring vendor/portal provisioning or separate SelfService request

3 tickets

144. Invitation-based SaaS access blocked by undelivered invite (resend resolved)

7 tickets

145. Jira board/project access controlled by board/project owner rather than central IT

8 tickets

146. External/guest myCampus account access restored via password‑reset for temporary lecturers

1 tickets

147. GitLab repository access granted by group membership

4 tickets

148. Viva Goals blank/white page in browser resolved by private mode or Teams app

1 tickets

149. Onboarding access gaps when specific applications or reference users were omitted from the request

2 tickets

150. Login failures caused by local SaaS password changes instead of using Okta SSO

2 tickets

151. OpenAI / ChatGPT access provisioned via vendor invitation email

13 tickets

152. Care: granting cross‑location access for centralized B2B Customer Service team

3 tickets

153. Access requests blocked by user confusion and duplicate tickets when some entitlements already existed

3 tickets

154. Access to corporate ChatGPT/OpenAI blocked by missing invitation or pending approval

2 tickets

155. Internal developer tool and documentation access blocked by missing Okta tiles or group assignment

3 tickets

156. Conduktor (Kafka topics) access required platform‑owner permission assignment

5 tickets

157. Installed client but no provisioned account or license (VPN / workspace apps)

3 tickets

158. Platform license granted but board/workspace permissions still owner‑controlled (Miro)

1 tickets

159. SharePoint site access denied despite 'Contribute' permission

2 tickets

160. Private SaaS instance access required vendor invitation link

3 tickets

161. Shared mailbox visibility in Outlook required admin grant plus user-side mailbox addition

1 tickets

162. External instructor using private/non‑corporate email unable to sign in to Okta, Office and myCampus

2 tickets

163. macOS local admin privilege required for installing Teams/npm fulfilled via temporary SelfService elevation

1 tickets

164. Expired or invalid SaaS activation link preventing Datadog access despite Okta tile visibility

3 tickets

165. Salesforce onboarding: permission mapping via comparison/reference user

11 tickets

166. Missing Okta application assignment blocking SSO access to SaaS apps

13 tickets

167. Application access controlled by separate product owner (non‑IT) requiring requester redirection

1 tickets

168. New hire unable to sign into Okta/Microsoft 365 due to initial account/authentication state

1 tickets

169. Product-level account provisioned but content/site access remained owner-controlled

4 tickets

170. Okta application assignment, external‑user provisioning and SSO login loops

4 tickets

171. Access blocked by missing invitation or site‑owner controlled invite links

6 tickets

172. SharePoint booking portal and embedded PowerApp access requiring site/App-owner permissions or AAD security-group membership

3 tickets

173. SharePoint thesis-submission workflow with directory-based supervisor/student access

1 tickets

174. Microsoft Bookings access lost after account converted from cloud-only to AD-backed (license propagation issue)

1 tickets

175. Microsoft Loop access requiring admin enablement/whitelisting

1 tickets

176. Cloudya phone features missing after department transfer (function keys unassigned)

1 tickets

177. Salesforce login failed when password-reset link was broken — Okta SSO tile used to regain access

3 tickets

178. Salesforce Case field visibility missing due to mismatched user permissions and manager‑approved change

1 tickets

179. Atlassian Jira board access blocked by board-level lock requiring owner grant

2 tickets

180. Learning Hub (LMS) course access controlled by HR provisioning

3 tickets

181. Expired 1Password activation link prevented account setup; recovery link restored access

1 tickets

182. PDF editing access requests resolved by internal PDF Creator alternative

1 tickets

183. Automated test-account email contained blank credentials; account not found in CARE or Salesforce

1 tickets

184. Calendly invites and group membership caused invisible users; individual developer accounts requested

1 tickets

185. Approval‑routing error in Automation-for‑Jira blocked SaaS provisioning

1 tickets

186. Missing Okta-assigned SaaS access (account not provisioned or tile not launched)

8 tickets

187. Internal wiki edit permissions were owner‑controlled and required owner grant

2 tickets

188. Datadog access stalled by pending approval and incomplete account verification

3 tickets

189. Salesforce access failures: missing Okta tile, password reset and UAT account provisioning

6 tickets

190. M365 Copilot access blocked by automated license provisioning and missing service‑portal request

2 tickets

191. Vendor document system access granted by account provisioning (d.velop)

4 tickets

192. Team membership blocked by missing Team owner and broken approval workflow

1 tickets

193. Access and permission alignment when multiple reference users or duplicate accounts exist (ePost / Epos)

2 tickets

194. SSO login succeeded but workspace/space access remained owner‑controlled (Storyblok)

7 tickets

195. GitLab account provisioning and Okta-backed GitLab Pages authorization

5 tickets

196. Adding SaaS Enterprise apps to a user’s Okta dashboard during onboarding

5 tickets

197. Confluence access request failed because user lacked a product license at time of request

2 tickets

198. Access request where the user already had an account

4 tickets

199. GitLab access restored by assigning application entitlements

5 tickets

200. Automated provisioning blocked by incorrect or missing approver in entitlement workflow

3 tickets

201. Corporate ChatGPT setup failures resolved by reissuing invitation

4 tickets

202. Onboarding and staging/dev environment access provisioning for multiple tooling

2 tickets

203. Requested access for an unsupported/alternate vendor (Cloudya) closed after confirming team uses different telephony

1 tickets

204. Stalled Automation-for-Jira application requests resolved by manual app assignment

6 tickets

205. Existing Salesforce account access restored via password reset and Okta/portal sign‑in guidance

1 tickets

206. EPOS role/permission discrepancy resolved by backend role propagation

7 tickets

207. Vendor‑managed delayed account creation for Egencia (onboarding latency)

8 tickets

208. Immediate access granted by manual app assignment or admin unlock (Atlassian API / Okta)

5 tickets

209. Atlassian account and content-permission gaps for users and contractors

6 tickets

210. Expired one-time access links for bot/service accounts

1 tickets

211. Salesforce in‑app feature permission (Callout Builder) granted by admin

6 tickets

212. Okta-linked GitLab account locked — admin unlock restored group access

5 tickets

213. Okta SaaS application provisioning requests: assignments applied or deemed unnecessary

3 tickets

214. Developer tool not configured for corporate SSO (invitation-only access)

1 tickets

215. Missing Okta application entitlement or provisioning causing login failures

2 tickets

216. SSO login succeeds but specific in-app features require product-owner role assignment

5 tickets

217. GitLab SSO access denied due to missing Okta app assignment or OAuth email-visibility

4 tickets

218. Internal tool access provisioned by platform owners with environment scope and reference-user permission mapping

4 tickets

219. Application visibility restricted to a specific corporate account/tenant

1 tickets

220. Invitation-based SaaS account provisioning for vendor-hosted services (no existing account/invite)

2 tickets

221. Software provisioning via application Self‑Service / Service Desk portal

2 tickets

222. Access owned by People Projects / HR or non‑IT teams requiring request redirection

3 tickets

223. Internal portal or project visibility missing due to entitlement mismatch with reference users

4 tickets

224. Confluence environment access vs. page‑level restrictions

1 tickets

225. Salesforce direct-login blocked by missing Salesforce-specific security answer

1 tickets

226. Product-level entitlements and account upgrades applied by specialist teams (Figma, Adobe Creative Cloud)

3 tickets

227. GitLab SSO access denied due to missing Okta app assignment or non‑public GitLab email

3 tickets

228. M365 Copilot license/access request pending enterprise rollout

1 tickets

229. Okta dashboard tile missing despite existing service account (SSO app not assigned)

2 tickets

230. 1Password account unrecognized after long inactivity or email/name change

1 tickets

231. Miro access blocked by deactivated account or missing team invitation

5 tickets

232. Figma Developer Mode access gated by product expert enablement

2 tickets

233. Access requests closed when required approver was missing in Automation-for-Jira workflow

1 tickets

234. Missing SSO tile, vendor invitation or product license blocking SaaS sign‑in

4 tickets

235. Intermittent redirect to IT Service Center when opening Jira Service Management link

1 tickets

236. Automating Azure AD security‑group membership from LMS365 course completion (Power Automate)

1 tickets

237. Miro access problems: Okta app assignment vs board‑level permissions

2 tickets

238. GitHub access provisioned via DevOps Service Desk (Jira Service Management)

1 tickets

239. Vendor/brand‑platform managed shop access and cost‑center billing permissions

5 tickets

240. Miro access blocked by private account or missing enterprise provisioning / Okta link

2 tickets

241. Jira board and service-account access requiring product entitlement or area-owner approvals

4 tickets

242. Confluence space access restored by space/admin permission grant

5 tickets

243. Turnitin iPad app blocked by institutional Apple ID domain restriction

1 tickets

244. Azure AD group membership missing or slow propagation blocking Microsoft Teams login

1 tickets

245. New SaaS account requests and approver routing requiring Self‑Service or approver reassignment

2 tickets

246. Login or in‑app permission gaps resolved by credential reset or explicit permission assignment

2 tickets

247. Confluence product access granted; space-level permissions remain owner-controlled

1 tickets

248. EPOS: missing 'recognitions' role prevented entering recognitions

1 tickets

249. Workday inaccessible via direct link; Okta app launch required for SSO

6 tickets

250. Cross‑system access changes after position change (Care, Vonage, Salesforce)

1 tickets

251. Replicating AD group memberships and assigning Office license to match a reference user

2 tickets

252. Request for PMS access redirected to product owner service portal (non‑IT managed)

4 tickets

253. Okta OIDC client registration for backend web app (Authorization Code + client secret)

1 tickets

254. Jira access redirected to home due to missing extended product license/permission

1 tickets

255. Turnitin account inaccessible after email migration and persistent password-change loop

1 tickets

256. Missing SaaS Admin Center profile — vendor re-invite restored Calendly access and calendar sync

1 tickets

257. Okta application assignment missing prevented Lucidchart access

3 tickets

258. myCampus course access granted by matching Care reference-user permissions

1 tickets

259. CARE / myCampus access blocked by missing CARE Community membership or account-name mismatch

6 tickets

260. Calendly account activation and invitation re‑send for team admins

1 tickets

261. Salesforce access when invitation email not delivered but Okta SSO available

1 tickets

262. IU Shop access audit: verifying Okta/Extra‑Account provisioning for suspected users

1 tickets

263. Applicant portal access blocked by incorrect registration email address

1 tickets

264. Approval workflow approver reassignment during approver absence

2 tickets

265. Onboarding gaps when apps omitted from employee initial-equipment form

1 tickets

266. Freshdesk access provisioned via Workday-controlled group membership

1 tickets

267. Data Warehouse (DWH) access for shared mailboxes required platform-owner provisioning

1 tickets

268. Claude API CLI access blocked by insufficient Claude role assignment

1 tickets

269. Claude team membership/approval stuck on pending invitation

7 tickets

270. Service/system account requests for non‑Okta-managed apps and databases

7 tickets

271. Okta user profile update requested to match upstream Salesforce role

3 tickets

272. Perceived revoked SaaS access when user had an active account but hadn’t used Okta SSO

1 tickets

273. Mixed SSO application assignment and separate environment/role requests (jfrog + multi‑environment AWS roles)

1 tickets

274. Missing Case access in Salesforce despite shown group membership

1 tickets

275. Blank/white page after SAML login due to vendor-side redirect issue

4 tickets

276. Corporate ChatGPT account forced daily password resets resolved by platform update

1 tickets

277. Subscription/procurement stalled by incorrect cost center and missing approvers

2 tickets

278. Request for Atlassian Jira admin rights granted for board and team management

4 tickets

279. Missing 1Password invitation prevented account setup

1 tickets

280. CMS domain/team permissions blocked content creation in Storyblok

1 tickets

281. Missing Okta dashboard tile due to absent application assignment (user could not SSO)

7 tickets

282. Access pending approver/specialist invite for vendor-hosted cloud apps (invite required outside Okta)

2 tickets

283. Vendor account not recognized by organization due to username/email mismatch (Figma, 1Password)

2 tickets

284. Datadog access blocked by missing Okta app assignment or pending approver workflow

6 tickets

285. OpenAI / ChatGPT access issues caused by invitation flow and SSO confusion

1 tickets

286. SaaS workspace ownership transfer when owner is a service mailbox or departed user

3 tickets

287. Metabase account provisioning handled by DevOps Service Desk

6 tickets

288. Cloudinary access limited by account identity (IU vs external partner)

1 tickets

289. Access controlled by application/product owners or vendor teams (owner‑managed access)

6 tickets

290. Access requests auto-declined by Automation for Jira due to missing/incorrect approver

3 tickets

291. OpenAI/ChatGPT account limited‑access flag removed by admin

2 tickets

292. Broad Azure/Intune access requests required scope clarification and constrained approval

1 tickets

293. Application and software access requests pending Automation-for-Jira approval

3 tickets

294. Miro access lost after corporate email change or account-email mismatch

1 tickets

295. Application-specific SSO/login failure reported as 'user not found' with vendor-side bug

1 tickets

296. Okta tile visible but in‑app access blocked by application owner / license or account provisioning

3 tickets

297. CARE (academy5) SSO login failures due to account state or Okta-side configuration

4 tickets

298. Internal invoicing app access blocked by missing user-profile permission

4 tickets

299. Application approval workflow auto-declined AI license requests when approver was missing

4 tickets

300. ChatGPT SSO sign-in loop with Microsoft/Okta resolved by direct company‑email sign-in

1 tickets

301. External contractor onboarding with staged/activation-timed Atlassian account and unclear downstream access

1 tickets

302. Ambiguous Claude (Anthropic) access requests lacking chat vs API scope and distribution-rights clarity

1 tickets

303. Provisioning social‑media editor access via third‑party management (Agorapulse)

2 tickets

304. Salesforce queue visibility blocked by preset list-view filters

1 tickets

305. CampusManagement Service Portal access missing due to absent role assignment

1 tickets

306. Confluence access denied due to identity-provider / account mismatch

1 tickets

307. Salesforce mobile app sign‑in failed when Okta SSO did not complete and no native password was available

2 tickets

308. Internalized vs external account mapping causing permission denial in IT Service Portal

1 tickets

309. No Okta and MyCampus access resolved by account resets

1 tickets

310. SAML response status 'not Success' (Responder/Unauthorized) blocking LinkedIn Learning SSO

1 tickets

311. Third‑party SharePoint destination requiring tenant‑level app grant and security approval (Hightouch)

1 tickets

312. n8n webhook creation prevented by insufficient permissions in connected Jira instance

1 tickets

313. Jira Advanced Roadmaps/plan access still denied unless the plan/page owner granted explicit permission

1 tickets

314. Application Self Service: vendor‑specific pre‑request required before Okta assignment (Salesforce Marketing Cloud)

3 tickets

315. Oasis / Special Considerations: screen‑level permissions and targeted access controls

1 tickets

316. VPN access request via Microsoft My Access Access Package and Company Portal installation

1 tickets

317. Application Self‑Service and Automation-for-Jira approval/routing delays

9 tickets

318. SSO access blocked by missing Okta dynamic/group membership for account type

2 tickets

319. Vendor app login failure resolved by applying application update

1 tickets

320. Zoom–HubSpot integration blocked by requiring Zoom admin install/organization-wide consent

1 tickets

321. CharlyApp showing empty student lists resolved by application-team fix

1 tickets

322. Metabase inaccessible when Okta app and AWS ClientVPN group membership or VPN config were missing

1 tickets

323. Storyblok access required Okta authentication and explicit space assignment

1 tickets

324. External vendor (Simovative) CARE database read access requiring specialist provisioning

1 tickets

325. Deskbird provisioning failed with SCIM error in Okta; reactivating SCIM fixed assignment

2 tickets

326. EPOS 'Buchung beenden' (End booking) permission missing for IT Student Support and then granted

1 tickets

327. Jira permission requests stalled by insufficient requester detail and approval timeout

1 tickets

328. OpenAI / Corporate ChatGPT onboarding: approval and invite inconsistencies

2 tickets

329. Site‑managed digital‑signage (Vineow/ViewNeo) account access held by local site owner

1 tickets

330. HQ intranet (SharePoint) access requests for Walbrook/LIBF area

1 tickets

331. myLIBF login failure via OASIS showing 'Missing Data' for student accounts

1 tickets

332. MyCampus course participant list mismatch blocking grade publication

1 tickets

333. OpenAI / ChatGPT account showing 'Limited Access' and missing Playground after invite

2 tickets

334. Anthropic / Claude invite failed with 'email is already in use' due to duplicate/deleted account

1 tickets

335. Okta dynamic group created from Workday roles (Spendmanager_DYN_Group)

1 tickets

336. Adobe Lightroom mobile/browser SSO failure for single user despite desktop working

1 tickets

337. Company portal missing student record due to Salesforce non-assignment

1 tickets

338. Personal vendor subscription inaccessible when signing in via corporate SSO (identity mapping mismatch)

1 tickets

339. Temporary external contractors needing multi-system developer access and secrets for data migration

1 tickets

340. SSO login broken after account rename/surname change (identity mapping correction fixed access)

1 tickets

341. Manual provisioning and shared‑group/vault assignment requests for small SaaS tools and demo/test accounts

7 tickets

342. Salesforce user provisioning, profile changes and permission-set assignment gaps

4 tickets

343. Service‑Portal and provisioning workflow gaps for SaaS access (Google Analytics, Miro)

2 tickets

344. Team-admin role missing prevented 1Password team invitations

2 tickets

345. Missing vendor Org‑Admin identity blocked Adobe Support ticket access

1 tickets

346. Miro board sharing blocked by instructor account permission state

1 tickets

347. Cross-department collaboration blocked by missing Confluence licenses and cost‑centre charge approval request

1 tickets

348. Content and accounts bound to a personal Adobe ID preventing Enterprise migration

1 tickets

349. Workspace or content access blocked by single-owner/service-account model despite license allocation

3 tickets

350. Limited-test-seat SaaS access for data‑platform tools (DBT Cloud)

1 tickets

351. 1Password vault ownership model prevents removing built-in owners group

1 tickets

352. Okta-managed dynamic groups lacked assignable Owner attribute, breaking PowerApp owner-dependent access

1 tickets

353. Access to apps via a company‑managed/shared account (company-managed assignment)

1 tickets

354. Programmatic SharePoint access blocked for Azure AD client_id (service principal permissions and broken approver workflow)

1 tickets

355. Okta provisioning conflict when user already has vendor account in another instance (SSO account collision)

1 tickets

356. SaaS provisioning blocked by missing workspace or group (Juro onboarding)

1 tickets

357. Marketing Cloud Child Business Unit changes require SalesTech/SalesOps team action

1 tickets

358. EPOS exam-area UI visibility vs assigned roles (exam centers, slots, student data)

2 tickets

359. Metabase access requests owned by DevOps (ticket handoff and routing)

4 tickets

360. Salesforce product-permission requests owned by SalesTech and approval workflow auto-decline

2 tickets

361. Microsoft Clarity / cloud-analytics provisioning requiring security/privacy review and packaging

1 tickets

362. LCC‑managed Power BI Deputatsplaner access issues

5 tickets

363. Mentimeter access blocked by SSO/whitelisting restrictions

1 tickets

364. GitHub Enterprise access requiring group membership and approval

1 tickets

365. Vonage telephony account provisioning and Salesforce record entry

2 tickets

366. ChatGPT / OpenAI: corporate group account not visible after SSO sign‑in

1 tickets

367. SaaS admin role assignment: Monday.com admin privileges granted to requester

2 tickets

368. Access request approvals stuck in Automation for Jira (CC‑Approver) workflow

4 tickets

369. Access requests closed when requester failed to provide required details or respond

5 tickets

370. HTTP 400 when opening internal IT Service Portal from intranet after Okta/portal launch

1 tickets

371. Access requests must be submitted via product‑specific self‑service portals

5 tickets

372. Access requests stalled by missing/incorrect approver, cost‑center or wrong ticket type

3 tickets

373. Requested Okta dashboard tile missing because sandbox has no Okta integration

1 tickets

374. Jira/Atlassian project links redirected to IT Service Portal due to missing project membership or approver workflow

2 tickets

375. SSO launches the main SaaS site but embedded/linkable subcomponents require separate authentication or different owner

1 tickets

376. SonarCloud access blocked by portal/approval workflow (DevOps Portal) rather than immediate entitlement

1 tickets

377. Metabase: Okta SSO sign-in failures and missing in‑app export permissions after migration

2 tickets

378. Provisioning SaaS licenses for shared-mailbox addresses (Mentimeter shared accounts)

1 tickets

379. Automated approval failures and missing SaaS ownership/inventory blocking requests

3 tickets

380. Access provisioning requests submitted with wrong ticket type for new-hire onboarding

1 tickets

381. Expiring SCIM access token for AWS IAM Identity Center interrupted provisioning

1 tickets

382. Twilio ↔ Salesforce call-integration failing with Twilio API 400 'pending Conference Instruction'

1 tickets

383. Travel bookings lost after user name-change in Egencia (account recreation vs. merge)

1 tickets

384. Specialist tool (Guided Conversation Designer) access requires service-portal request

2 tickets

385. Exam / e-assessment platform access lost after platform update (owner-managed by Prüfungsamt)

1 tickets

386. Account provisioning / SSO propagation delays: target-app account creation required

3 tickets

387. Access blocked by missing 2FA (TOTP) on long‑dormant account preventing password reset and app transactions

1 tickets

388. SSO access lost after corporate email change when target SaaS account is managed by HR

1 tickets

389. Shibboleth/SAML school‑login failures with academic vendors (ProQuest / PebblePad)

1 tickets

390. IU Learning Hub (LMS) course resources failing to open due to browser caching or SharePoint permissions

1 tickets

391. Viva Goals (goals.cloud.microsoft.com) access entitlement missing

2 tickets

392. Owner‑ or creator‑managed SaaS resources where IT cannot reassign access

3 tickets

393. Automated provisioning or SSO failures resolved by manual vendor/admin actions or vendor support

5 tickets

394. PMS account and permission requests require vendor/product account‑management forms

3 tickets

395. Salesforce account provisioning by copying a reference user and related SSO permission verification

1 tickets

396. SharePoint file access missing when opening links from a student Salesforce account

1 tickets

397. GitLab access provisioned by account creation and Okta group assignment

2 tickets

398. Legacy ticketing system account absent (OTRS migration)

1 tickets

399. SaaS activation expired verification email with vendor/admin-managed account creation (Salesforce Marketing Cloud)

1 tickets

400. PowerApps invoicing app allowed invoice creation but not viewing previously submitted invoices

1 tickets

401. Service Portal access failed in a single preferred browser after Fastlane setup

1 tickets

402. Automation-for-Jira approval workflows completed by Atlassian Api User assignment

4 tickets

403. Requests routed to IT Service Portal Self‑Service and auto-closed after no requester follow-up

2 tickets

404. Invitation-based SaaS provisioning completed by admin invite and user acceptance

2 tickets

405. Vendor workspace-membership conflict preventing SCIM/Okta provisioning (Mentimeter)

1 tickets

406. Cost‑centre approval workflow routing only to single approver

1 tickets

407. Application Self Service: automated assignment completed via Atlassian API after pending approval

17 tickets

408. CARE application: site-restricted access and missing 'All sites' flag after assignment

4 tickets

409. Azure access granted by replicating another user's subscription roles

1 tickets

410. Application Self‑Service requests stuck in approval or prerequisite workflows

6 tickets

411. Discrepancy between Care/myCampus reporting and Azure AD provisioning preventing AAD group membership

1 tickets

412. Confluence licensing requests cannot be bulk-issued via distribution lists

1 tickets

413. Project/component admin and edit permissions missing in Jira/onCampus resolved by direct grants

3 tickets

414. Confluence sharing blocked for Walbrook/UFred users due to tenant-specific Atlassian group mappings

1 tickets

415. Salesforce profile change required corresponding Okta/Group update

1 tickets

416. Atlassian/Confluence external user blocked from password reset due to missing 2FA and provisioning group

1 tickets

417. Application Self‑Service requests resolved by explicit app entitlement or role assignment

5 tickets

418. Third‑party AI services (OpenAI/ChatGPT/CoPilot) account ownership and IU‑Playground invitations

1 tickets

419. Incorrect product selection in self‑service requests (Marketing Cloud vs Sales Cloud) and integration requests declined

1 tickets

420. Application Self‑Service role approval routing gaps (Ardoq reader/writer vs contributor)

1 tickets

421. Figma license/seat loss resolved by SSO-triggered SCIM provisioning then admin seat allocation

1 tickets

422. RDP/desktop shortcut for on‑prem server appears only when connected to corporate network or VPN (SFIRM server)

1 tickets

423. Granting ChatGPT via Okta group assignment when regular approver unavailable; documentation mismatch

1 tickets

424. Application Self Service requests stalled awaiting approver action then completed via Atlassian API assignment

13 tickets

425. SSO tenant/account mismatch caused JotForm sign-in to use wrong Microsoft identity

1 tickets

426. Application assignment plus user cost‑centre attribute update via Application Self Service

1 tickets

427. Bot/service account Confluence space membership provisioning

1 tickets

428. Assigned Jira issues inaccessible due to missing project membership/role

1 tickets

429. Bulk Okta group membership changes to enable M365 Copilot access

1 tickets

430. Vendor‑managed SaaS SSO failure due to missing vendor account (Egencia)

2 tickets

431. Application Self‑Service approvals processed by Automation‑for‑Jira and Atlassian API assignment

6 tickets

432. Service/bot account access requiring role mapping in production and staging (EPOS automation bot)

1 tickets

433. Application Self‑Service: Atlassian API assignment restored missing app access after Okta changeover or pending approval

2 tickets

434. Vendor account provisioning for JotForm SSO: vendor-side user creation fulfilled SSO request

1 tickets

435. Access request stalled by missing/changed approver and auto‑decline of approval workflow

1 tickets

436. Local client hardware/permission issue (webcam privacy slider) coincident with SSO/login and meeting host errors

1 tickets

437. Onboarding: mixed application entitlement confusion and Salesforce password activation

1 tickets

438. Application integration action blocked by missing role (Oasis 'Push to Workday')

1 tickets

439. Provisioning error created missing project permissions for Jira/Confluence access

1 tickets

440. Procurement‑owned SaaS access requests (Viva Goals) routed outside IT

1 tickets

441. Okta app assignment or app-state (locked) blocking SSO launch to a known account

2 tickets

442. Application feature access denied until role/permission mapping matched a reference user

3 tickets

443. On-site Viewneo digital‑signage access blocked by missing site‑specific credentials and documentation

1 tickets

444. Billing application access lost and escalated to Local Contact Center without technical troubleshooting

1 tickets

445. Browser Google account sign‑in prompt blocked Salesforce click‑to‑dial setup

1 tickets

446. Care provisioning: 'Community' access not selectable for external worker accounts

2 tickets

447. OpenAI Playground access request forwarded to specialist team with no immediate feedback

1 tickets

448. Trello board invite / membership not granting access (invite link or vendor-side board permission issue)

1 tickets

449. Case-management (FS English Thesis) limited-record view due to approver/visibility role mapping

1 tickets

450. GrowthBook access provisioning for service account and requester resolved by product owner

1 tickets

451. Twilio access via Salesforce SSO failed despite password reset and SSO group membership

1 tickets

452. Project-board read-only access: write/visibility controlled by Project Admins (support cannot assign)

1 tickets

453. Access requests stalled when manual provisioning relied on a named product specialist/owner

4 tickets

454. Service mailbox cannot authenticate to vendor app because mailbox is not an Okta user

1 tickets

455. Power Apps blocked when user lacks HR/role attributes (professor) required by the app

1 tickets

456. License‑assignment blocked by UI warning about additional fees when changing agent/dashboard licenses

1 tickets

457. Requests for personal Jira instances or service/API accounts stalled by missing context and approval

1 tickets

458. Viva Goals access lost when dynamic Azure AD license group was missing due to empty Workday-derived attribute

1 tickets

459. Okta admin role lacked permission to edit group memberships

1 tickets

460. Workday Sandbox login fails despite production credentials

1 tickets

461. Viva Engage moderator assignment blocked by role/licensing or community membership

1 tickets

462. SSO works for some vendor shops but a specific shop fails due to vendor-side account state

1 tickets

463. Vendor-side SSO/license visibility mismatch causing lost admin privileges

1 tickets

464. Vendor account provisioning stalled due to missing reference-user information

1 tickets

465. Access requests for non‑IT‑supported apps or missing approver/cost‑center auto‑closed by automation

2 tickets

466. Service accounts, app registrations and tenant‑level governance blocking automation integrations

3 tickets

467. Missing dynamic Azure/AD group membership after account-internalization blocked Service Portal and intranet access

1 tickets

468. Okta-backed shared/service mailbox requested for vendor SSO but self-service and policy prevented immediate provisioning

1 tickets

469. Okta tile visible but launching Jira/Confluence redirected to service portal or denied due to missing product permissions

2 tickets

470. HTTP 404 when launching GitLab via Okta/Jira — workspace or instance-level access routed to DevOps

1 tickets

471. Miro account exists but password‑reset emails not received; Okta Dashboard SSO used as fallback

1 tickets

472. Manual product-owner provisioning for Lucid and Atlassian access

3 tickets

473. GitLab access requests routed to DevOps Service Portal for specialist provisioning

1 tickets

474. Vendor invitation/credential email not received for Twilio access

1 tickets

475. Corporate webshop product missing or broken ordering link (IU Shop business cards)

1 tickets

1. Okta SSO: 'user is not assigned to this application' blocking app access
95% confidence
Problem Pattern

Users were prevented from accessing vendor applications or received incorrect roles when IdP→application assignments, group membership, dynamic-group rules, SCIM provisioning, or asserted profile attributes did not match vendor mappings or when vendor-side account state blocked provisioning. Symptoms included Okta errors such as “The user is not assigned to this application”, OAuth/OIDC client-assignment failures (for example AADSTS50105), SAML/OIDC assertion failures or login loops, missing Okta Dashboard tiles, vendor access-denied screens or unexpected password prompts, provisioning/import errors (for example operationNotAllowedForUser or userNotFoundOrNotVisible), and dynamic groups failing to evaluate when required source attributes were absent. Common triggers included missing app or license-group membership, misconfigured HR or dynamic-group filters, absent HR-source attributes, delayed or failed Okta→vendor syncs, deactivated/duplicate/renamed accounts, username/email transformations, SCIM/API/token failures, and client-side caching or propagation delays.

Solution

Incidents were resolved by restoring the IdP→application assignments and ensuring vendors received the identity, group, license, and attribute data their mappings required. Observed resolutions included:

• Restored Okta application assignments and added users to entitlement/license groups; Okta Dashboard tiles and SSO sign-ins returned once membership propagated (propagation ranged from minutes to ~24–48+ hours; some native clients cached state longer).
• Assigned or re-assigned applications, created dedicated Okta groups for access when HR-based provisioning was impractical, and supported manual additions where necessary.
• Used self-service provisioning flows when administrators could not directly grant access; in at least one case users were instructed to create their own account via the self-service provisioning portal so vendor-side provisioning completed and access was reinstated.
• Reworked HR-source provisioning filters and dynamic-group rules, re-synced sources, escalated directory-sync issues, and where HR lacked separating attributes created explicit exclusion lists or mail-enabled security groups in Azure AD and automated membership enforcement.
• Addressed missing source attributes that prevented dynamic-group evaluation (for example absent employeeNumber) by temporarily adding users to groups while upstream attribute sourcing was planned.
• Corrected Okta profile attributes and added required SAML/OIDC assertion attributes; completed SAML integrations by exchanging IdP/SP metadata and X.509 certificates when assertions had failed.
• Reconciled username/email conflicts, duplicate or pre-existing vendor accounts, and external-account linking by remapping Okta usernames to vendor identifiers, creating provisioning aliases/proxies, or linking existing vendor accounts to Okta-managed identities; signing in once after Okta assignment often completed vendor provisioning or approval flows.
• Resolved vendor-side local account blocks by completing vendor password-reset or account-activation flows so Okta auto-login could complete.
• Fixed SCIM/API provisioning and bulk-import failures by rotating/verifying SCIM tokens, performing manual imports/syncs, or adjusting import mappings when vendor username transformations prevented account matching; some import errors referencing operationNotAllowedForUser or userNotFoundOrNotVisible were traced to deactivated or not-visible Okta records and were resolved by restoring visibility/reactivating accounts and re-running imports.
• Reactivated upstream HR or directory records when they were the source of downstream SSO failures and performed Okta account-level administrative resets when a blocked Okta account state affected multiple applications.
• Resolved native/desktop client SSO issues by reinstalling native SSO clients or signing in via the organization’s custom Okta domain; some vendor installers required tenant/install permission fixes or creating apps from vendor SAML metadata to clear installer 'Forbidden' errors.
• Addressed browser/client caching and cookie/session problems by launching the vendor app from the Okta Dashboard tile, clearing browser cache and cookies, using private/incognito browsing, or switching browsers; these steps resolved many tile-launch and SSO session errors.
• Mitigated vendor web UI failures (for example a blank page after successful SSO) by restoring Okta assignment and, when the web client remained non-functional, using the vendor’s installed app or embedding the vendor in Teams as a practical workaround until vendor-side fixes were applied.

Source Tickets (701)
2. Missing product licenses, approvals or invitations preventing access
95% confidence
Problem Pattern

Authenticated users, guests or service accounts were unable to access or install specific SaaS applications, workspace/team pages, project boards, calendars or paid features after SSO, invitation or provisioning flows. Symptoms included explicit 4xx/403 'not assigned' errors, tenant/OAuth consent blocks, undelivered/expired/invalid activation or invitation links, vendor trial-disabled redirects, misleading 'license expired' dialogs, silent sign-in failures, and Intune/Company Portal installation or activation failures. Failures often affected only some services (for example email or core portals remained accessible while Teams, Jira or Confluence were blocked) and commonly followed missing or incorrect product licenses/SKUs, seat exhaustion, provisioning/SCIM or group-membership delays, Conditional Access/device-compliance blocks, DNS/domain connector problems, or vendor license-server outages.

Solution

Access incidents were resolved by restoring consistent entitlement, invitation and provisioning state across the identity provider/directory and vendor systems and by coordinating among IdP administrators, licence owners/cost centres, approvers/workspace owners, application owners and vendor support. Observed remediations and outcomes included:

• License and SKU fixes: administrators reassigned or restored SKUs and seats, reclaimed or reallocated expired seats, and resolved seat‑type or bundled‑entitlement conflicts; assigning the correct vendor entitlement often restored access within minutes (for example upgrading a Microsoft licence from A1 to A5 restored Office functionality and resolved downstream SSO/access failures).

• Directory / enterprise-app assignments and Intune installs: missing Azure AD/enterprise‑app assignments were corrected when users could not install vendor apps via Company Portal/Intune; applying the proper directory/app assignment or licence restored installation and sign‑in, while persistent device‑side Company Portal failures required targeted device remediation or replacement.

• MFA and authentication‑factor remediation: cases that depended on fresh authentication factors were resolved by guided MFA re‑enrolment and by sending manual setup or recovery links.

• Provisioning, invitations and delivery: stale pending invites were cleared and activation emails reissued; SCIM/provisioning records and group memberships were corrected. Small IdP/group changes typically propagated in minutes, while larger directory/vendor syncs took hours to days.

• Temporary entitlements and operational workarounds: temporary seats or trial pools were provisioned while procurement completed; owner‑driven invites, delegated/admin roles and reference accounts provided interim access paths. In several incidents credentials or notifications were delivered to an alternate/private email address to restore access while entitlement issues were resolved.

• Vendor outages and vendor interventions: vendor service restorations resolved mass activation failures and misleading 'license expired' dialogs; vendors cleared delivery suppressions, enabled accounts pending approver action, issued direct activation links or granted specialist approvals when required.

• Device compliance and Conditional Access: failures tied to unmanaged or non‑enrolled devices were cleared by restoring device‑enrolment/compliance state or by using managed workstations, and by resolving group membership so Conditional Access policies allowed product sign‑ins.

• Account/authentication mismatches and admin consent: duplicate or personal accounts were reconciled by mapping the correct IdP identity to the vendor account and assigning the correct vendor licence to that identity; tenant admin‑consent blocks were removed after security/data‑protection reviews or were documented when consent was explicitly denied.

• Domain, DNS and integration fixes: branded short links and custom subdomains were fixed by connecting organisation domains and DNS records in vendor portals; API scopes, credential types and provider configurations were corrected and vendor accounts were re‑created when necessary to restore automation and API access.

Remediations consistently required tracking until directory and vendor systems fully propagated the corrected entitlement, invitation or provisioning state; the most common final step was ensuring the vendor licence (correct SKU/tier), workspace approval and the IdP‑authenticated account all matched for the user.

Source Tickets (1325)
3. Care / Care Stage: account creation, permissions and environment access issues
95% confidence
Problem Pattern

Users and service accounts were unable to access applications or perform expected in‑app actions because downstream accounts, entitlements, licenses, application assignments, or in‑app roles were missing, inactive, duplicated, blocked, or mis‑mapped. Symptoms included SSO failures (for example rejected authenticator codes or “no active <app> account”), missing or unassignable apps in IdP dashboards, pending or stuck access requests (including approvals that were granted but not implemented), empty/incomplete UI tabs, undelivered activation/reset emails, and HTTP 403 permission‑denied responses. Frequent triggers included connector/SCIM failures, tenant/endpoint mismatches and replication delays, stale IdP attributes or group‑to‑role mappings (including dynamic groups), missing HR identifiers (for example Workday IDs), incomplete or misrouted approval workflows (for example approvers unaware of required actions or absence of a reference user for permission packaging), unsupported bulk onboarding, role/entitlement conflicts from dual‑role accounts, and SSO‑only integrations that returned no user attributes. Many incidents affected applications that relied on HR/product‑managed identifiers or intentionally restricted groups, causing assignment to be blocked even when users held another valid role.

Solution

Access incidents were resolved by reconciling authoritative identity records, restoring or creating downstream accounts and entitlements, completing and validating approval workflows, repairing provisioning integrations, and reassigning applications in the IdP so users and service accounts regained expected capabilities. Key resolution actions included:

• Corrected IdP attributes and AD/Okta group memberships and repaired group‑to‑role mappings; affected accounts were moved into equivalent groups or attribute/claim sets and duplicate downstream profiles were merged or removed so SSO logins and in‑app role mappings succeeded. Identifier mappings (for example email↔username) were supplied when onboarding used different identifiers.
• Reactivated, reprovisioned, or created downstream user and service accounts (including supported bulk/team onboarding) and recorded higher/restricted reference roles that required manager or application‑owner approval so cloned accounts preserved expected configurations while respecting approval constraints.
• Clarified and completed pending approvals and approver responsibilities: where line managers or approvers were unaware of the required steps, support either performed the permission change on the owner’s behalf or provided the approver with a reference user/permission package and explicit implementation notes; approved but unimplemented requests were re‑opened or re‑created when necessary so changes were applied.
• Identified or created reference users and permission templates and cloned in‑app roles from reference users when administrators needed equivalent configurations and a baseline was not supplied.
• Re‑enabled or directly assigned missing applications in the IdP/Okta dashboard so apps reappeared for users; several cases were resolved by restoring application assignments in the user’s Okta dashboard.
• Provisioned or corrected product licenses and installed/enabled required application clients where necessary.
• Restored in‑app permissions, site/course scopes, content visibility and dataset/dashboard sharing by adding appropriate Azure AD/application groups or owner‑scoped grants and by cloning in‑app roles from reference users when administrators needed equivalent configurations.
• Repaired or re‑enabled SCIM/connectors, repointed integrations when tenants/endpoints were incorrect, and allowed for propagation windows where transient replication delays resolved access.
• Created or corrected app registrations/service principals and non‑interactive service accounts, recorded required directory/app‑level permissions, and cloned permissions from reference users so new or repaired accounts received equivalent in‑app roles and API access.
• Addressed client‑side/session caching and invitation issues by retesting sessions (for example in private/incognito mode), reissuing undelivered invites/activation emails, and confirming users did not submit duplicate onboarding requests via Self Service.
• Diagnosed cloud‑provider permission denials caused by IAM policies or explicit denies (for example on assumed role ARNs); affected users were routed through the organisation’s access‑request process and regained access after the account/role/permission was provisioned.
• Routed and coordinated incidents that required HR‑managed identifiers (for example Workday/EmployeeID) or where target users had no upstream account to the owning downstream account or HR/product teams; where owners supported alternatives, alternate identifier mappings or provisioning flows were implemented so downstream accounts could be provisioned.
• Documented and escalated SSO‑only integration cases where no user attributes were returned to the IdP; those incidents were routed to product/owner teams and resolved by enabling attribute/provisioning channels or implementing alternative provisioning flows when available.
• Clarified and resolved entitlement conflicts caused by dual‑role accounts (for example users who were both staff and students): these incidents were identified as intentional downstream restrictions and were resolved by coordinating with the owning product/HR teams to provide the appropriate identifier, adjust account classification, provision a separate profile when supported, or apply an owner‑approved exception or alternate mapping.
• Clarified and resolved incidents caused by renamed or relabeled in‑app menu items and roles: support confirmed label/name changes and coordinated with application owners to map or restore expected role names and apply equivalent permissions.

Incidents that arose from process failures (for example managers instructed to implement permissions but unfamiliar with the process, absence of a reference user, or approvals that were auto‑closed) were resolved by clarifying the responsible party, supplying or creating a reference permission bundle, re‑opening and applying approved requests, and coordinating follow‑up with product owners so approvals resulted in implemented access.

Source Tickets (1258)
4. External / contingent-worker accounts for guest access and collaboration
95% confidence
Problem Pattern

External collaborators, contingent workers, vendors, and tenant‑scoped service or guest accounts were unable to access applications or cloud resources because external identities, invitations, entitlements, or authentication attributes were missing, inconsistent, or unsynchronized across HR → Okta → Entra/Azure AD → on‑prem AD. Reported symptoms included SSO failures (infinite redirects, directory‑not‑found), entitlement‑denied errors (for example “the user with object identifier ... does not have permission to use PowerApps”), expired activation links or consumed one‑time credentials, account lockouts or duplicate/cloud‑only accounts, guests being undiscoverable or unmentionable in Teams/Office, and failures when adding cross‑tenant guest users to required groups. Application data gaps were observed where apps (for example Dataverse/Power Apps or Power BI dashboards) relied on Workday employeeID mappings that were absent for guest/contingent users. Affected systems included Microsoft 365/Power Platform, Atlassian, Salesforce, cloud IAM/projects (GCP/AWS), and vendor SaaS.

Solution

Recoveries established a single authoritative external‑identity source and end‑to‑end attribute consistency across Workday → Okta → Entra/Azure AD → on‑prem AD. Duplicate, cloud‑only, and misattributed accounts were identified and consolidated, re‑provisioned into the central identity source, merged, or recreated; expired activations and consumed one‑time credentials were confirmed via audit logs and replaced or vaulted with owner/expiration controls. Workday→Okta API mappings and attribute flows were corrected — including contingent‑worker handling, termination‑date propagation, manager sync, and username/UPN/email alignment — and erroneous termination/inactivity values that caused premature deprovisioning were fixed or escalated. Okta writeback behavior and required Workday business‑process permissions were clarified so contact fields behaved consistently for external users; onboarding flows used managed or placeholder addresses or vendor invitations where Workday records lacked emails. Service and bot accounts were represented as contingent‑worker identities or explicitly exempted from automated deprovisioning and their credentials/mailbox access were placed in the enterprise vault (for example 1Password).

When identities spanned tenants or were treated as guests, recoveries either provisioned a corresponding identity in the target tenant or authorized the service principal/guest and then granted the required Teams/SharePoint/group memberships and tenant role entitlements. Cross‑tenant group‑membership failures caused by guests authenticating with a different address were resolved by removing and re‑adding the guest using the invited identity or by provisioning a corresponding local identity so membership and permission checks matched the recorded account. Where apps required Workday employeeID as the mapping key (for example Dataverse/Competency App dashboards), recoveries either populated the missing WorkdayID in HR records, created a reconciled mapping record in Dataverse/Power Apps to associate the guest with the authoritative Workday identity, or provisioned a corresponding internal account so application preferences and competency records appeared in dashboards. Power Platform recoveries also re‑established stale Power Apps connections, cleared client sessions, ensured correct license classes (including premium/license entitlements for external users), synchronized AAD group membership into environment security groups, and reran Power Automate helper flows when group‑membership sync gaps occurred.

Cloud and vendor access recoveries created or synchronized directory/IAM groups and granted project/IAM roles for AWS/GCP to restore console and project access. Okta AccessPacks/PowerPacks and approval flows were verified and reconfigured where required; one‑time or short‑lived credentials that produced “doesn't exist anymore” errors were reissued or replaced with vaulted credentials and the sharing trail was clarified. Mailbox and shared‑mailbox ownership, permissions, and forwarding rules were adjusted so activation and verification emails could be received. Atlassian‑ and SaaS‑specific recoveries consolidated duplicate/self‑registered accounts, corrected vendor emails and product approvals, reassigned seats to the sign‑in account, re‑added users to Confluence spaces and Jira projects, and verified product owner responsibilities. Where access requests were intentionally blocked by corporate data‑protection or intranet policies, recoveries documented the required use case and routed requests for legal and technical approval; in some cases access was denied in accordance with policy.

Source Tickets (179)
5. Local network/router issues preventing Okta/SSO, VPN and email access
95% confidence
Problem Pattern

Users were unable to reach SSO-protected services or internal apps (Okta-hosted sites, Auth0/MyCampus, VPN-only apps) due to local-network, DNS, or client-side blocking. Symptoms included inability to load IdP sign-in pages, OpenID discovery/hostname-resolution errors such as "A server with the specified hostname could not be found," failed or stalled VPN tunnels (AWS ClientVPN), intermittent mail/collaboration client connectivity, and app-side failures after successful SSO (MyCampus/Auth0 showing "something went wrong" or "Session timed out" or very long loading bars). Failures appeared either across multiple devices on the same local network (consistent with router/ISP outages or CDN/routing issues) or were isolated to specific endpoints (Jamf-managed macOS, missing VPN profiles, or client-side DNS/filters like adblockers/pi-hole/antivirus).

Solution

Investigations repeatedly found two broad categories of root cause and the support actions that restored access. For network- or ISP-related outages, router restarts or restoration of the user’s Internet service returned connectivity to okta.iu.org, Auth0/MyCampus, and dependent services; support confirmed wider private outages by contacting users through alternate channels (phone or Teams) and provided password-reset instructions and next steps to users’ private email when needed. Remote-session tools were used when possible to reproduce failures and validate restoration. Several incidents involved CDN/routing or ISP changes: logs and user tests showed requests blocked or stalled on the client side and, in multiple cases, access succeeded only when the user connected through a VPN endpoint in Germany, indicating geo/routing/Cloudflare-related delivery issues. Other incidents traced to client-side DNS and filtering (local DNS resolution, pi-hole, adblockers, browser settings including third-party cookie blocking, firewall/antivirus) that prevented app requests after successful SSO; resolving or bypassing those filters restored MyCampus/Auth0 behavior. macOS Jamf Connect OpenID discovery/hostname-resolution failures (for example, errors fetching /.well-known/openid-configuration) were resolved by repairing the JAMF–Okta integration on the backend, which restored Jamf Connect authentication and access to SSO-protected apps. VPN-related access failures were resolved by restoring or re-provisioning VPN profiles: providing the IU_ResetVPN_1.2 VPN/profile package via the Company Portal and having the user install it reinstated VPN tunnels in several cases. Where workstation or PC changes removed VPN profiles or credentials, support verified whether the user had an active VPN profile, reissued access credentials when appropriate, and escalated to Core DevOps when the service-side configuration appeared correct. Triage recorded whether failures were network-wide, VPN-profile-related, Jamf/macOS-specific, or caused by client-side DNS/filters to route remediation to ISP/router, VPN provisioning, JAMF–Okta backend repair, client DNS/filter remediation, or DevOps-side investigation.

6. Self Service+ visibility for long-term macOS admin access
63% confidence
Problem Pattern

macOS users reported that Self Service did not present expected admin entitlements or presented only short-term elevation (Admin for 30 minutes) when longer (3‑year) admin rights were expected. Symptoms included missing or relocated admin-request catalog entries, entitlement entries appearing only as a 'minion' catalog item, duration mismatches (30 minutes vs 3 years), MFA preventing credential acceptance, and service‑desk tickets mislabeling affected software or lacking an 'Other' option. Affected components included the macOS Self Service app/portal, catalog publishing, privilege‑elevation provisioning, config profiles, and directory‑scoped entitlements (AD/Azure AD group membership).

Solution

Investigations identified multiple root causes; incidents were resolved by the specific corrective actions summarized below.

• Directory group membership: users or devices that lacked the required Active Directory/Azure AD group membership were added to the appropriate directory group so the entitlement appeared in the user’s Self Service view.

• Catalog visibility and minion entries: some long‑term (3‑year) admin entitlements were present in the Self Service catalogue as separate "minion" entries. Support located the minion catalog entry and the user activated it; activation applied the 3‑year admin entitlement and resolved the duration mismatch.

• Management backend rollout / catalog republish: Admin‑Minion/admin‑request catalog items that had not been published or rolled out correctly were re‑released so the catalog item republished; devices then retrieved the updated catalog (Inventory Update via Self Service) and regained visibility of the entitlement.

• Privilege‑elevation provisioning: failed privilege‑elevation or provisioning components were restored or reprovisioned; subsequent elevation attempts completed successfully and credential prompts were accepted.

• Long‑term admin entitlements and approvals: expired or missing config profiles for long‑term admin entitlements were renewed and required manager/CostCenter approvals were obtained; users were added to the long‑term‑admin directory group so long‑term privileges became active.

• UI relocation: in cases where users reported a missing request option, the admin‑request flow had moved within the Self Service interface (for example to the app toolbar/menu); using the relocated flow restored ability to request admin.

• Multifactor authentication blocking elevation: users whose password‑only sign‑ins failed due to MFA were reset and re‑enrolled in MFA; after MFA re‑enrollment they were able to authenticate and complete the Self Service admin elevation.

• Approval workflow / Jira automation: requests that lacked a manager or CostCenter approver were failing to progress and were auto‑closed by Automation for Jira; adding the appropriate approver to the ticket or approval policy allowed the request to be processed.

• Service‑desk form mapping: some tickets showed unrelated Affected Software (for example 1Password) or lacked an "Other" option, which caused confusion in triage; in reported cases locating and activating the correct catalog/minion entry resolved the entitlement issue.

After the applicable corrective actions above (group membership fixes, locating/activating minion catalog entries or republishing the catalog and refreshing inventory, reprovisioning elevation components, renewing config profiles and approvals, UI relocation, MFA re‑enrollment, or fixing approver assignments) affected users regained the ability to request admin access and complete installations or updates.

7. Azure Portal VM visibility missing due to VM access group membership
90% confidence
Problem Pattern

Users were unable to see or manage team virtual machines and other Azure resources in the Azure Portal due to missing or incorrect Azure AD group membership. Newly provisioned Windows 11 devices failed Microsoft 365 sign‑in. Individual VMs were unreachable at the host level (SSH or admin sign‑in), sometimes due to stale or unauthorized SSH keys. Windows notebooks also experienced loss of general internet connectivity when establishing Azure VPN connections while attempting to reach VMs. Affected systems included Azure Portal, Azure AD, Azure VPN, Azure VMs, SSH, Microsoft 365, Windows device enrollment, and endpoint protection tooling.

Solution

Access and management-plane visibility were restored by adding affected users, service accounts, or devices to the appropriate Azure AD groups (examples: UIPath VM access group, IUG‑Sec‑Azure‑SynteaB2B, and Windows “Win11” device groups). After Azure AD group membership propagation (typically ~1 hour) the team’s resources became visible in the Azure Portal and users acquired the group-associated permissions, including the ability to create resources and to sign in to Microsoft 365 from new Windows 11 machines. For cases where portal or RBAC changes did not immediately allow host access, VPN access was provisioned for users and VPN connection details were delivered so they could reach VMs for SSH or maintenance. Host-level remediation included granting administrative access on the VM, removing obsolete or unauthorized keys from the VM’s authorized_keys, and onboarding the VM to Microsoft Defender. Stakeholders were notified and access restoration was confirmed.

8. Microsoft Dataverse table ownership and Dynamics security-role mapping blocking Power App access
68% confidence
Problem Pattern

Authenticated users, guest accounts, service principals, or application users sometimes authenticated successfully but were denied Power Apps access or returned incomplete Dataverse data. Reported symptoms included the Power Apps UI message “You can't open apps in this environment. You are not a member of the environment's security group.”, an “Access request. Let us obtain permission to use this app” dialog with pending/unapproved requests, AppForbidden/HTTP 403/metadata access‑denied responses, client_credentials token failures, connector/metadata enumeration failures, record payloads with missing/null attributes, and Power Automate flows failing to run. Triggers included missing or disabled Dataverse systemuser records, lack of environment membership or app sharing, misapplied Dataverse security‑role mappings (including absence of base roles such as Basic User), missing application users or client credentials, missing Power Apps licensing, and failures in service‑desk/service‑portal approval paths when support systems used different SSO or separate accounts (for example Atlassian accounts not linked to institutional Okta or lacking 2FA).

Solution

Access and visibility incidents were resolved by ensuring callers (users, guest/external accounts, service principals, and application users) had an active Dataverse systemuser record, valid credentials, required privileges, and any needed Power Apps licensing. Specific remediations that were observed to resolve incidents included:

• Restored environment/app access by approving pending Power Apps access requests or directly sharing the app and/or adding the user or Azure/Entra AD group to the Power Platform environment’s security group. In several cases access requests remained unapproved until an environment or tenant admin approved them in the Power Platform admin center or app owner shared the app explicitly.
• Ensured role mappings granted effective table access by assigning required base system roles (for example Basic/Basic User) in addition to table‑specific roles so Azure/Entra AD security groups conferred privileges as expected. Custom security roles were created by copying Basic/Basic User and adding explicit Power Automate/flow execution permissions when approvers could not run production flows or long‑running actions timed out.
• Restored missing or disabled accounts and syncs by re‑enabling or recreating guest/external accounts, provisioning and assigning required Power Apps licenses (for example Power Apps Premium for model‑driven apps), and forcing or verifying Azure AD ↔ environment sync so enabled systemuser records were present after sync.
• Represented Azure AD app registrations as Dataverse application users, restored valid client credentials or recreated missing client secrets, and granted those application users the specific Dataverse security roles/privileges required (including environment‑admin/systemadministrator equivalents when appropriate). Application users were granted explicit metadata read privilege when GlobalOptionSetDefinitions GETs returned HTTP 403.
• Changed Dataverse table ownership from User to Organization where organization‑level visibility was required, and reviewed field/column‑level security and field security profiles when APIs returned null attributes.
• Resolved connector/enumeration failures by assigning Environment Maker or equivalent environment‑level roles to service accounts and granting service principals required Microsoft Graph and Exchange Online API permissions when they needed to read dynamic groups or distribution lists.
• Restored solution export/copy rights by restoring or using the account that had performed solution exports when Copilot Studio or managed solutions could not be copied.
• Addressed blocked support/approval workflows caused by separate service‑portal identities by creating or linking the required service‑portal account (for example creating/associating an Atlassian account with the institutional identity and registering 2‑factor authentication), or by using an alternative admin/support channel to approve access requests when the portal bot required an unrelated account. These actions removed a common bottleneck where users had submitted access requests but could not get them approved because the support portal required different SSO credentials or 2FA that the user did not have.

Troubleshooting traces and calls that were used during remediation included PowerShell, Dataverse Web API traces, Graph API queries, Exchange Online PowerShell (for example Get‑DynamicDistributionGroup), and Power Automate traces. Each incident was resolved by restoring the specific missing identity/entity (systemuser, application user, environment group membership), granting the effective Dataverse/Power Platform roles or metadata privileges, fixing licensing or client credentials, or clearing the approval path in the service‑desk/workflow system.

9. Third‑party meeting notetaker (Fireflies.ai) auto-joining Teams and persistent Enterprise App assignment
95% confidence
Problem Pattern

A third‑party meeting notetaker (Fireflies.ai) was appearing as a participant in every Microsoft Teams meeting and could not be disabled or removed by the user. The automatic participation persisted across meetings and raised privacy/security concerns. The issue involved Microsoft Teams, the Fireflies service, and a Fireflies enterprise application visible in Azure AD / myapps.microsoft.com. No error codes were reported.

Solution

The problem was resolved by deleting the automatically created Fireflies account using Fireflies' account deletion procedure and by removing/unassigning the 'fireflies' Enterprise Application from the user's Azure AD applications in myapps.microsoft.com (locating the fireflies tile, opening the tile menu and removing the assignment). After the Fireflies account deletion and app unassignment, the AI no longer appeared as a meeting participant.

Source Tickets (1)
10. Managed Identity missing Microsoft Graph appRole permissions blocked Sentinel automation
91% confidence
Problem Pattern

Automations and backend integrations failed to access Microsoft Graph or tenant resources because the integrating Entra ID app registration, enterprise application, or managed identity lacked required Microsoft Graph application or delegated permissions, or because required Azure RBAC roles were missing. Symptoms included permission‑denied or System.UnauthorizedAccessException errors from Graph endpoints and platform APIs (Teams, SharePoint, OneDrive), connector setup failures with no explicit error, or consent flows that required a tenant/global administrator (non‑admin users could not complete authorization). Third‑party connectors and non‑Microsoft SaaS integrations similarly failed when provider‑specific API tokens or OAuth client configuration (client secret, redirect URI, tenant/admin consent) were absent.

Solution

Incidents were resolved by matching the integration’s credential type to the API surface (app‑only service principal/managed identity versus delegated user consent) and by granting the exact Microsoft Graph permission type required plus any Azure RBAC roles required by the target resource. For app‑only scenarios, service principals or managed identities received Microsoft Graph application permissions (examples encountered: Policy.ReadWrite.ConditionalAccess, Policy.Read.All, TI.ReadWrite, ChannelMessage.Read.All) and tenant‑level admin consent was applied; Azure RBAC role assignments (for example Microsoft Sentinel Responder or Reader) were added at the resource group/subscription scope. SharePoint backends that previously relied on delegated credentials were converted to Entra ID app registrations using client‑credentials (client secret) and granted appropriate application permissions (Sites.Selected scoped to the site URL when site‑limited access was required, or Sites.Read.All for tenant‑wide); a site‑level Sites.Selected grant was applied in the SharePoint admin center or via Graph so app‑only uploads, listings, and deletes succeeded. Third‑party connectors that used delegated OAuth flows were resolved after the connector’s delegated Graph permissions and OAuth settings (redirect URI, client secret) existed and tenant/admin consent had been granted; when an integration could not be consented by a regular user, tenant administrators either performed admin consent or a service account with the required role was provided to complete the integration (example: n8n → Teams). For non‑Microsoft SaaS connectors, owning teams produced or retrieved provider‑specific API tokens or OAuth credentials and delivered them via the organization’s secret store (SAFE) for connector configuration. For Graph surfaces that exposed only one auth type (delegated or application), teams used the supported auth type where acceptable or selected alternate export/compliance APIs; operational mitigations such as pagination, incremental/filtered pulls (for example by lastModifiedDate), and export/aggregation pipelines were applied to reduce throttling and scope exposure.

11. Okta OIDC application registration and client credentials provisioning (redirect URI mismatch)
95% confidence
Problem Pattern

Okta-connected applications and integrations failed authentication or produced incorrect or silent post-login redirects when registered redirect/callback URIs, client credentials, SAML Entity IDs, or federation/issuer metadata did not match relying-party expectations. Reported symptoms included OIDC errors (for example “The redirect URI parameter must be an absolute URI”), SAML/AWS federation errors (for example “Issuer not present in specified provider”), AuthSamlInvalidSamlResponseException, “InvalidIdentityToken”, persistent blank pages or incorrect redirects after SSO handoffs, and inability to enable SCIM provisioning when metadata was missing. Common triggers were mis-typed or missing redirect/callback URIs and host entries, mismatched ClientId/ClientSecret or Entity IDs, and absent or incorrect federation/metadata entries for AWS and other vendors.

Solution

Okta OIDC and SAML registrations, credential provisioning, and targeted troubleshooting were completed across multiple integrations. Applications were created with exact provided names and redirect/callback URIs (including production, non-production/test, and localhost endpoints such as http://localhost:8501 for Streamlit). Confidential clients were provisioned with ClientId/ClientSecret pairs while public clients were created as client-id-only entries with corresponding openid-configuration metadata. Mis-typed or missing redirect/callback URIs and host entries were corrected and successful authentication responses (id, email, email_verified, name, first_name, last_name, id_token) were confirmed during testing, including reproductions on localhost. One OIDC error — “The redirect URI parameter must be an absolute URI” — was resolved by aligning the application's OAuth redirect URI to the Okta Sign‑in redirect URI and redeploying; successful logins followed.

Service and connector credentials were created with least-privileged scopes where requested and stored in the organization secret store (safe.app). A connector to Wiz was configured to grant Wiz read-only scanning access to Okta; the required connector credentials/secrets were supplied via the safe.app secret store and the integration was validated per Wiz documentation. Other integrations received similar handling: one API credential was limited to read-only User permissions and verified in the Okta Admin Console. Vendor-specific expectations and quirks were recorded: the Netbird client required a client‑secret‑less flow plus an Okta API token (NETBIRD_IDP_MGMT_EXTRA_API_TOKEN) and returned errors when that token was missing; Storyblok required changing its expected SAML Entity ID from “IU Group N.V.” to “IUGroupNV” and Okta metadata.xml was provided to the vendor.

An external-developer AWS federation case that produced errors including “Issuer not present in specified provider”, AuthSamlInvalidSamlResponseException, and “InvalidIdentityToken” was resolved by correcting application assignments and federation metadata; downstream access (for example GitLab) was restored after the applications were assigned to the user. Access controls were applied by assigning only specified users where whitelists were requested and by excluding particular groups when required (for example IU - UFRED and LIBF were omitted from a SynIO app assignment). An OIDC application for Marketing Intelligence AI Agents was created for production and development; redirect endpoints and ClientId/ClientSecret pairs were stored in the organization secret store and the application was integrated with Jira Self Service for approver-managed access. For a Twilio issue routed through Salesforce SSO that produced a persistent page error, screenshots and client-side troubleshooting were captured while awaiting user confirmation. For Metabase (Pro license), SAML SSO and SCIM provisioning metadata (SAML Single sign‑on URL and Entity ID, SCIM endpoint and token) were obtained from the Metabase Admin panel, SSO and SCIM provisioning were completed, and Metabase was added to the application self‑service dropdown so users could request access.

12. Okta dashboard tile linking to wrong portal
91% confidence
Problem Pattern

Okta dashboard tiles opened wrong destinations or failed to open: tiles were missing, misdirected to staging/non‑production endpoints, returned HTTP errors (for example 404), or launched but produced downstream authentication failures despite Okta SSO logs showing success. Tiles could render incorrectly or be invisible in specific browsers, or the dashboard could be accessible only from the Okta mobile app but not visible in a laptop desktop environment due to UI differences (for example a mobile quick‑launch button not present on desktop). Users also reported duplicate or ambiguous tile display names that made it unclear which portal or service a tile provided access to.

Solution

Tile and downstream access problems were resolved by correcting tile configurations and target URLs, adding missing tiles created during provisioning, and separating distinct portals into individual tiles so each tile pointed to the intended endpoint. Third‑party apps that returned HTTP errors or failed to launch (for example LinkedIn Learning) were resolved by enabling and validating SSO so tiles opened the correct destinations. In cases where users reached non‑production endpoints despite successful Okta SSO, directing users to the production endpoint removed the authentication symptom after Okta logs showed no SSO errors. Browser‑specific rendering issues (notably Viva Goals in Firefox) were avoided by using alternate browsers; a Jira launch error was cleared after removing stale Okta/Atlassian cookies and browser cache so subsequent launches used Okta SSO. Role and group mapping questions were clarified where applicable (for example a USU user’s access was granted through the configured 'USU KnowledgeCenter' app rather than a separate 'USU HelpCenter'). Duplicate or ambiguous display names were disambiguated by renaming Okta app tiles (for example relabeling two Qualtrics tiles to “Qualtrics Customer Experience” and “Qualtrics Employee Experience”); the relabeling was applied by the specialist team and confirmed by the requester. A UI expectation issue was also resolved when a user could access the Okta dashboard from the Okta mobile app but could not find an equivalent quick‑launch button on a laptop; access was achieved by signing into the Okta web portal (https://okta.iu.org/) from a browser so the dashboard was available in the desktop environment.

13. Jira board/project admin permissions missing after owner departure blocking edits
95% confidence
Problem Pattern

Users were unable to access or edit Jira, Jira Service Management (JSM), or Confluence content after project/board owner departures, IdP/group-mapping or provisioning errors, or missing project/board role mappings. Reported symptoms included permission-denied or “Project not found” errors, redirection from issue URLs to the Jira home page, blank boards or Confluence spaces, inability to open the JSM Requests or Team settings UIs, inability to be selected as assignees or post customer-visible comments, and inability to move issues between boards. Secondary impacts included hidden linked issues/epics, visibility blocked by Issue Security Levels, pending automation-approval or approver-blocking workflow stalls, and failed API/integration operations when service accounts or licenses lacked proper entitlements.

Solution

Access and permission failures were resolved after identities, product entitlements, tenant/site privileges, and project/board roles were restored or corrected and IdP/group mappings and account provisioning were fixed so entitlements applied to the intended identities. Service Portal access had been granted in cases where users could view requests but not edit them; editing, changing assignees, or moving issues between boards was restored only after the board owner granted board edit permissions or added the user to the required project/board role or group. JSM-specific failures (unable to be selected as assignee or to post customer-visible comments) were resolved by assigning the appropriate JSM project role or granting the agent product entitlement. Orphaned projects, hidden boards, and blank Confluence space pages regained visibility after project-role reassignments, owner transfers, or broadening board filters to include referenced issues. Visibility blocked by Issue Security Levels was restored by adding users to the relevant issue-security-scheme memberships. Pending automation approvals and approver-blocking workflows were cleared either by executing the pending approvals or by granting the required approver/project role. Service accounts, automation agents, and API integrations were placed into correct IdP groups, reprovisioned/resynced, and stale or duplicate accounts were consolidated; when global admin rights were inappropriate, integrations used shared service-account API tokens held in the organization’s secret store or specialist teams completed tenant-scoped changes. Routine elevated operations were performed by project admins or specialist teams and, in a few cases, temporary Jira admin rights were granted when no other path existed. Permission and provisioning changes typically propagated within minutes; several incidents were closed after administrators granted the missing project/issue permissions that had caused redirection from issue URLs to the Jira start page.

Source Tickets (124)
14. Azure AD / MS Graph application client secret expiring and requiring renewal
95% confidence
Problem Pattern

Azure AD application credentials (expired, invalid, or missing values such as tenant_id, client_id, or client_secret) caused authentication failures for identity integrations. Symptoms included Azure AD (Entra) imminent credential-expiry notifications, ‘Auth Error’ messages in Okta, and failed Microsoft Graph or Microsoft Teams integrations (including cross-tenant app integrations). Affected components included Azure AD app registrations, MS Graph, Microsoft Teams integrations, Okta integrations, and third-party service API tokens, with services remaining inaccessible until valid credentials were supplied.

Solution

Expired or invalid application credentials for Azure AD app registrations and third-party integrations were replaced. For an MS Graph application (client ID adb86181-f837-4230-aa2d-ea400b2e77b8) a specialist created a new client secret and delivered it via a single-use retrieval link; the requester retrieved and validated the secret. A Microsoft Teams integration between IU and LIBF tenants (app coursefeedanalytics_libfdevapp) was restored after the required TENANT_ID, CLIENT_ID, and CLIENT_SECRET were provided for the app registration. An Okta→JFrog integration was fixed when the DevOps team supplied a new JFrog API token and the token was updated in Okta; Okta authentication then succeeded and JFrog was accessible via https://okta.iu.org/. Tickets were closed after confirmation that authentication and service access were restored.

15. Azure AD consent policy gap allowing user-consent to high‑privilege Enterprise Apps
87% confidence
Problem Pattern

Employees were able to add or consent to Enterprise Applications in Azure AD that requested privileged scopes without enforced admin approval. Affected scopes included offline_access, Microsoft Graph '*.All' scopes and collaboration read/write (calendar, mail, todo). The behavior was evident in Enterprise Applications and consent grant records exposed via Microsoft Graph; there were no explicit error messages and a retrospective audit of recent grants was requested.

Solution

The issue was resolved by restricting broad user consent and routing high‑privilege consent through Azure AD's admin consent workflow. The tenant's Enterprise applications 'User consent for applications' setting was changed to block user consent for apps that requested offline_access, Microsoft Graph *.All scopes, or collaboration write scopes. The built‑in Admin consent requests feature was enabled and integration with Automation for Jira was configured so consent requests generated approval tickets. A retrospective audit was performed by exporting oauth2PermissionGrants and appRoleAssignments via Microsoft Graph queries and AzureAD PowerShell, inappropriate grants were revoked, and future consent requests for the targeted scopes were required to obtain an approved admin consent ticket.

Source Tickets (1)
16. PebblePad course content and submission permissions controlled by examination office
92% confidence
Problem Pattern

Users (students, instructors, examiners) were unable to access course-level submission/assessment areas, grading/correction pages, or exam/training applications. Symptoms included explicit access-denied messages (for example "error/nopermission"), login/authorization failures, inability to open grading/recording pages, to enter online exams, or to view/grade submissions. Affected systems included MyCampus, IU Exam Manager and external tools (examples: PebblePad/Atlas, iubh-onlineexams/Online‑Examen, Turnitin, Examity, Bongo, Charly, IU Learn). Tickets sometimes recorded pending approval-workflow entries (Automation for Jira) or other approval/authorization states that correlated with missing course- or application-level permissions.

Solution

Support verified they did not hold administrative rights to change course- or application-level permissions and routed affected users to the non‑IT teams owning the learning, exam and assessment applications. Support provided contact addresses and knowledge‑base references and, in individual cases, forwarded tickets to Fachteam/specialist teams for an access check. Key owning teams and contacts used in resolutions included: akad-pruefungsamt@iu.org for Online‑Examen/iubh-onlineexams account and permission issues; pruefungsamt-fernstudium@iu.org and assessment-tool-operation@iu.org for central examination and assessment‑tool operations; the Zentrales Prüfungsamt service board (Jira Service Management) for additional central exam contacts; zpa-dualesstudium@iu.org and lehrende-pruefungsmanagement-dualesstudium@iu.org for dual‑study exam administration and Charly; the Lecturer & Course Coordination (LCC) Service Portal (example: BUGR01) for course booking and lecturer requests to grant student access to IU Learn materials; and people-project@iu.org for IU Learning Hub and IU Upskilling matters. In some cases tickets recorded Automation for Jira approval-workflow entries or other pending approval states; resolutions involved the examination office re-checking approval/authorization status and correcting course/application permissions. Tickets were closed after users acknowledged the guidance or after no response within the ticketing SLA when applicable.

17. Cost-center approver/owner entries in Workday causing incorrect tool access-request routing
90% confidence
Problem Pattern

Cost-center approver/owner entries in Workday and application-specific approver assignments (for example, module tutor routing in Syntea/Synthea) propagated to the IT service portal and downstream ticketing, causing access-approval and module-access requests to be routed to incorrect people. Symptoms included requests delivered to departed or irrelevant users, approvers who could not open requests (portal error: "No access / You do not have permission to view this request"), approvers cancelling requests, and frequent unrelated approval notifications. Affected systems included Workday, the IT service portal/Automation for Jira, downstream ticketing, SSO/app provisioning (Okta and apps such as Miro, Monday, Jira, Confluence, LinkedIn Learning, Frame.io) and application-specific routing (e.g., Syntea/Synthea).

Solution

Support traced misrouted approvals to approver/owner entries authored in Workday and to application-specific routing records that propagated downstream; the IT service portal’s approver field was not editable so selected cost centers or application routing entries determined the approver. Observed symptoms included departed or irrelevant approvers receiving requests, approvers receiving requests they could not open (portal error: "No access / You do not have permission to view this request"), approvers cancelling requests, and approvers receiving frequent unrelated approval notifications. Remediations were grouped into permanent fixes and immediate/workaround actions.

Permanent fixes: Workday/HR cost-center ownership entries were corrected so the intended approver propagated downstream; employment status and entitlement were verified when a nominated approver could not be reached or lacked permissions; requesters who had selected the wrong cost center were asked to recreate requests with the correct Workday cost-center reference; where application-level routing was incorrect (for example a module tutor in Syntea/Synthea), the application routing record was updated so requests were delivered to the current owner.

Immediate/workaround actions: incorrect approver assignments were removed directly from affected Jira tickets to stop recurring notifications; Okta assignments or app-specific admin-group membership were adjusted so application approvals and provisioning could proceed without changing Workday records; affected requests were reassigned inside the application when applicable (for example reassigning a Syntea module to the new tutor). Where applicable, users were advised to contact Workday support or HR (for example: wd-support@careerpartner.eu) or their manager/HR to remove erroneous approver assignments.

18. Applicant unable to submit 'Anerkennung von Vorleistungen' online form in Bewerbungsportal
90% confidence
Problem Pattern

Applicants were unable to access or complete functions in the Bewerbungsportal (careerpartner applicant portal). Symptoms included login failures with error code STUDY_INFO_CANT_REACH and message “no booking info available” (JSON error payloads were sometimes attached), and blocked submission of the 'Anerkennung von Vorleistungen' online form for switching study programs (DS→FS). Affected system: Bewerbungsportal / careerpartner applicant portal.

Solution

Requesters who could not submit the 'Anerkennung von Vorleistungen' online form were referred to the Bewerbungsportal support team (careerpartner servicedesk) and given the servicedesk URL so they could create a support request in the Bewerbungsportal queue; the IT ops ticket was closed after that referral. For applicants who reported login failures — including reports that contained the error code STUDY_INFO_CANT_REACH and the message “no booking info available” (often accompanied by JSON fields and browser details) — IT confirmed the applicant portal was not supported by the IT Service Portal and instructed reporters to open a support request via the IU Meldeportal (Jira Service Management). In all cases IT ops recorded the relevant context (browser, timestamps, Salesforce opportunity when present) and concluded by redirecting the requester to the appropriate Bewerbungsportal or IU Meldeportal support channel before closing the IT ops ticket.

19. SSO access blocked by duplicate/conflicting Atlassian accounts
95% confidence
Problem Pattern

Users were unable to access SaaS applications (Atlassian products or GitLab) or saw "access denied", missing project/portal memberships, inability to open or approve requests, or unrelated content after clicking email links or signing in. Failures occurred when duplicate/conflicting identities (including multiple Jira profiles) existed, account renames/internalization left legacy .ext addresses active, provisioning/mapping mismatches occurred in Okta/SCIM/Entra/Azure AD, or an SSO app was assigned the wrong account (for example due to an email typo). Affected systems included Atlassian, GitLab, Okta SSO, SCIM provisioning, and Entra/Azure AD.

Solution

Investigations identified two common root causes: duplicate or conflicting identities (multiple Jira/Atlassian profiles or legacy external .ext accounts) and provisioning/mapping errors during renames or app assignments. Resolutions included aligning users to the SSO‑managed identity and removing or disabling duplicate accounts where feasible; when legacy accounts remained for migration, support provisioned equivalent permissions on the SSO account or provisioned the legacy account as required. Teams corrected SCIM/Entra/Azure/Okta provisioning so username and email attributes matched the SSO identity, eliminating cases that forced users to sign in with a .ext address. For workflow approvals, setting the correct Jira profile as the approver and reproducing the session/profile selection during escalations revealed underlying duplicate‑identity or username mismatches. In non‑Atlassian cases (GitLab), access was restored by reassigning the correct Okta account to the GitLab app when an email typo had linked the wrong account and by deactivating the incorrect account.

20. Approval routing stuck due to stale Workday cost-center approver mapping
95% confidence
Problem Pattern

Approval and access-provisioning workflows failed to route or complete because approver or manager assignments were stale, missing, incorrect, or assigned to inappropriate users. Symptoms included approvals continuing to go to prior approvers after role changes, Automation for Jira showing “waiting for an approval,” requests with no valid approver found for a cost-center or access group, users unexpectedly receiving Workday invoice-approval tasks, project tickets auto-assigned to departed owners, and downstream provisioning (Okta, AWS groups, IT Service Portal) blocked or delayed awaiting approval.

Solution

Investigations found routing failures caused by stale, missing, or incorrect approver/manager data across identity and approval sources (Workday cost-center mappings, Microsoft MyAccess approver lists, and Jira project/location assignment fields). Resolutions included removing departed or incorrect approvers and reassigning correct approvers so approval workflows resumed routing: Workday cost-center approver entries were corrected so Jira imports and Automation for Jira resumed approvals; Microsoft MyAccess approver lists were cleaned (departed approvers removed from AWS Access Groups and groups reassigned to current approvers); and Jira project/location fields (Real Estate Manager / Key‑User, location assignments) were updated to stop tickets being routed to former owners. When approvals were blocking provisioning, administrators completed access manually (direct Okta application assignment or invitation) and recorded manager approvals in the IT Service Portal after approver mappings were corrected. In some cases users had been granted Workday approval permissions they should not have had (for example trainees receiving invoice-approval tasks); those permission removals were handled by Workday support rather than IT (contact address used: wd-support@iu.org), and some Automation for Jira tickets were auto-closed without confirmation of the change. Affected systems referenced in these resolutions included Workday, Microsoft MyAccess, Jira Service Management and Automation for Jira, AWS Access Groups, Okta provisioning, Confluence, and the IT Service Portal (SDesk).

21. No vendor invitation received after corporate SaaS provisioning request (OpenAI/ChatGPT)
95% confidence
Problem Pattern

Users requested corporate AI service access (ChatGPT/OpenAI/Anthropic) but the vendor did not recognize their institutional invitation or account state, preventing tenant or project membership, license assignment, or model selection. Symptoms included missing, expired, blocked, or not‑delivered invite/confirmation emails; vendor UI messages such as “Limited access” or “you haven't been invited to any projects in <tenant>”; sign‑in redirects or loops into personal/free accounts; “account does not exist” errors; and provisioning web forms blocking resubmission with messages like “Your response has already been submitted.” Affected systems included ChatGPT, OpenAI Playground/API, Claude/Anthropic, and corporate SSO providers (Okta/Microsoft); users also reported access‑denied on provisioning links and stuck or auto‑closed approval workflows.

Solution

Issues were resolved by restoring the vendor-side invitation and identity state so the vendor recognized the institutional account and assigned tenant/project membership or licenses. Support removed stale or expired invites, reissued or resent invitation links (including sending invites directly when provisioning web forms were blocked with “Your response has already been submitted”), and confirmed invite acceptance when vendor UIs still showed users as unaccepted. Administrators added users to the workspace/default project or assigned required licenses so tenant-level features and the model-selection UI returned (covering ChatGPT product vs OpenAI API/Playground and GPT‑4 access). When existing vendor accounts prevented corporate membership, vendor password resets, replacement invites, or vendor‑side account merges resolved conflicts caused by personal Google‑linked free accounts; support also clarified when accounts were not federated so users signed in with vendor credentials rather than SSO. Support corrected incorrect email or display-name mappings, cleared or completed blocked approval workflows, remediated related authorization errors (for example SharePoint access‑denied on provisioning links), and caused users to sign out and sign back in so vendor permissions refreshed. Support also advised checking spam folders, provided product-specific links (Chat Playground vs OpenAI API/Playground), and supplied internal request or admission links when available.

Source Tickets (167)
22. Shared SaaS subscription provisioning requiring requester-supplied credentials (Midjourney)
90% confidence
Problem Pattern

Users requested access to shared or department-controlled third‑party SaaS accounts or transfers of ownership for collaborative/event services. Reported symptoms included missing or unusable passwords, sign‑in flows that prompted for a password on credentialless functional/shared mailboxes, invitation flows landing in mailboxes that could not be signed into, vendor sign‑in redirecting to institutional SSO that admitted only the original owner, unclear ownership or procurement responsibility, and vendors disabling password logins or enforcing SSO that broke previously shared access. Affected systems included Midjourney, Eventbrite, Mentimeter, Lieferando and Calendly.

Solution

Support observed a small set of recurring outcomes determined by whether usable shared credentials existed, whether the vendor supported team/shared seats, whether identity provider/SSO mapping prevented non‑owner logins, and whether Procurement owned/stored credentials. Resolutions recorded which of those constraints applied and followed one of these outcomes:

• Usable shared credentials existed: requesters supplied the credentials via ticket, IT booked the subscription or plan, and IT completed provisioning for the shared/course account.

• No shared credentials and the service was person‑bound or tied to the org identity provider: support informed requesters that no IT‑maintained shared account was available and advised self‑registration or requesting an individual license via the Application Self Service.

• Account created/stored by local Procurement or site staff: support advised checking the site 1Password Standort_Vault for stored access and confirming required budget assignment before provisioning.

• Vendor or identity changes disabled password‑based shared access (SSO enforced): the organization procured separate individual licenses or treated credential transfer as impractical. For departing owners, support cancelled the existing account and created a new account for the replacement rather than transferring credentials.

Additional observed nuance from Calendly: an invitation sent to a credentialless/functional shared mailbox produced a password prompt that could not be completed because the mailbox had no password, but the invitation email enabled a named user to accept and manage the service by signing in via Okta SSO with their own account when the vendor supported that flow. Support therefore noted that some vendors (for example, Calendly) were effectively incompatible with passwordless functional/shared mailboxes for direct mailbox sign‑in, but invitations landing in those mailboxes could sometimes be accepted by a human who authenticated with org SSO.

Where IT did not manage vendor budgets or accounts (for example, Lieferando), support declined to provide access and advised using a personal account and submitting an expense claim via Workday. Each ticket recorded whether shared credentials existed, whether vendor supported team/shared seats, whether SSO mapping blocked non‑owner logins, whether Procurement owned or stored credentials, and whether a budget needed to be assigned; the chosen resolution reflected those constraints.

23. Internal service portal and sandbox access provisioning and agent role activation
95% confidence
Problem Pattern

Users were unable to access internal service portals, non-production environments (sandbox/UAT/stage/test), corporate software catalogs, or ticketing boards. Symptoms included missing or hidden Okta app assignments or tiles (production visible while dev/stage missing), non‑selectable options or failed forwarding/submit actions on access‑request forms, authentication failures after credential or account changes, and absent Jira Service Management agent/admin roles preventing ticket-board actions. Some users had production access but lacked environment-specific authorization in non-production instances (for example Care Stage). Affected systems included Okta-integrated apps, CARE/myCampus, EPOS/Hyperion links, Jira Service Management/Service Desk, and Salesforce UAT.

Solution

Access was restored through a combination of automated and manual provisioning actions. In some cases Application Self Service/Automation for Jira triggered an Atlassian Api User system action that assigned the requested non‑production application to the user. Other incidents were resolved by recreating or reactivating missing accounts (including CARE/myCampus) and confirming successful authentications after password resets. Okta visibility was restored by relinking or re‑adding app assignments to user Okta accounts, directing users to umbrella Okta portals when appropriate, and re‑exposing hidden dev/stage/UAT app tiles. Where role propagation failed between environments teams either restored automated data‑syncs or manually applied missing authorization roles in non‑production instances (including restoring Hyperion EPOS links such as epos_be.ds-exam and epos_fe.ds-exam). Jira Service Management access issues were resolved by assigning missing JSM licenses, granting Agent/User or Admin roles, adding users to portal or team access groups, and completing pending Automation for Jira approvals so users could view/assign/answer/close tickets. When access‑request forms lacked selectable options or agents could not forward tickets, users were asked to resubmit via the responsible service portal and specialists provisioned environment accounts (including multiple test accounts when requested) and communicated access details. Corporate software distribution problems were resolved by publishing applications to the Company Portal and granting access; for macOS, support supplied installer packages directly, granted temporary admin elevation for installation when needed, and delivered license keys via Save App. Support‑board and dashboard permission problems were resolved by granting the appropriate board/dashboard permissions. Restored access was confirmed by successful logins, restored application visibility, presence of roles/permissions in non‑production environments, ability to download/install software, and ability to view/edit/assign/close tickets.

24. Application license requests via self-service requiring correct approver assignment
95% confidence
Problem Pattern

Self-service application, license, subscription, or local-install requests stalled in 'Awaiting approval' or 'Awaiting CC-approver' states, or presented messages such as 'your ticket is missing the approver', preventing provisioning. Missing, incorrect, blank, or mismatched approver, billing/cost-center, or identity metadata (manager, cost-center approver, Workday source) caused Automation for Jira approval workflows, Okta/SSO provisioning queues, and Azure AD/group-based assignments to block, auto-decline, or auto-close after approval-window expirations. Affected users reported apps missing from the Okta dashboard, lack of access despite approvals, or uncertainty whether renewals could be completed via self-service.

Solution

Pending or blocked self-service application and license requests were resolved by restoring correct approver assignments and correcting Automation for Jira assignee/CC-approver values so approvals routed to the user's manager or primary cost-center approver. Automation for Jira had generated explicit 'missing approver' notifications and automatically closed or declined approval-type tickets when no approver was recorded or when approval windows expired (~14 days); staff identified the appropriate approver, updated approver and cost-center metadata (Workday was used as the source of truth for cost-center data), and re-routed or re-opened approval workflows so approvals could complete. In at least one renewal case users self-activated/renewed access without IT intervention and the request was closed as completed. For SSO/Okta-managed applications support teams enabled the app entry and assigned users to existing or newly-created Okta access groups or Azure AD groups so the app surfaced on the Okta dashboard or the Application Self-Service portal; enabling and assignment typically propagated in approximately 5–10 minutes. Directory- and device-managed licenses were assigned via Active Directory/Intune and delivered through Company Portal when applicable; when full licenses were unavailable users were sometimes given limited or viewing-only access or assigned team/subscription accounts. Where provisioning required explicit AD-group membership a preexisting Azure AD group (for example ApplicationRight_Adobe-Sign) was used and inventory/cost-center mappings were reconciled with the internal inventory system. Requests that were procurement-related or already covered by institutional capabilities were redirected or declined. Resolved tickets recorded confirmed delivery of the license/subscription or completion of access provisioning and how the user would access the service (for example, via the Okta dashboard, an emailed password/setup link, or a team account).

25. SaaS access blocked by outdated superadmin ownership or missing superadmin contact
90% confidence
Problem Pattern

Third‑party SaaS access, integrations, or account data were inaccessible when tenant-, site-, or business‑manager‑level administrative control, SSO/licensing state, or contact ownership was stale, incorrect, or held by departed staff. Reported symptoms included SSO login failures, site prompts such as “Your site admin must authorize this app for the site …”, app configurations showing zero group members or no available licenses, interfaces preventing adding users or assigning admins (including special/shared “box” accounts), inability to obtain developer/admin roles, and inability to retrieve account data or archived mailings when no current staff had access. Affected systems included cloud collaboration, marketing/email platforms, ad/business manager consoles, and AI integrations.

Solution

Access issues were resolved by identifying who controlled tenant-, site-, or business‑manager‑level administration and correcting stale or restrictive approvals, authorizations, and SSO/license state. Specific outcomes included adding administrators to superadmin/rosters to restore onboarding and experiment access in AB Tasty; authorizing Atlassian MCP on site-level Atlassian sites so the Claude integration could access Jira/Confluence; addressing a Canva outage where zero group members and unavailable licenses coincided with a shared account by temporarily permitting email/password sign‑in until SSO and licensing were corrected; transferring Viewneo access by updating an existing special “Extra” account email so the requester could sign in when the interface blocked adding users; and changing a Meta Business Manager setting that had blocked assigning developer/admin rights so the IU Meta account could obtain developer permissions and complete a WhatsApp integration. For marketing/email platforms (CleverReach), efforts included locating the account owner and escalating to a specialist; in at least one case no copy of a requested November 2023 mailing could be recovered because no staff retained access to the CleverReach instance and no archive was available. When account ownership could not be re-established, resolution required vendor or specialist intervention and sometimes concluded without recoverable content.

26. Vague report/dashboard access request that had no reproducible access failure
82% confidence
Problem Pattern

Users reported inability to sign in to dashboards, reports, or applications (Power BI/Microsoft Fabric, Confluence, Company Portal, Okta‑launched apps, or third‑party web services) but provided no specific resource name, error message, screenshot, or reproducible steps. Reports were generic login or access failures, transient sign‑in problems, or vague permission concerns (for example row‑level security). Affected systems included SaaS web services and internally published apps; some incidents later succeeded without detailed error information.

Solution

Support attempted to reproduce reported access failures by signing in to the named dashboard, report, or application with the user’s account and by confirming whether the content or app was accessible. When users could not identify the exact resource, support requested the resource name and escalated tickets to specialists or the owning team for deeper investigation. Power BI or Microsoft Fabric incidents that referenced row‑level security (RLS) were forwarded to the specialist team and users were directed to obtain access from the report owner. For Confluence and other collaboration platforms, support verified the user’s license/status and general account access before closing or handing off the ticket. For Company Portal–published applications, support verified whether the app was published and where it appeared (for example, Webex appeared under the Windows 11 section) and noted documentation inaccuracies about approval requirements. For Okta‑launched applications, support checked application assignments and provisioning in the Okta dashboard and confirmed access by having users launch the app through Okta (for example, Cursor access was resolved by confirming assignment and launching via Okta). For third‑party consumer web services (for example LinkedIn), support suggested browser‑level troubleshooting such as trying a different browser, clearing cookies/cache, and disabling tracking or adding the site to tracking exceptions; where the service was outside IT ownership, users were directed to the vendor or owning team via Jira Service Management. Where no reproducible error was present, support documented transient access failures and noted when Okta profile reviews showed no misconfiguration and access later succeeded after retry. Tickets were closed after users confirmed access, after handoff to the owning or specialist team, or when there was no user follow‑up.

27. Third‑party SaaS access stuck because app wasn't in company catalog or approver was unresponsive
93% confidence
Problem Pattern

Approval requests for third‑party SaaS apps stalled in Automation for Jira with statuses such as 'approver waiting', 'pending-approval', 'request timeout', or auto-decline after the 14-day approval window. Requesters reported no approval notifications and no visible app, sandbox, or provisioning entry in the company software catalog/portal or in the SaaS, even when Okta showed licenses or assignments. Triggers included the application or environment (for example a sandbox) not being published in the company catalogue, incorrect or unresponsive approvers, routing to specialist teams, or tickets being closed with mismatched resolutions (for example 'Won't Do'). Affected systems included Automation for Jira approval workflows, the company software catalog/portal, Okta provisioning, and the SaaS applications themselves.

Solution

Support cleared stalled approval requests using approaches tailored to the cause. When the app or sandbox was missing from the company software catalogue, requesters were directed to the owning team’s service portal or support logged a new software/sandbox request that documented required users and integration/feature requirements (for example Workday integration, mobile barcode scanning). Administrators sometimes enabled/whitelisted and published the application or sandbox to the company portal; published entries typically appeared in the portal within about 30 minutes. When approvals were delayed by incorrect or unresponsive approvers, support reopened or rerouted approvals by updating the approver in Automation for Jira; in some cases designated approvers completed approval directly in the SaaS which finished provisioning. Where automated approval routes failed or requests had timed out, support performed manual provisioning actions to complete access: adding users to the company‑managed account in the SaaS, adding the app to users’ Okta dashboards/assignments, re‑enabling accounts, or sending direct invites/emails. Support observed that some Automation for Jira requests auto-declined after the 14‑day approval window and could not be reopened, and that some tickets routed to specialist teams were closed as 'Won't Do' or otherwise declined without provisioning; resolution-label mismatches were noted when an approver had granted access but the ticket was still marked 'Won't Do'. For software using form‑based license mapping, selecting the correct license variant (for example 'Miro (Free Restricted)') resulted in automatic license assignment once the form was approved. Tickets sometimes contained a 'request timeout' comment even when a later approval or correct form selection caused provisioning; when Okta already showed an assignment, support verified the assignment, informed the requester that the application was available, and closed the ticket.

28. Access provisioning for internal transfers blocked by incorrect cost‑center selection and per‑app request requirements
86% confidence
Problem Pattern

After internal transfers, role changes or new hires, users reported missing or incomplete application access, group memberships, telephony extensions or shared mailboxes. Symptoms included provisioning stalled by pending or mis‑assigned approvals, absence of accounts or group assignments from Workday sync, expired activation links, and missing application‑level permissions without explicit error messages. Telephony provisioning errors sometimes presented as blocked Salesforce telephony entries when the external telephony account (eg. Vonage) was deactivated. Affected systems included Workday‑synced flows, Okta‑provisioned apps, telephony platforms (Vonage, Cloudya/Nfon), Exchange/Office365 mailboxes, and internal permissioned apps (Salesforce, Teams, Miro, BIC, EPOS).

Solution

Support verified the user’s new department/cost‑center and new position with the previous team lead and checked Workday status before applying identity or group changes; provisioning that depended on Workday or cost‑center data was held until the HR record, approvals and job description were present. Users were informed when particular tools required separate self‑service requests (for example Miro and BIC). When access requests were blocked by incorrect approver assignment, the approver was changed to the manager so the request could complete. For urgent onboarding where HR data or cost‑center was not yet available, specialists temporarily provisioned access by directly assigning the application in Okta and recorded authorized exceptions in the approval workflow (Jira). Role‑aligned permissions were set by mirroring a comparable reference user’s rights when available, and application‑level permissions were adjusted for systems that maintain internal permission models (for example EPOS and Salesforce role scopes). Telephony issues were investigated for account‑state problems: a deactivated Vonage account was identified as the cause when Salesforce refused to register/update the telephony entry; telephony tasks were resolved by reactivating or recreating the telephony record/extension, assigning external numbers, re‑issuing activation emails or performing password resets as required, and confirming provisioning in the telephony system. Shared mailbox access was granted through Exchange/Office365 mailbox permissions. Tickets were closed after the correct cost‑center and Workday status or required confirmations were present and the requested application, mailbox or telephony access had been provisioned.

29. On‑prem application inaccessible due to unresponsive host blocking data access
90% confidence
Problem Pattern

User was unable to open the E-test admin application and received an error when attempting to launch it. The user needed to remove scanned documents from the application and move them to a network shared drive but could not access the system or the files. The symptom indicated the e-test host/server was unresponsive and preventing any application-level file operations.

Solution

IT restarted (powered on) the e-test server, which restored access to the E-test admin application. The user moved all scanned documents from the application to the designated network shared drive while access was available. After confirmation that files were successfully transferred, IT powered the server off again and the incident was closed.

Source Tickets (1)
30. Copilot for M365 access gated by IT Service Portal automated request/approval workflow
92% confidence
Problem Pattern

Users requested Microsoft Copilot (end-user licenses or tenant/admin accounts) but received no product access after submission. Requests commonly stalled in Jira Service Management/Automation for Jira approval workflows (remaining in “Approval pending” or being auto‑declined/auto‑closed when approvers did not respond). Reported symptoms included license‑unavailable messages for preview/test offerings, inability to open Copilot Studio/playground, activation delays up to ~48 hours, and ambiguity about tenant/admin provisioning.

Solution

Access failures were traced to multiple, distinct causes and were resolved with actions specific to each cause. Requests submitted via generic or incorrect portal forms were reprocessed after support identified them and the requester submitted the dedicated Copilot for M365/Application Self Service request; generic tickets that were not resubmitted were closed as “Won’t Do.” Tickets stuck in Automation for Jira approval workflows were cleared by reassigning or adding alternate approvers so an approver took ownership; once approved provisioning proceeded. Enterprise application assignment was performed either by administrator assignment in Azure AD or programmatically (via the Atlassian API) when appropriate; where preview licenses could not be assigned users were informed of license‑unavailable status or explicitly added to a preview user group. Some automatic provisioning dependencies were recorded as gated on completion of designated Learning Hub courses; support recorded the gate and removed it only after course completion was confirmed. Support also recorded that requesters had to personally accept Microsoft’s Copilot terms of use before activation and warned users not to include GDPR‑relevant data in prompts. Microsoft activation was observed to take up to ~48 hours. For Copilot Studio/playground access, support provided temporary credentials and a seven‑day time‑limited link and treated the playground as a test environment; moving any bot or configuration to production required a separate request. Tenancy and admin‑account requests were resolved by clarifying tenant decisions (for example, using a single tenant and reusing existing accounts) or by creating admin accounts where required.

31. Okta application provisioning propagation delay causing Miro login failures
95% confidence
Problem Pattern

Users experienced sudden, transient inability to sign in to enterprise applications (notably Miro via Okta SSO and GitLab). Symptoms included access-denied or failed-login responses, inability to edit Miro boards, missing Miro application assignment or IU group membership in Okta, occasional third-party provider prompts (e.g., Microsoft), or no specific error message; many incidents cleared after a short delay.

Solution

Access failures were resolved by repairing or restoring identity provisioning and SSO integrations and by correcting account- and assignment-related conflicts; in one case a GitLab outage cleared after a short wait. For Miro, support restored access by enabling or creating the enterprise Miro application assignment for the iu.org Okta account, assigning the appropriate Atlassian product license on the Okta profile when required, adding users to the IU group so membership appeared in Okta, and correcting account-type conflicts for users with preexisting free Miro accounts. When users attempted alternate identity providers (Google or Microsoft) while the tenant required Okta SSO, access was restored by enabling the Miro assignment on the user's Okta profile and confirming enterprise team membership; some specific boards prompted an additional Microsoft sign-in which cleared after the user completed that flow. Restoring broken Miro SSO integrations cleared broader failures. Provisioning and SSO changes typically propagated within minutes (commonly 5–10 minutes); several incidents cleared after a short retry or the next day, and transient in-app password errors or failed password-reset attempts were observed while provisioning synchronized. For a reported GitLab login failure, support advised waiting approximately five minutes and retrying; the user retried and access was restored without further action. Users were routinely signed in via the Miro tile at https://okta.iu.org/ as part of resolution when relevant.

32. Workday tile in Okta returned error where user had multiple IU addresses and Okta account flagged 'PW Reset' (no resolution recorded)
61% confidence
Problem Pattern

Users could sign in to Okta but were unable to open Workday from the Okta app tile; clicking the tile produced a “Workday Sign In Error”, an “access denied” result, or an error indicating Okta-to-Workday Automatic Push/provisioning was disabled. The Workday tile sometimes displayed an unexpected or (in other cases) the expected IU email/username. Affected accounts frequently involved multiple IU-related email identities and occasional 'PW Reset' flags. Failures involved Okta-to-Workday SSO and provisioning pairing.

Solution

Incidents were resolved by addressing one of several account-level or integration-level issues that blocked Okta-to-Workday SSO/provisioning. Support first confirmed the Workday tile identity (users provided screenshots and support verified the tile’s three-dot menu/email shown). Resolutions observed in tickets included: correcting the email address shown on the Workday app tile in the user’s Okta dashboard, re-enabling/reactivating Okta’s Automatic Push (Okta-to-Workday provisioning) so the Workday account could be provisioned/paired, and performing a repair to the Okta–Workday configuration/integration when simple fixes did not restore access. After these changes users regained access (one record noted both Workday and Egencia access were restored). Records also noted account confusion from multiple IU identities and occasional 'PW Reset' flags; some earlier instances recorded causes but no remediation in the ticket notes.

33. Monday.com board-level edit access blocked despite valid licenses
87% confidence
Problem Pattern

Users with valid SSO and application licenses were unexpectedly limited to viewer-only or could not create or edit resources in collaboration apps such as monday.com, Figma, Miro, and Lucidchart. Symptoms included missing UI options (for example Dev Mode or create-board buttons), explicit in-app messages like “Request permission to create a board” or “Your organization uses Single Sign-On with Miro. Please contact the account admin…”, inability to select or create boards/areas/diagrams even after re-login, and membership or ownership remaining tied to departed users. In some cases identity-provider changes (Okta assignment, unlock, or license grant) did not take effect immediately and took several minutes to propagate; Miro’s in-app Join Request flow sometimes failed to grant immediate membership.

Solution

Support verified application account status and license entitlements and observed that the root cause determined the remediation. Where Okta assignment, provisioning, or account lockout prevented access, assigning users to the application or its provisioning/access group, enabling/unlocking the Okta account, and granting the application license via the Okta Dashboard restored viewer/edit/create capabilities; administrators reported that Okta changes sometimes required about 5–10 minutes to propagate. Pending in-app approval workflows (for example Automation for Jira approvals or Lucidchart request approvals) were completed and restored edit rights. For Figma, assigning users to the correct access group (for example IU-ZZ-OK-ASS-Figma) and enabling account feature toggles (for example Dev Mode) restored space edit permissions and UI options. For Miro, team-level permissions and board/Area ownership occasionally prevented board creation; Miro admins restored functionality by changing board/Area ownership, promoting co-owners, or recovering service-account credentials and admin-console links. Support observed that Miro’s in-app Join Request flow sometimes failed to add membership immediately and that affected users sometimes created resources in other teams as a workaround. Support clarified that IT managed licensing and SSO provisioning while resource-level permissions and ownership were controlled by board/space owners or product admins; when licensing and SSO assignment appeared correct but users still lacked rights, escalations to resource owners or business specialists resulted in ownership or membership changes that restored edit access.

34. Atlassian sign-in failure due to username/character mismatch resolved via Okta SSO dashboard
91% confidence
Problem Pattern

Users were unable to sign in to cloud services (commonly Atlassian, Salesforce, Workday) after SSO redirects to Okta, experiencing repeated "invalid credentials" or "credentials are incorrect" prompts, persistent Okta password requests, or silent sign-in failures that blocked access to billing/support portals and intranet links. Failures sometimes occurred despite Okta logs showing successful SSO and accounts present in the target application; the same credentials were occasionally accepted on mobile. Triggers included username/character mismatches (for example umlauts), username/email renames, new Windows 11 device password acceptance issues, and active mailbox/session persistence. Affected flows required institutional credentials and MFA and typically redirected users to Okta for authentication.

Solution

Access was restored most often by completing the Okta SSO flow from the Okta app launcher/portal, which used the updated Okta identity and allowed immediate access even when browsers or PCs displayed incorrect-password prompts. Backend logs in multiple incidents showed Okta SSO flows succeeding and user accounts present in the target application while end-user browsers reported credential errors; in several cases the same credentials worked from mobile or via Okta. In rename/email-change cases the Okta automation had updated the account but browser sessions still used the old identity; launching the application from the Okta portal used the updated username and resolved the sign-in. Where the target application (notably Atlassian) rejected passwords, administrators reset the application account password and users completed the emailed reset link; some resets did not take effect until the user signed out of an active IU mailbox/session. In incidents caused by broken integrations or malformed SSO configurations, re-establishing or reconfiguring the Okta–application integration restored normal SSO behavior and access to saved intranet links and billing/support portals.

35. Corporate ChatGPT access blocked by approval workflow and pending invitation acceptance
95% confidence
Problem Pattern

Corporate ChatGPT/OpenAI accounts and higher‑tier entitlements frequently remained in 'Pending' or 'Limited Access' states. Affected users reported 'Limited Access' banners, upgrade/payment prompts, inability to start chats or access platform.openai.com/playground, missing organization/team entries in the account selector, or the UI showing a 'Free' plan. Invitations or approval links were often invalid, expired, undelivered, auto‑closed, or accepted while signed into a different/personal Microsoft account or browser session, which prevented group membership and token issuance. Approval requests also stalled awaiting cost‑center or C‑level approvers, or were auto‑declined by automation rules.

Solution

Access was restored when both a valid OpenAI/ChatGPT invitation was accepted by the intended identity and the organization’s approval/provisioning workflow completed. Common resolved causes and observed fixes included:

• Invitation and identity association: Reissuing invitations or sign‑in links, checking spam and shared inboxes, and confirming receipt/acceptance of a valid invitation consistently correlated with activation. Several cases specifically showed that accepting an invite while signed into a different or personal Microsoft account/browser session prevented the user from being added to the organization/group and from receiving tokens; administrators reissued invitations and users accepted them while logged into the correct Microsoft account, which restored group membership and Playground/tokens access.

• Approval workflow behavior: Provisioning remained pending until catalog/IT approval (including cost‑center or C‑level approvals) completed. Automation rules (for example in Jira) caused requests to auto‑close or auto‑decline when approver fields were unspecified, missing, or inactive (14‑day timeout); some auto‑closed requests could be reopened within a limited window, otherwise a new request referencing the original was created. When an assigned approver could not see approval controls, an alternate approver or administrator completed the approval and a new invitation was issued.

• Product and licensing mapping: Team licenses had been migrated to Enterprise in some provisioning flows; support sent Enterprise invitations after migrations. Higher‑tier entitlements (ChatGPT Team/Enterprise, Pro / GPT‑4) often remained pending until the correct license, cost‑center, or executive approvals were applied.

• Account activation and credential conflicts: OpenAI password‑policy rejections (notably against reused passwords) and conflicts between personal and corporate credentials were documented causes of activation failures; support clarified which account (personal vs. organization) was active and reissued registration flows when needed.

• Provisioning, roles and team features: Administrators manually provisioned users, corrected role or cost‑center assignments, added users to the correct project or organization team (sometimes cloning permissions from an existing user), and enabled team features such as persistent conversation history. Enabling the Playground and chat interfaces restored expected functionality in several cases even when the UI continued to display a 'Free' plan label.

• Cleanup and link/flag fixes: Persistent notifications and error messages were cleared by adjusting invitation and account server/tenant flags. Invalid, expired, or malformed approval or invitation links required reissuing invitations or creating new approval actions to complete provisioning.

In multiple resolved cases the decisive actions were support‑sent invitations accepted by the correct account/identity (including ensuring the correct Microsoft account/browser session) combined with approver action (including cost‑center or C‑level approvals) and any necessary manual provisioning of group/team membership.

Source Tickets (109)
36. Legacy AcademyFive account and username-based login blocking access
90% confidence
Problem Pattern

Users were unable to sign in to AcademyFive/CARE when using email-based credentials or after password resets for legacy accounts that required username-based logins. Symptoms included rejected email sign-in, generic "Sorry!" sign-in messages, and CARE integration failures reporting "Allgemeiner Fehler bei der Verbindung zu CARE" (General error connecting to CARE) on care-admin.iubh.de. Affected systems included AcademyFive, CARE, myCampus and my.iu.org, with users reporting loss of access to attendance and schedule functions.

Solution

Support located an existing legacy AcademyFive/CARE account for the user and confirmed the application required username-based (not email) login. Support provided the user’s CARE username (examples: "ka.maier" or "alessandro.de-matteis") and verified the account and requested access/role were assigned to match a reference colleague. A password reset had often been performed prior to the report; in one case the user completed a password change but still received a generic "Sorry!" sign-in message. In prior incidents access was restored after assigning the correct username-based account/role and allowing time for authentication and role propagation (~10 minutes); transient CARE integration errors (including "Allgemeiner Fehler bei der Verbindung zu CARE") resolved after propagation and retry. Support had also suggested using the myCampus credential form (e.g., a.de-matteis@iu.org) when appropriate. The incidents were characterized by transient authentication/propagation behavior rather than persistent configuration changes.

37. Existing Salesforce account with Okta SSO but missing Salesforce profile/roles prevented access
87% confidence
Problem Pattern

Users reported inability to access or fully use Salesforce despite authenticating via Okta SSO or having existing Salesforce accounts. Symptoms included sign‑in failure caused by missing Okta group membership or SSO/profile mapping issues, missing or disabled UI elements (empty lists, absent actions, read‑only pages), missing named list views (for example “Praxispartner”), inability to perform features due to missing permission sets, and routed cases/messages not appearing in Salesforce Queues. Some third‑party integrations produced runtime/null‑reference errors (for example Vonage/Twilio referencing getToggles). Some users also could not switch Salesforce profiles for UAT/Prod because they lacked the required permissions and managerial approval was required.

Solution

Investigators confirmed whether the user had a Salesforce account, that authentication flowed through Okta, and that the Salesforce application tile was enabled. When sign‑in failed despite matching in‑Salesforce entitlements, account comparisons to a reference user revealed missing Okta group membership or incorrect Okta Salesforce profile mapping; adding the missing Okta group or correcting the profile mapping in Okta restored access on next sign‑in. For users who signed in but lacked expected UI or functionality, administrators restored access by assigning or mirroring in‑Salesforce entitlements (profiles, roles, permission sets, public group memberships, creation rights) and by applying named list/view assignments (for example the “Praxispartner” view); colleagues with the required privileges sometimes applied identified permission sets directly. Permission changes that required managerial consent (for example enabling the Profile and Permissions Switch Flow used for UAT/Prod testing) were granted after obtaining manager approval (including accepted alternate manager approval where provided) and matching the user’s permissions to the reference account. When no Salesforce account existed, provisioning created the account; when creation attempts reported an existing account or there were locked accounts or metadata/display‑name mismatches, investigators located the existing account, corrected metadata, assigned the appropriate Salesforce license, unlocked the account, and triggered the account notification email. For Queue issues investigators confirmed whether incoming email addresses were routed directly to a Salesforce Queue (which removed messages from user mailboxes), verified queue membership and permissions, mirrored a departing/reference user’s queue membership when appropriate, or routed membership changes to the SalesTech team via the organisation’s Service Desk when support lacked the required privileges. Third‑party integration UI errors (for example Vonage/Twilio getToggles null‑reference) often resolved after in‑Salesforce permission fixes and Okta profile/group fixes; persistent defects were escalated to the application specialist or the vendor. Requests for privileged entitlements restricted to SalesTech (for example OnCampus) were routed to the SalesTech team or to external vendor support through the organisation’s Service Desk portals.

38. Specialist-delivered credentials or invites for third‑party SaaS access
94% confidence
Problem Pattern

Users were unable to access vendor‑ or site‑managed third‑party services because invitations, registration, or account‑recovery emails were missing, delayed, routed to spam, or blocked; automated provisioning stalled; SSO/team linkage failed; vendor accounts were locked or whitelist‑gated; or account bindings needed removal. Reported symptoms included absent or undelivered invite or reset emails, failed sign‑in (including cases where SSO authenticated but the vendor still denied access), persistent “awaiting approval” or provisioning states, missing licenses or team membership, and account‑binding or domain‑activation discrepancies across email domains (for example @iu‑study.org vs @iu.org).

Solution

Specialist teams restored or removed access by delivering, recreating, or revoking working invites and credentials, completing outstanding approval or provisioning steps, reallocating licenses, or coordinating with the owning team or vendor to finish provisioning. Actions that resolved issues included sending or resending direct email and SelfService invites, locating invites misrouted to spam and confirming delivery, allowlisting vendor notification addresses, and adjusting user email settings to permit registration links. When SSO was expected, technicians verified and used the enterprise SSO entry (for example signing in via the Okta app dashboard or using the same Okta credentials) and tracked team‑scoped SSO provisioning until vendor access appeared. Where internal request forms were blocked or unavailable, technicians bypassed the form by issuing direct invitations. Secure credential delivery used time‑limited 1Password links or the IU SAFE Portal; lost or device‑bound credentials were addressed by triggering password resets or account‑recovery emails, creating replacement accounts and recording credentials in the vault when appropriate, or allocating 1Password licenses. For platforms requiring explicit domain mapping, administrators requested and applied domain assignments before sending invites; technicians also checked for domain‑activation discrepancies that prevented access (for example differences between @iu‑study.org and @iu.org) and noted when vendor accounts were already deactivated. Where administrative ownership was unclear, stored admin credentials were reassigned in the vault, users were added to the appropriate team, and provisioning was tracked until completion while team‑vault membership and team‑scoped SSO remained the owning team’s responsibility. Vendor‑integrated issues were resolved by creating the vendor‑side user record, ensuring vendor‑to‑application mapping, assigning the correct role (for example in Salesforce), and enabling/unlocking or whitelist‑enabling vendor accounts so dashboards and integrated functionality became available. Requests to remove or unlink third‑party bindings were completed by verifying vendor account status (including already‑deactivated accounts) and performing the disconnect on the vendor side. Tickets were closed after a working invite, credential, reset, recovery email, license allocation, role assignment, vendor unlock, or completed unlink/disconnect was delivered, or after no confirmation was received from the user following delivery.

39. Missing role/group membership in internal apps (PowerApps/Custom apps) blocking user tasks
95% confidence
Problem Pattern

Users and service accounts were prevented from accessing internal applications or specific in‑app functions because required application roles, group memberships, SSO/IdP entitlements, Teams/application membership, environment‑level membership, required licenses, or policy constraints were missing, pending, removed, or out of sync. Symptoms included HTTP 403 access‑denied responses, missing UI tabs/controls, greyed‑out Save or action buttons, failed uploads or automations, inability to open pages/approval links, and team/channel membership gaps. Common triggers included unaccepted role invitations, automated or erroneous membership removals, disabled or unlicensed accounts present in Azure AD groups, identity propagation delays (~5–10 minutes), environment isolation (stage vs prod), and mismatched identity attributes during bulk provisioning. Affected systems included Power Platform/PowerApps, Copilot Studio, Viva Goals, SharePoint/sites, Microsoft Teams, d.velop, and other internal apps.

Solution

Investigations repeatedly found access failures caused by missing, misaligned, or out‑of‑sync application roles, group memberships, SSO/IdP entitlements, in‑application roles, Teams/application membership, environment-level membership, licensing, or organizational policy constraints. Resolutions observed across incidents included the following:

• Azure AD group and application role membership was reconciled against verified reference users and authoritative lists; disabled accounts and users without required licenses (for example missing Premium Calendar) were removed from groups or moved to appropriate groups, and membership counts were rechecked after propagation. AzureAD PowerShell and Power Automate flows were used for bulk adds and cleanup where appropriate.

• Application content and capability metadata were updated where required to restore functionality and clarity; for one Governance UserFrontEnd case the "Personal Productivity" capability was enabled after licensing and membership were corrected, multilingual informational text and links to the SharePoint article and Governance User app were added, and smart‑links to a PowerApps app and Confluence page were created.

• Third‑party SSO/IdP entitlements (for example Okta) were enabled or corrected; dynamic Azure AD groups were created where IdP syncs lacked stable unique IDs and name‑based dynamic rules were used to populate membership. Identity propagation delays between IdPs, Microsoft Graph and application UIs were observed (typically ~5–10 minutes) and were noted during investigations.

• In‑application roles, Teams/channel/tab memberships and team ownership were restored or corrected via application admin centers or by engaging product/tenant owners when the requester did not know the owning admin. d.velop account issues were resolved by granting write/edit permissions in the application and saving the changes; requesters were notified to test access.

• Service and automation accounts were granted minimal permission sets or moved into the appropriate environment when constrained by environment scoping; flows and connections owned by departed or locked users were migrated to designated service accounts and automation resumed.

• Bulk provisioning and batch enrollment tasks were executed or re-run where appropriate; discrepancies between authoritative lists (dashboards, Skillsmap/Excel, or other sources) and Azure AD group membership were reconciled and counts verified after propagation to confirm success.

• Copilot Studio/agent incidents with greyed‑out Save buttons or persistent agent errors were investigated for environment orchestration permissions, owner/orchestration settings, licensing, and organizational policy limits; ownership changes or licensing adjustments restored functionality where permitted.

• SharePoint and site access incidents were resolved by granting missing site permissions and allowing permission propagation to complete (observed ~5–10 minutes) or by triggering explicit re‑synchronization when necessary to restore uploads and site features.

• Transient client‑side symptoms cleared after role/group assignments and users performed short workarounds (logout/login or using an alternative browser).

• Investigations retained automation run logs, Microsoft Graph queries, and audit evidence where relevant; requests that required application‑specific portals were closed after advising requesters on the owning product team's portal process.

40. Role‑based onboarding automation requiring event sequencing (SalesTechDev)
90% confidence
Problem Pattern

Onboarding requests for a specific role (SalesTechDev) lacked a form option and automation to trigger downstream account creation at the correct time, causing DevOps notifications to fire before the starter's IU email existed and third‑party invites to be lost.

Solution

The MEA onboarding form and automation were updated to include the SalesTechDev role and to sequence notifications. A role entry was added to the Access and Permissions dropdown and a subtask/trigger flow was implemented so DevOps is notified only after the starter's IU email account was created. The change ensured third‑party account invites and tool provisioning were created against an existing IU email and included the expected downstream accounts (1Password, Conduktor, Confluence, Jira, DataDog, Port).

Source Tickets (1)
41. Jira/Atlassian access gated by Automation for Jira approval then admin provisioning
91% confidence
Problem Pattern

Access requests for Atlassian and Microsoft applications were stalled or misrouted, commonly showing Automation for Jira statuses like “waiting for approval”, “CC‑Approver is waiting for an approval”, or auto‑declined after a 14‑day approver timeout. Approvers sometimes could not open or view request details and requests occasionally appeared visible to unclear groups. Stalled approvals combined with missing Okta/security‑group membership or provisioning in the wrong admin portal left users unable to sign in via Okta SSO, lacking licenses or guest status, or missing Jira/Confluence project/space/dashboard/channel permissions and tenant admin role assignments. Affected systems included Atlassian (Jira/Confluence), Okta SSO, Microsoft Entra/Azure AD and Teams.

Solution

Stalled approval workflows were cleared or completed in the relevant approval systems (Automation for Jira and other approver routing) and approver routing/CC‑approver entries were corrected or reassigned. In some cases support bypassed or manually finished stalled Automation for Jira approvals so provisioning could proceed. After approvals completed, required permissions were granted via the user’s Atlassian account/Atlassian ID and owners added users to owner‑controlled Jira boards, projects, spaces or dashboards. Administrators or specialist teams then enabled/unlocked Okta accounts, added users to the required Okta/security groups (including bulk additions) — for example IU‑ZZ‑OK‑ASS‑Atlassian‑Jira Software, IU‑ZZ‑OK‑ASS‑Atlassian‑Jira Service Management and IU‑ZZ‑OK‑ASS‑IT Service Portal CampusManagement in this environment — and assigned licenses or guest status as needed. Mailbox and service‑account work was routed to specialist teams or existing shared mailboxes to avoid duplicates. Conflicting or duplicate requests were denied or closed after verifying existing access. For Microsoft Teams admin requests, roles were assigned in Azure AD/Entra (not the Teams developer portal) so privileges appeared in the Teams Admin Center. Provisioning changes typically propagated within minutes (commonly ~5–30 minutes), after which Okta SSO sign‑in and application access were restored and IT Portal redirects were removed. When tenants required development/testing, tenancy risk was noted and work was performed in a sandbox/dev tenant when available or after required approvals and risk acknowledgement.

42. External attendees blocked from Teams training by conditional access
90% confidence
Problem Pattern

External users (including personal email accounts) were blocked from signing in to Microsoft Teams for a Manager Learning Hub training session and received an error stating "your account cannot get access because of the company's policy". The issue appeared after recent changes to the course/base settings and prevented external speakers from joining the call.

Solution

An external IU account was provisioned for the speaker (steven@vanbelleghem.biz), which allowed the user to sign in to Teams and join the Manager Learning Hub session. Access was verified and the ticket was closed; other external attendees were to be granted similar external accounts if needed.

Source Tickets (1)
43. Application access blocked by missing assignment, pending approval or vendor invitation
95% confidence
Problem Pattern

Users who successfully authenticated via Azure AD or Okta SSO were unable to access SaaS applications or in‑app content because tenant- or vendor-side entitlements were missing, inactive, pending, or not bound to the SSO identity. Common symptoms included Azure AD AADSTS50105 'application is configured to block unassigned users' errors, missing or invisible SSO application tiles or Company Portal entries, Outlook/Teams add‑in linking failures, looping or failed sign‑in flows, explicit vendor SSO error pages, or a blank dashboard after SSO. Typical triggers included required app assignment or license/seat allocation, pending vendor invitations/approvals, vendor account/profile creation or reactivation, missing in‑app group/role/org/space membership, incorrect org/group bindings, procurement/provisioning sequencing, and directory/SSO propagation delays.

Solution

Access was restored after the missing tenant- or vendor-side entitlement, invitation/approval, license/seat allocation, account/profile creation or reactivation, or in‑app group/role/org/space membership had been completed and directory/SSO changes had propagated. Representative resolutions included:

• Azure/Okta application assignment: granting direct or group assignment in Azure AD Enterprise Applications (or assigning the app in Okta) resolved AADSTS50105 'application is configured to block unassigned users' errors and restored Outlook/Teams add‑in linking and app access. Adobe Creative Cloud access was restored by assigning the appropriate Azure AD group to student accounts.

• Vendor-side group/role membership: adding users to vendor-managed groups or roles inside vendor consoles (for example assigning users to an Adobe Sign product group) restored product access when licensing existed but group membership was missing.

• Vendor invitations and vendor-managed accounts: resending invitations or having vendor administrators create or reactivate vendor accounts and bind licenses to SSO identities restored access (examples included Figma invitations and vendor admin account creation).

• Vendor licensing via internal request systems: granting vendor product licenses directly to vendor-specific accounts through internal provisioning workflows resolved access gaps (example: GitHub Copilot access was granted to a named GitHub account after a DevOps/Atlassian service‑desk request).

• Enabling/configuring vendor SSO: completing or correcting vendor SSO setup removed vendor SSO error pages and allowed normal SSO flows to proceed (example: Agorapulse Okta SSO).

• Approvals and automation: completing pending approver actions or repairing approval routing for application-request workflows removed approval-state blocks.

• Procurement/provisioning sequencing and duplicate records: resolving cases where procurement created license records before vendor accounts, or where provisioning sources produced duplicate order entries, restored expected mappings between identities and licenses.

Timing observations: directory/SSO provisioning typically propagated within ~5–10 minutes though some app visibility or Company Portal entries took longer (one case ~24 hours); an initial SSO login sometimes created a vendor profile before in‑app space/role assignments took effect. Okta-initiated SSO flows sometimes bypassed Azure AD assignment checks while deep links that invoked Azure AD could surface AADSTS50105 blocking. In all incidents users regained access once the missing entitlement, invitation/approval, license/seat allocation, profile creation/reactivation or membership change had been completed and allowed to propagate.

Source Tickets (149)
44. Power BI Self-Service Portal report access blocked by missing Power BI entitlement and owner-controlled report permissions
91% confidence
Problem Pattern

Users could not open Power BI reports or apps: links redirected to a Power BI SignupRedirect URL, a no‑access page was shown, the in‑portal 'Send Request' produced no visible response, or app-specific access failed. Symptoms frequently followed role or organization changes, license/entitlement changes, missing Azure AD or Power BI group/workspace membership, reports owned in owner-controlled workspaces, or deleted report-owner accounts creating orphaned reports. Affected systems included the Power BI service, the Self-Service Portal, Azure AD groups, Microsoft 365 licensing, and the Power BI Admin Portal.

Solution

Support used the Company Report Overview and the Power BI Admin Portal to identify report owners, workspace administrators, and whether access depended on owner-controlled permissions or on Azure AD / Power BI group or workspace membership. When access was blocked by missing group/workspace membership, support added users to the required Azure AD or Power BI Premium group so the app or report opened. When users were redirected to a Power BI SignupRedirect URL, support found incorrect Microsoft 365 entitlements (for example an A1 assignment) and restored tenant-appropriate Power BI access by assigning the correct Power BI entitlement. For owner-controlled reports and apps, support confirmed that final access changes had to be carried out by the report or workspace owners via the Power BI 'Send Request' workflow or by workspace owners changing membership/permissions; support informed users who the owners and workspace admins were and escalated unresolved access requests to those owners. When report or app content appeared missing (for example PA Cube not containing course evaluation data), support confirmed data availability with the data steward/subject team (Academic Quality Management) and escalated content gaps to the owning team. For apps managed by separate business units, support directed users to the managing team's service portal when internal forwarding was not possible. When a report owner account had been deleted and created an orphaned report, resolution required workspace-owner or tenant-administrative action to reassign ownership or update workspace membership so access could be granted.

45. Access request for unsupported SaaS (Metabase) routed to owning service desk
91% confidence
Problem Pattern

Users requested access to applications (commonly Metabase instances metabase.iu.org, metabase-dev.iu.org, metabase-non-prod.iu.org, and portals such as IFLM/MyCampus/IU Library) via the IT Service Portal or Self-Service but were unable to obtain access. Symptoms included inability to sign in or view resources, the application not appearing in Self-Service, access requests showing an "awaiting approval" state, or requests being auto-closed. Requests failed because application ownership and provisioning were managed by teams outside first-line IT.

Solution

Support confirmed that access provisioning for affected applications was owned by teams outside first-line IT and could not be granted by the first-line service desk. Metabase access and ownership were handled by the DevOps Core Service Desk (Jira Service Management at careerpartner.atlassian.net/servicedesk/customer/portal/31); requesters were directed to create access requests there. IFLM/MyCampus/IU Library access was handled by Academic Coordination (s.academiccoordination@iu.org). First-line support recorded the correct owning team and routing in incident records before closing tickets. Some access requests exhibited Automation for Jira behavior: Automation had added a CC approver and logged approval status prior to reassignment and, in some cases, auto-closed tickets as “Resolution: Done.” Other redirected tickets were closed with the resolution “Won't Do” when action was redirected to the owning service desk. Users who raised requests through the owning teams’ service desks subsequently completed access provisioning.

46. Okta application not present in dashboard blocking GitLab access
93% confidence
Problem Pattern

Users could not sign in to services via Okta SSO because the application's tile was missing from their Okta dashboard or provisioning API calls returned errors such as "Unknown user." Some accounts appeared unlinked or were blocked (for example after account deletion and recreation), producing partial in‑app failures (e.g., GitLab users listing groups but unable to open group pages) or preventing Okta‑initiated SSO. Provisioning sometimes showed short on‑demand propagation delays (~5–10 minutes), could be held by Jira Service Management approval workflows, and repeated failed logins occasionally produced temporary account locks.

Solution

Agents restored access by verifying the user's Okta application assignment was enabled so the app tile appeared on https://okta.iu.org/ and users launched services from there; enabling the app typically propagated in ~5–10 minutes. Agents unlocked Okta accounts that were blocked (including accounts blocked after deletion/recreation) and enabled Okta SSO for the account. When simply enabling the Okta app did not restore access, agents performed application‑specific provisioning or escalated to DevOps/Core Service Desk or the application owners to link accounts and grant in‑app permissions. Application‑specific actions included creating application accounts and assigning required folder/space permissions (for example Cloudinary), linking GitLab accounts to Okta per IU group guidance, granting Salesforce Marketing Cloud users access to the correct business unit/environment, and adding non‑org‑wide SSO apps (for example HashiCorp Terraform) to Okta using SAML metadata and provisioning users via an Okta group. Agents also cleared temporary account locks caused by repeated failed logins and resolved provisioning held by Jira Service Management approvals by sending approval requests and updating approver assignments so automated approvals could complete. GitLab‑side administrative issues requiring account linkage or repository permissions were escalated to DevOps when app‑owner intervention was required.

47. SSO-linked third‑party SaaS embedded in Salesforce required active Salesforce session for access
90% confidence
Problem Pattern

Users were unable to access a third‑party SaaS (Twilio) embedded in Salesforce: manual login attempts often failed with “wrong email address or wrong password” or produced a Twilio message that browser pop‑ups were blocked. Access attempts using direct Twilio URLs, bookmarks, or outside an active Salesforce session failed, while successful access correlated with launching the resource through the integrated SSO entry point (LMS/“Chihuahua‑Link”) during an active Salesforce session. Affected systems included Twilio, Salesforce (permission sets), and the corporate SSO (Okta).

Solution

Support confirmed the user possessed the required Okta/SSO permission and the Salesforce permission set, and that First‑Login and account creation via the LMS/Salesforce had been completed. Support observed that manual Twilio sign‑in produced a “wrong email address or wrong password” error, that the user was sometimes using an incorrect/favorited direct Twilio link or bookmark, and that Twilio reported browser pop‑ups were blocked. The issue was resolved by ensuring the user accessed Twilio from the corporate SSO entry point (LMS/“Chihuahua‑Link”) while an active Salesforce session/tab remained open so Twilio could inherit the Salesforce authentication context, by removing/updating direct Twilio bookmarks, and by allowing pop‑ups for Twilio. After these actions the user was able to access Twilio. Live troubleshooting/escalation via Teams was offered if access still failed.

48. Salesforce account provisioning and Okta dashboard tile addition using a reference user
92% confidence
Problem Pattern

Users reported inability to access applications: Okta application tile was absent, SSO sign-in failed or 'forgot password' reset was unavailable, activation/activation email was missing, telephony extension/number was absent, or requests remained pending approval. Problems affected Salesforce, Okta-managed SSO apps, telephony/UC providers, and license-managed apps. Requests frequently referenced an existing user whose missing or incorrect attributes (for example group memberships, Vonage skills, or an incorrect username/email) caused incomplete or failed provisioning.

Solution

Support verified and corrected user identity attributes (including typos in username or email) or updated/created the supplied reference user when attributes were missing or incorrect. Administrators created or updated the account in the target system and provisioned the identified permissions (groups, skills, licenses). For SSO-enabled apps they granted the Okta application assignment and added the app tile to the user’s Okta dashboard; when immediate sign-in failed they re-applied or reconfigured the Okta assignment and allowed time for provisioning to propagate (propagation completed within minutes in some cases or resolved by the next day). For license-managed apps (for example Deskbird) support granted the license and confirmed the user received the activation email. For telephony/UC apps (Vonage/NewVoiceMedia) administrators created the provider user record, assigned the extension/number, recorded the provider user ID (for example a Vonage-ID) in Salesforce, and sent the activation email. When organizational approval workflows required requester confirmation, support triggered the confirmation/activation email (often via Jira automation) and completed provisioning after confirmation. Tickets were closed after users confirmed access.

49. Confluence space admin access requests, accidental submissions and license guidance
92% confidence
Problem Pattern

Users were unable to view or edit Confluence spaces or pages, reporting 'Access denied', 'Account locked', pages appearing locked/read-only, or no response after clicking 'Request access'. Affected systems included Atlassian Confluence and Automation for Jira (access-request queues); reports sometimes omitted page links or owner details. Common triggers included incorrect or missing IdP group membership or mappings (Okta/Azure AD), insufficient Confluence account-level licenses or restrictive group assignments (for example 'Confluence Guest' vs full-access membership), space- or page-level ownership restrictions, and transient SSO/session authentication states. Requests occasionally remained pending in Automation for Jira or required owner approval.

Solution

Support verified the user's Confluence account state, license, and identity-provider (Okta/Azure AD) group membership and mappings. When users were assigned to restrictive groups (for example 'Confluence Guest') they were moved to the appropriate full-access group and/or granted a Confluence license; this restored editing rights immediately in several incidents, while some license or permission changes required up to 48 hours to propagate. Missing or incorrect IdP group mappings were corrected and affected users were provisioned into the proper groups (for example Azure AD groups used for Confluence access). Transient SSO/session issues were resolved by re-login or browser/session refreshes. Automation for Jira access-request queues were reviewed where present; accidental or duplicate requests were rejected and requests requiring space- or page-owner authority were escalated to or approved by the owner or specialist team. When spaces were missing from admin listings, staff located the space, reassigned ownership and permissions, and confirmed corresponding IdP group mappings. Page-level permission issues were escalated to the page owner or last editor and resolved when the owner updated page permissions. Requests for additional Confluence licenses and Exchange/Office 365 shared-mailbox access were handled via the Service Portal with provisioning tracked in Jira/Jira Service Management.

50. myCampus area access blocked by missing area-specific roles requiring escalation and synchronization
91% confidence
Problem Pattern

Users with valid myCampus/myStudium accounts experienced application‑specific access failures: after password resets some services (e.g., Microsoft365) worked but myCampus and other applications (Atlassian/Jira/Service Portal) returned HTTP 403 'Zugriff verweigert' or displayed missing area‑specific UI and functionality (Anmelden als/impersonation, tutor/unit UI, dashboard action buttons, lecturer controls, Care iFrame, personal lecture schedules). Course enrollments or room/course visibility sometimes failed to propagate from Course Management or differed between internal and external identity contexts. Symptoms were frequently associated with alternate usernames, wrong login portals, incorrect approver/ticket routing or empty application fields on access requests, and application‑specific provisioning, SSO/mapping or synchronization faults.

Solution

Support investigated affected accounts by comparing them to working reference profiles and realigned area‑specific role assignments and group memberships. Missing roles (for example myCampus dashboard roles, EPOS Lecturer, myCampus admin/impersonation role required for “Anmelden als”, Key User) were granted and incorrect assignments (for example Employee/AUTOR used instead of Lecturer) were replaced; these corrections restored missing UI elements, impersonation, tutor/unit functionality, instructor enrollment/un‑enrollment, dashboard action buttons and News posting in multiple cases. Where access requests had empty Application fields or incorrect approvers, support corrected the request records, fixed approver assignments and—when appropriate—forwarded the request to the responsible onCampus Service Team or another specialist queue; in one case the onCampus team performed role/permission adjustments to grant Key User access. Accounts provisioned under alternate usernames or routed to the wrong login portal produced credential/provisioning mismatches; support resolved those mismatches so users could set passwords and authenticate, after which role corrections produced the expected UI. Tickets reporting HTTP 403 'Zugriff verweigert' after successful password resets were investigated as application‑specific provisioning or SSO/mapping inconsistencies; aligning application provisioning and role mappings restored access. Cases where components (DS Competency, EPOS, Infocenter, CARE) did not recognize instructor status or where course enrollments did not appear in myCampus were escalated to specialist teams; specialists corrected role mappings, remedied provisioning/synchronization and logging faults, and allowed role visibility to propagate (sometimes requiring overnight synchronization). Media and Learning Hub issues involving "kein Video MIME Typ" or upload failures were routed to media/learning‑hub and platform specialists for investigation of MIME metadata/streaming headers and storage handling. Device‑specific or mail/calendar client problems reported alongside some tickets were handled by device/email support and did not result from account role or provisioning changes. Where remaining UI differences reflected expected permission boundaries, support explained the behavior to users.

51. Access requests for analytics/dev platforms requiring platform‑owner provisioning
91% confidence
Problem Pattern

Users requested access to analytics, developer, monitoring, project, or infrastructure platforms (examples: Metabase, Redshift, BigQuery, GitLab, Omni, Sonar/SonarCloud, dbt Cloud, SharePoint, TFS, MongoDB UI, QuickSight, AWS accounts, JFrog, vSphere). Reported symptoms included access‑denied pages, failed logins, missing permissions, inability to open dashboards/projects or run platform‑specific actions, or inability to find how to request access when the platform was missing from the software catalog or lacked an Okta/Entra provisioning group. Requests often referenced resources with unclear platform, project, or approver ownership, leaving requesters unsure who controlled provisioning.

Solution

Support identified the owning team or approver and routed permission requests to that owner when central IT lacked direct provisioning rights. Platform specialists performed provisioning for systems they owned; when a platform was not in the software catalog or lacked an Okta/Entra group, specialists either enabled access outside the catalog or assigned platform entitlements directly. When ownership or approver was unclear or cross‑team, requests were routed to DevOps/platform/product specialists or forwarded via the Atlassian service desk to the appropriate owning team. Notable platform resolutions included: • Metabase — platform specialists handled create‑collection and CSV/XLSX export permissions; some dataset export actions required dataset‑owner approval. • dbt Cloud — the Data Platform/DWH team granted evaluation access by assigning dbt Cloud entitlements via the identity provider to a limited set of users. • Sonar/SonarCloud — DevOps processed requests via the DevOps Core Service Desk and granted project access. • Omni — view/read access and platform entitlements were enabled directly when the platform lacked an Okta/Entra group. • SharePoint — restricted access was granted when possible, site‑specific access‑form links were provided when present, and SharePoint site owners were identified for full site or dataset permissions. • TFS — support verified membership and noted when project or board owners had to assign required permissions. • AWS accounts — support determined Infra vs DevOps ownership, forwarded requests to the relevant specialist team, and used Microsoft MyAccess where applicable to grant account access. • Datadog — approvers and approval routing were updated so the platform could grant access. • QuickSight — requests were submitted through the DevOps Portal and account/dashboard access was granted. • MongoDB UI (external users) — prior Company Portal guidance was corrected and the request was routed to the DevOps Core Service Desk and processed through Jira approval automation. • JFrog — identified as a developer tool supported by DevOps and referred to DevOps owners for account provisioning. • vSphere/VMware — access was granted in the vSphere environment by the platform owner/admin and the user was notified. These actions resolved requests where provisioning required platform‑owner intervention or non‑catalog entitlement assignment.

52. Confluence account creation and basic access provisioning
95% confidence
Problem Pattern

Users reported lack of access to internal Atlassian and analytics applications (Confluence, Jira, Metabase, Index Searcher). Symptoms included failed logins or generic “access denied” messages, missing accounts or missing product licenses/entitlements, inability to open specific Confluence pages or spaces after successful SSO, and requests that referenced Okta entitlements, Workday employee IDs, or email distribution lists for access.

Solution

Access issues were resolved by application owners or administrators provisioning accounts, assigning product licenses/entitlements, and granting required permissions. For Atlassian Cloud, administrators provisioned accounts and assigned Confluence and Jira licenses either in the Atlassian admin console or by assigning entitlements in Okta; license/entitlement assignments commonly activated access within minutes though recipients occasionally experienced short propagation delays. Space- or project/board-level permissions and Confluence page invitations were granted by space admins or page creators when needed; some pages remained inaccessible until an explicit page-level permission or invitation was added. Support verified existing accounts when requests referenced Workday employee IDs and created or activated access for users who lacked accounts. Attempts to grant access to an email distribution list (for example legal@iu.org) were not supported; access was granted to individual user accounts or supported group objects instead. Metabase access was granted by the application owner on request. Index Searcher (index.de) access was provisioned after submission of the official SharePoint access-request form on the IUBHFS site. Activation timelines ranged from minutes for entitlement/license assignments to the next business day for some request workflows; support confirmed access after provisioning.

53. Jira access missing due to absent Jira product license; project permissions remained separate
91% confidence
Problem Pattern

Users could not access Jira, Jira Service Management (Jira‑SM), or Confluence at the product level: product pages failed to load or Okta sign-in attempts failed (passwords rejected or password‑reset flows failing), often without clear error messages. Service projects, boards, and Confluence spaces retained their project-/board-/space-level permissions but were inaccessible because product-level access was blocked. Affected systems included Jira, Jira‑SM, and Confluence.

Solution

Affected accounts were missing the required product entitlement/license in the identity provider (commonly Okta). Assigning the appropriate product entitlement (for example, 'Jira', 'Jira‑SM', or 'Confluence') to the user account restored product-level access after directory/IdP propagation (typically within 5–10 minutes). In several cases a user’s regular password or password-reset flow had failed until the entitlement was applied; after the license assignment the user signed in via the identity provider dashboard and product access was restored. Clearing the browser cache or stale sessions was used when cached credentials interfered with login. Project-, board-, and Confluence-space permissions were not changed by the entitlement assignment and continued to require grants from the respective project, board, or space owners. Requests for applications not managed by IT (for example, Freshdesk) were redirected to the responsible team (HR/WD‑Support, wd-support@iu.org).

54. Access request auto-closed after approval workflow timeout
95% confidence
Problem Pattern

Access or license requests submitted via the intranet/Software Catalog or Jira Service Management remained in 'Waiting for approval' and were automatically transitioned to Declined/Done by Automation for Jira after the configured approval window elapsed (commonly 14 days). Automation for Jira appended messages such as 'declined automatically (14 not approved or approver no longer available)' or 'your ticket was not approved ... and will be closed automatically now.' Because approvers sometimes only commented instead of using Jira's formal approval control—or because requests were routed to the wrong cost-center/manager—formal approval never completed, so provisioning did not occur and closed tickets could not be reopened. Affected services included application and license provisioning workflows (examples: Confluence, Jira, Lucidchart, Mentimeter, Claude AI, OpenAI ChatGPT, Storyblok), and users sometimes observed application-specific login failures (for example: 'Login failed. The login token may have expired.').

Solution

Requests submitted via the intranet/Software Catalog or Jira Service Management remained in 'Waiting for approval' while Automation for Jira sent automated reminders. Designated approvers sometimes only commented rather than using Jira's formal approval control, so the configured approval window (commonly 14 days) elapsed without a formal approval. Automation for Jira then automatically transitioned and closed those requests—commonly marking them Declined or Done—and appended messages such as 'declined automatically (14 not approved or approver no longer available)' or 'your ticket was not approved ... and will be closed automatically now.' Target-application provisioning did not occur because the formal approval action was never completed, and Automation for Jira–closed tickets could not be reopened. Incidents were resolved when one of two outcomes occurred: the designated approver completed Jira's formal approval within the configured approval window, or the requester submitted a new access request that routed to the correct cost-center/manager approver. In one observed case (Storyblok), no backend provisioning errors were found; the user saw a token-expiration-style login failure and access was restored only after the access request was resubmitted selecting the user's own cost center so the correct approver could approve.

55. Policy‑gated SaaS provisioning requiring training enrollment (ChatGPT/GPT‑4)
90% confidence
Problem Pattern

Access requests for applications (for example AI SaaS such as ChatGPT/GPT‑4 and internal systems such as the Prüfungswesen) were denied or remained pending because organizational prerequisites or role‑based exclusions were enforced. Symptoms included absent or 'pending' accounts and entitlements, no explicit error messages, limited notification when automated provisioning occurred, and tickets being held for approval or auto‑closed after no response. Triggers included required enrollment in IU Learning Hub learning paths, automated provisioning workflows, and explicit leadership approval for role‑conflicted users (employees who were also students).

Solution

Access requests were withheld or denied when organizational prerequisites, role‑based exclusions, or separate provisioning workflows were required. For OpenAI/ChatGPT, independent ChatGPT/GPT‑4 accounts were not issued; cooperative OpenAI accounts were provisioned only after users were enrolled in designated IU Learning Hub learning paths (for example the generative AI in teaching path and the 'Master of Prompts' path). For Copilot for M365, support verified that users held an appropriate base license (for example M365 A5), enrolled users in the 'Copilot for M365 Essentials' self‑learning course in the IU Learning Hub, and then moved requests into the Copilot provisioning workflow or performed Azure AD/application assignment when necessary. Copilot licenses were configured to assign automatically once the course status reached 'completed'; license and feature propagation across M365 apps could take up to 72 hours and assignments were not always accompanied by separate notifications. Some employee groups (for example IU Internationale Hochschule GmbH) were excluded from the Copilot rollout and GDPR/terms‑of‑use restrictions (users were instructed not to include GDPR‑sensitive data in prompt context) were communicated. For internal systems such as the Prüfungswesen, support refused permission grants when policy prohibited employee‑students from receiving examination‑system access without explicit Hochschulleitung approval; the workflow showed approvals pending, support recorded the leadership‑approval requirement, and tickets were auto‑closed after 14 days of no reply. Ticket and provisioning workflows used tools such as Atlassian Automation for Jira and Azure AD application assignment; support staff initiated learning‑path enrollments, triggered provisioning automations, and performed manual assignments as appropriate.

56. Application access owned by a non‑IT team requiring request redirection
95% confidence
Problem Pattern

Users could not access internal or third‑party applications when account creation, role or license assignment, approver workflows, group/vault/channel membership, SSO/app entitlements or other entitlement changes were controlled by non‑IT teams or external providers. Reported symptoms included failed sign‑ins, inability to register or create accounts, missing or inactive usernames, absent roles or paid licenses, approver workflows stuck awaiting owner action, missing provisioning or password‑reset emails, failed third‑party sends, lack of in‑app permissions despite an account, or UI options missing for specific subsystems (for example an absent "Share" button on certain ticket types). Affected systems included web apps, intranet/SharePoint, developer/DevOps tools, ticketing subsystems, marketplace/library subscriptions, cloud data platforms and exam archives.

Solution

Support triaged incoming access requests, identified when provisioning, licensing, approver workflows, SSO/app entitlements or other entitlement changes were owned by non‑IT teams or external providers, and recorded the owning team/provider and their contact channel (email, portal, Teams channel or service board). Tickets captured any interim IT corrections performed (for example fixing an approver, enabling an SSO/app entitlement, or correcting a username) and attached automation or Jira evidence where available to indicate outstanding owner tasks. Resolutions were recorded as either owner‑side fulfilment or documented redirection to the owner’s support channel; tickets were closed after owner fulfilment or after recording the owner’s pending actions or the requester’s redirection outcome. When support could only create an account but could not manage in‑app permissions or UI controls, support informed the requester, recorded that limitation, and closed the ticket. Representative outcomes included: owner‑managed access‑request forms or portals (for example Unternehmensportal requests redirected to the IU Meldeportal), Workday cases routed to Workday or project leads, DevOps tool requests routed to the DevOps/Core Service Desk or repository owners after approver corrections, cloud data platform requests redirected to the DataAnalysts team with notes about Azure App Registration dependencies, marketplace/library subscription requests routed to library contacts, and specialist fulfilment such as Twilio role changes forwarded to the specialist team and applied with an effective date. Tickets were also closed as "wont‑do" where access was entirely owner‑controlled (for example DKIM/domain requirements preventing third‑party sends). Tickets consistently recorded owner contact details, interim IT actions, attached evidence of owner fulfilment or pending owner actions, and the final redirection or owner‑fulfilment outcome. In cases of platform‑subsystem ownership, support sometimes noted they lacked access to a subsystem (for example a Real‑Estate ticketing subsystem where the "Share +" option was missing for a user) and recorded attempted workarounds (such as @‑mentions) that did not grant access.

57. Jira board access blocked by missing product license and pending approval
90% confidence
Problem Pattern

Users reported inability to open Jira migration boards on Atlassian Cloud; the board UI showed either access denied or an outstanding Automation for Jira approval pending for product access. Affected systems were Atlassian Jira (cloud) and the Automation for Jira approval workflow. No specific error codes were provided; users reported they could not view required migration boards for audit or migration tasks.

Solution

Product access issues were resolved by approving and assigning the appropriate Jira/Atlassian license via the Automation for Jira approval workflow. When the primary approver was unavailable, a temporary approver substitution was requested and the substitute approver granted the access so the automation completed. After the license assignment, users were advised to sign in through the Okta Dashboard to access the Atlassian site. In cases where the board page still showed access denied after license assignment, support confirmed that board-level permissions were controlled by the board owner and the user was instructed to contact the board owner to obtain owner-assigned board access.

Source Tickets (3)
58. Adobe Sign SSO access pending invitations and service-mailbox restrictions
90% confidence
Problem Pattern

Users were unable to access Adobe Sign/Acrobat/Creative Cloud via SSO or browser. Symptoms included missing or delayed Adobe activation/invitation emails, explicit "Access Denied" messages, browser prompts for an Adobe password instead of SSO, or an error stating the e-signature service "is not included in my package." Some users reported they could not sign in despite having licenses because Okta SSO had not yet been established for their Adobe account.

Solution

Access issues were resolved by provisioning the user's Adobe account and/or assigning Adobe Sign/Acrobat entitlements; after provisioning the identity provider sent activation/invitation emails or SSO access began working, typically within the provider's delivery window (roughly 30 minutes to later the same day). Users who attempted SSO before provisioning saw "Access Denied" or were prompted for an Adobe password they did not have, and users without the Adobe Sign entitlement received an error stating the e-signature service "is not included in my package." Requests that named service-mailbox addresses were rejected and were not provisioned. In cases where Okta SSO had not yet been established but licenses were already present, access was achieved by installing Adobe Creative Cloud via the Company Portal and signing in with the IU email/password; support also noted unrelated Adobe notification emails could be ignored.

59. Miro team membership, license and admin-rights blocking board creation and internal-board access
91% confidence
Problem Pattern

Users could not create, open, or edit Miro boards because they lacked a Miro license, membership in the IU Miro team, or required board-level permissions. Symptoms included inability to create new boards, inability to open or edit internal/business boards, boards that were visible but had editing controls disabled with no error, or inability to access Miro standard templates. Affected systems included Miro (including Education and Enterprise accounts) and IU’s Okta provisioning (okta.iu.org Miro tile).

Solution

Support verified each affected user’s Miro provisioning state (including the Okta Miro tile) and corrected entitlement and permission mismatches. Actions taken included enabling the user’s Okta Miro access, assigning the appropriate Miro license (Full/Enterprise or the corresponding Education license when relevant), adding users to the correct IU Miro team/group, and granting board-level edit permissions or extended Miro admin scope where required. In cases where a user could view a board but not edit it, support either provisioned a Full-License (or Education administrative license) via the New Software request flow or had the board owner grant edit rights; access to create boards and to use standard templates only became available after the license/permission change propagated. License and permission changes typically propagated within 5–30 minutes (commonly 5–10 minutes), after which users were able to create, edit, and access internal/public boards and templates.

60. Enterprise SaaS access provisioning after approver approval and license assignment (Miro)
91% confidence
Problem Pattern

Access requests for Miro were stuck in the Automation for Jira application-request approval workflow; automation logs commonly showed 'approver awaiting action' or 'approval reminder suspended'. Affected users reported no account or missing workspace edit/write permissions and the Miro Okta/application tile did not show access. Triggers included approvals stuck in the automation flow, incorrect approver mapping, missing approver or cost-center information, and absence of an enterprise/full licence.

Solution

Access issues were resolved by addressing either the approval workflow or licence/application provisioning. When automation logs showed an approver awaiting action or messages such as 'approval reminder suspended', support either contacted the approver (the approver retried the approval and the workflow completed, granting edit access) or asked the requester to resubmit the access request with required fields (for example, cost-center and designated approver), which allowed the automation to proceed. Other cases were resolved by correcting approver-assignment misconfigurations in the Automation for Jira application-request workflow. Where users lacked an enterprise licence, administrators provisioned a MIRO Full Version (Enterprise) licence and enabled the Miro Okta application for the account; provisioning typically propagated in about 5–10 minutes and the Okta SSO tile then reflected workspace access and edit/write permissions. Licence-choice discussions were documented: support confirmed whether a restricted/free licence sufficed or a paid full licence was required (the full paid licence was noted at €110/year), and for some users support recommended the free/Education version instead and closed the request as 'Won't Do' when appropriate. Requesters confirmed successful logins after licence assignment or after switching to the free/Education option.

61. Access requests blocked by product being in pilot/internal test (Copilot)
90% confidence
Problem Pattern

Users requesting Microsoft Copilot variants experienced failed or stalled provisioning or inability to access Copilot resources when the product was in pilot/internal test or the requesting account was ineligible. Reported symptoms included requests stuck in pending/approval-pending, instant license declines, 'Not found' errors or forms redirecting to organisational pages, absent approvers blocking approvals, and inability to access pilot-only SharePoint LMS modules or training content. Affected systems included copilot.microsoft.com / Bing Chat Enterprise, Copilot for Microsoft 365, SharePoint LMS pages, Application Self Service and Jira Service Management request forms. Some requests were also ambiguous about which Copilot product the user required.

Solution

Investigations established whether provisioning failures were caused by product availability (pilot/preview), account eligibility, approval workflow gaps, ambiguous product selection, or training-enrolment restrictions. Actions and outcomes included:

• When a Copilot variant was in an internal test or controlled pilot, affected users were either added to the preview/test user group when preview access was permitted, or informed that access was restricted to a predefined tester cohort; activation from Microsoft was recorded as taking up to 48 hours and some rollouts were run as controlled pilots of roughly two months with very limited licenses.

• SharePoint LMS/training modules for Copilot had explicit enrolment controls: course pages were only active for users who had been pre-registered for the MS Copilot license (the flight‑crew/test group in this case) and the support team recorded that completion of the required course was a prerequisite for using the associated Copilot license. Affected users were informed of the pre-enrolment and course-completion requirement.

• Where provisioning immediately failed or request endpoints returned “Not found,” investigations identified ineligible accounts (for example external accounts or specific organisational assignments), missing works‑council approvals, or other licensing restrictions; affected requestors were informed which restriction applied and why a form might redirect to an organisational page.

• Requestors were informed that personal acceptance of Microsoft’s Copilot terms of use was required, that some organisational contracts did not cover Copilot licenses, and that Copilot must not be used with GDPR‑relevant data.

• Requests that remained in pending/approval‑pending because approvers were absent or the product was unavailable were left in that state while IT communicated pilot windows, changes in availability, and approver coverage via the corporate intranet/SharePoint and Teams.

• Where users submitted ambiguous requests that did not specify which Copilot product they needed, IT clarified the distinction between the Copilot chatbot (copilot.microsoft.com / Bing Chat Enterprise) and Copilot for Microsoft 365 and routed or advised users to the correct request path or form in the Application Self Service / IT Service Portal.

• As interim options when Copilot for M365 licenses were unavailable, requestors were offered accessible alternatives such as the Copilot chatbot and the Guided Conversation Designer, and were advised to monitor the intranet and Teams for pilot progress updates.

62. Provisioning blocked by vendor license shortage; re-triggered by toggling Okta group membership after license procurement
95% confidence
Problem Pattern

Okta produced an error/notification when assigning a user to an application group because no vendor licenses were available, which prevented the target application from provisioning access. Symptoms included failed group-assignment attempts and lack of final provisioning for the affected application. Affected systems: Okta, NordLayer (VPN) and similar vendor-licensed SaaS.

Solution

Additional vendor licenses were procured and added to the tenant, and provisioning was then retriggered by removing the user from the Okta application group and re-adding them (re-assigning group membership). After the license count increased and the group membership was toggled, the application successfully provisioned access for the user.

Source Tickets (1)
63. SAML/SSO workspace‑booking app access requests (Deskbird) for campus presence
95% confidence
Problem Pattern

Users were unable to access the SAML/SSO‑protected Deskbird workspace/desk‑booking app or book location resources. Reported symptoms included a missing Deskbird tile in the Okta/Azure AD dashboard or self‑service catalog; an error stating “This application is not assigned” / “Anwendung nicht zugewiesen”; provisioning errors such as “not provisioned” or “user not created”; a pre‑auth “Error Checking email” dialog; failed sign‑in at app.deskbird.com; or successful authentication but no booking capability because Workday/Okta group memberships, location/role entitlements, or local resource permissions had not synced. Incidents commonly followed email address changes, onboarding, role/location updates, or vendor‑side account deactivation.

Solution

Access issues were resolved by restoring the Deskbird entitlement in the organization’s IdP (Okta or Azure AD) or by adding the user to the Deskbird access group (for example IU-ZZ-OK-ASS-Deskbird-All-Access). Where provisioning was blocked by pending approvals, clearing those workflows unblocked provisioning; SSO assignments and provisioning typically propagated in about 5–10 minutes and restored the expected SSO flow. Some cases required assigning a location‑specific role entitlement in addition to the app/group assignment (for example the “AL” role for Berlin) before booking capability returned. Vendor‑side account deactivations required Deskbird administrators to reactivate vendor accounts or restore internal roles because central identity support lacked vendor admin privileges. Sign‑in failures after an email change were restored by triggering the IdP flow (for example signing in via the IdP dashboard or using an IdP redirect from the Deskbird sign‑in page); normal provisioning and tile visibility returned once IdP assignments/approvals propagated. In several incidents the application assignment itself was handled via Application Self Service and automated workflows: Jira automation and Atlassian API calls were used to CC approvers and assign the Deskbird application to users. When other SaaS were affected, affected users were launched via the IdP/intranet or given IT‑triggered password resets with time‑limited links (~24 hours). Support also observed intermittent browser compatibility problems affecting Deskbird; in some deployments integrating Deskbird into Microsoft Teams improved access and experience. Requests sometimes coincided with local device or resource permission gaps (for example access to the “Zeugnisdrucker” printer); in those cases administrators mirrored an existing user’s device/permission configuration so users could complete tasks like printing after Deskbird access was restored. Users were notified after assignments, approvals, or vendor restorations and confirmed access.

64. Dataverse / Power Apps: inability to create Dataverse tables due to missing environment permissions/licenses
95% confidence
Problem Pattern

Several users were unable to create Dataverse tables in the Personal Productivity Power Apps environment. The symptom was lack of Dataverse creation permissions (no specific error codes provided) preventing automation work; five named accounts were affected and could not proceed until Dataverse access/entitlements were granted.

Solution

The five users were added to the relevant access/security group that carried Dataverse permissions for the Personal Productivity environment. Once group membership propagated the users were able to create Dataverse tables and proceed with their feedback‑management automation.

Source Tickets (1)
65. Miro access failures caused by Okta SSO sessions, locked app state or license-seat mismatches
90% confidence
Problem Pattern

Users could not access Miro Enterprise via Okta, experiencing SSO sign-in failures, generic/unspecified authentication errors, or an "access is locked" message while the Miro app appeared locked/blocked in Okta. Some users were routed to a free/personal Miro account or lacked an assigned enterprise seat, or they had board-level read/comment permissions instead of edit/collaborate. Symptoms commonly occurred after email changes or during license/group provisioning and sometimes persisted briefly while assignments propagated.

Solution

Access was restored by unlocking/enabling the Miro Enterprise application in Okta or by unblocking/reactivating the user’s Miro account tied to the current email address. Where applicable users were given appropriate seats: staff received paid/licensed seats and other users were assigned a Free Miro license via the Okta Self Service portal. In several cases automated provisioning or manager-approval flows did not complete, so application owners granted access or seats manually. Board-level permissions that were limited to read/comment were updated to edit/collaborate when required. Affected users signed in through corporate Okta SSO and were informed that license and permission changes typically propagated after a short delay and that self-assignment was available through the Okta Self Service portal.

66. Approval workflow links in Automation for Jira were unclickable, causing pending provisioning
80% confidence
Problem Pattern

Approval requests routed via Automation for Jira could not be completed because approvers reported that the approval links were unclickable or non-responsive. As a result, provisioning requests remained in a pending state and users could not sign in or be provisioned until the approval step completed.

Solution

Support recreated or rerouted the request and, where the approval link remained unusable, changed the designated approver or had the application owner manually granted access to the requester. The manual approver change and direct permission assignment cleared the pending state and allowed the users to sign in and access the requested applications.

Source Tickets (2)
67. External lecturer Okta password/authentication blocking Atlassian access
90% confidence
Problem Pattern

External or guest lecturer could not sign in to Atlassian via Okta; authentication attempts failed for external email addresses and the symptom set pointed to a password or Okta-authentication problem rather than an application-side permission issue.

Solution

Support issued an Okta password-reset email to the lecturer; the lecturer used the reset link to set a new Okta password and Atlassian access was restored.

Source Tickets (2)
68. Power Apps 'Präferenzabfrage' entry locked or inactive requiring app-team reset
90% confidence
Problem Pattern

Instructors or external lecturers could not open or edit their entry in the Power Apps "Präferenzabfrage" / Preference Survey. Symptoms included explicit messages such as "request access" or "not recognized as instructor", or generic edit/access errors across browsers. The issue involved the app failing to recognize the user’s instructor status or the survey entry being locked/inactive, sometimes after prolonged account inactivity.

Solution

Two distinct remediation patterns resolved these incidents. When the survey entry or app-level record was locked or inactive, the Präferenzabfrage application team reset the user’s survey entry and reactivated the record, after which the lecturer could edit the survey. In cases where the app did not recognize the user as an instructor due to account inactivity or authentication issues, Okta and myCampus password resets were processed; following the resets the user regained access. Tickets also noted browser/account selection details: the Preference Survey was accessed in Microsoft Edge and the IU Microsoft account needed to be selected for the app to recognize the instructor account.

Source Tickets (2)
69. SSO login succeeded but missing product license or feature permission blocked full app functionality
90% confidence
Problem Pattern

Users authenticated successfully via SSO or vendor identity but could not access expected application functionality because they lacked vendor-side product licenses or feature permissions. Symptoms included disabled or missing UI elements, absent feature links, reduced account tiers, different UI/views than colleagues, or inability to perform application-specific actions (for example: inability to edit Lucidchart diagrams, missing Copilot Designer/DALL‑E, restricted Miro features, or inability to send Adobe Sign MegaSign). The condition occurred despite successful login and was commonly observed alongside vendor-side assignment, provisioning, or synchronization delays (typically minutes up to ~48 hours).

Solution

Access failures were resolved by ensuring vendor-side product licenses and feature permission sets were assigned and that provisioning/sync processes reflected those assignments. Examples: a Miro user was added to the Miro application in Okta and their account was upgraded from a free/restricted to a Full (Enterprise) license so they could create and manage shared boards; Adobe Sign users were granted Adobe Sign licenses and MegaSign/bulk-send permissions and, after license assignment, were advised to install Adobe applications via Adobe Creative Cloud from the company portal; a Bing Copilot user's Designer permission was re-added by support and the Designer view became available via a direct feature link. For Lucid Suite, an approval workflow was created, approvers were notified, and the Atlassian API/user-assignment was used to assign the Lucid Suite application so the user could edit Lucidchart diagrams. Support observed that assignment/activation emails, approval workflows, and permission propagation times varied by vendor (from minutes up to ~48 hours); automation and Jira logs recorded approval and provisioning activity. When vendor landing pages did not expose direct shortcuts to features, direct feature URLs were used as temporary workarounds.

70. Jira project invitation redirected to service portal due to missing project assignment or project-level release
86% confidence
Problem Pattern

Clicking a Jira project/board link or signing into Atlassian sometimes opened the Atlassian home page, the IT Service Portal/Service Center start page, or a generic portal page instead of the intended project/board. Confluence links sometimes redirected to the portal or returned “Page not found” when Confluence space permissions were missing. SSO sign-on occasionally granted portal-level access only (listing boards) rather than product- or project-level access; users sometimes saw no explicit error messages.

Solution

Access failures were resolved by restoring missing product- and object-level permissions and ensuring accounts were active and provisioned. Resolutions included reactivating disabled Atlassian/Jira accounts, granting Jira product license access plus explicit project- or board-level permissions, and adding required Confluence space permissions. Several incidents required time for account provisioning to propagate before links worked. Okta/SSO sign-on did not confer product or project access when those permissions were absent; after permissions were applied users were able to open intended projects/boards. In one case a project-level release/setting was verified by the product owner. In some cases clearing Atlassian-related browser cookies and accessing Jira from the Okta portal were performed and coincided with restored board access. After these changes affected links loaded the intended project/board/pages and requesters confirmed access.

71. Requests for licenses or access where Enterprise SSO / Okta already provided the app
90% confidence
Problem Pattern

Users reported inability to access Okta/Enterprise SSO–managed SaaS (examples: Atlassian/Jira, Figma, Mentimeter, Egencia) often without explicit error messages. Symptoms included the app not appearing outside the Okta dashboard or in Office 365/Azure AD app lists, being redirected to unexpected login pages or documentation links that did not reach Okta, and inability to launch or provision the account. Affected systems included Okta/Enterprise SSO, associated service portals, and internal how‑to documentation (SharePoint).

Solution

Access requests were resolved by confirming the application was available through the organisation's Okta/Enterprise SSO and verifying it appeared in the user's Okta dashboard. Agents confirmed users could sign in to okta. and then launched the app from the Okta portal; this restored access without additional license provisioning. When documentation or SharePoint how‑tos pointed to non‑Okta entry screens or users attempted Office 365/Azure AD sign‑in (which did not list Okta‑managed apps), agents located the correct Okta application for the user and confirmed successful sign‑in and launch (for example, users located Atlassian/Jira in Okta and signed in). For apps that required an initial internal setup, agents supplied the application‑specific account creation resource (for example, the Egencia Account Creation SharePoint page). Tickets were closed after users acknowledged they could access or launch the application.

72. Applications requiring Self‑Service assignment before content or Okta tile becomes available
91% confidence
Problem Pattern

Users were unable to access specific SaaS applications or locate their portal navigation entries. Symptoms included missing or hidden Okta dashboard tiles, missing top‑navigation links (for example, Learning Hub), 'restricted content' messages when opening application pages, authentication/sign‑in failures for apps that appeared in Okta, and access requests remaining pending approval. Affected systems included Confluence, Deskbird, Miro Enterprise, CARE (academyFIVE), TheyDo, Mentimeter, IU Shop, EPOS, Microsoft Office apps, Learning Hub and other SSO‑integrated services.

Solution

Access failures were resolved by restoring or reprovisioning application assignments, completing app‑specific approval flows, or adjusting user permissions. When an Okta application was assigned but not visible, technicians enabled the application in the user's Okta account via Application Self‑Service which restored the dashboard tile and sign‑in. When accounts or licenses had not been created after SSO migrations or applications were unassigned, provisioning or reassigning the app through the organisation's Self‑Service/IT Service Portal and finishing the app‑specific approval workflow reprovisioned entitlements and restored access. In several cases an administrator added the application at the organisation level and users completed an app onboarding step (for example, Confluence onboarding that granted access to TheyDo), which resolved authentication failures. For portal navigation issues (for example, a Learning Hub link missing from the top bar), an administrator adjusted the user's permissions/access rights which restored the navigation item; in that case clearing browser cookies did not resolve the issue. Users were informed that application assignments and permission changes commonly required approval before accounts or licenses were provisioned.

73. Access requests stalled by approval/invitation workflows and Automation for Jira closures
87% confidence
Problem Pattern

Access requests stalled in approval or invitation workflows, leaving requests in a 'waiting for approval' state or preventing users from completing emailed invites. Trigger points included direct app links, tenant app launches, and Jira Automation approval workflows. Impacted systems included Okta group‑based provisioning, Atlassian‑managed applications, email invite flows, and application license requests (for example dashboard access). Symptoms included in‑app "Request access" prompts, missing or delayed invitation emails, delayed or absent group‑based license or assignment propagation, and cases where provisioning only occurred after an application owner completed post‑approval configuration.

Solution

Pending access failures were resolved by advancing stalled approvals, correcting approver configurations in Jira Automation so queued requests moved forward, and reissuing outstanding invitations when acceptance had not completed. Invitation deliveries were confirmed in users' mailboxes and invites were resent when acceptance had not completed profile linkage; provisioning was confirmed only after invite acceptance. Okta group membership and group‑based provisioning were verified; where propagation lagged or assignments were absent, licenses or assignments were applied manually. Provider APIs were used to assign applications when the normal flow did not complete (for example Atlassian API assignments for Atlassian‑managed apps and for an observed Qualtrics dashboard license assignment). In cases where applications required owner action after approval (for example CARE), administrators completed location and permission assignments to finalize provisioning. In contract‑linked or portal scenarios (for example the Freelancer Invoicing App), support explicitly granted the required app permissions after the user saw the access prompt so the user could proceed. After these actions, assignments and license propagation were confirmed before requests were closed.

74. Permission alignment for internal systems by replicating a reference user's roles
93% confidence
Problem Pattern

Requesters asked for their internal application access to be made identical to a named reference user. Reported symptoms included missing application assignments or platform licenses, absent application-internal module permissions (for example missing 'Prüfungsmanagement' in Care), inability to perform role-restricted actions or UI denial messages, missing or nonexistent accounts and login failures, and entitlements absent due to missing AD group memberships or failed group sync. Affected systems included SSO/app-assignment platforms (Okta), Active Directory and group sync, and application-internal permissions across Care, ABM, Jira, PowerBI, Salesforce, EPOS, Miro, Deskbird and Confluence.

Solution

Access entitlements were aligned by comparing the requester to the designated reference user and matching roles, AD group memberships and platform/application assignments in the target environment. Missing accounts and platform/application licenses were provisioned and Okta app assignments were created or adjusted to mirror the reference account. Where central IT managed application-internal module rights (for example the 'Prüfungsmanagement' module in Care) those module permissions were set; where permissions were managed outside central IT (for example Jira board membership) application or board owners were engaged to grant access. When the named reference user lacked expected entitlements support either selected an alternate reference or corrected the reference account (for example by adding missing AD group memberships and triggering AD group synchronization) and then re-verified access. Requesters were asked to supply a reference user when details were missing; requesters were placed into the same application area or account scope and given matching account-level objects, dashboards or module rights. Approvals and effective dates were recorded in the ticket workflow. Where Self Service Portal automation or approval workflows ran successfully, application assignments were sometimes completed by an Atlassian API automation user and approval/CC entries were retained in logs; when automation failed or stalled support manually provisioned access to match the reference user and tracked approvals in the workflow. Initial login problems were handled separately: correct sign-in links and account-type guidance were provided, and when an existing account already had sufficient privileges support advised using the correct username format and the 'forgot password' flow to regain access. After changes users were sometimes instructed to use the application’s refresh control or restart the client/browser to make granted permissions visible. Persistent or complex issues were escalated to application experts and, when required, credentials or accounts were created and forwarded after provisioning. Some requests included application-specific data or report requests (for example EPOS reports to identify external lecturers using private email addresses); these were treated as separate work items and were executed or documented only when the ticket workflow captured the required steps.

75. Application login errors for services owned by another internal team — routing to the owning service
90% confidence
Problem Pattern

Users were unable to authenticate to Connectedware (PMS) or Produktionsmanagementsystem Fernstudium. Reported symptoms included Okta sign-in failures when using email as the username, explicit "username not found" (including localized variants), or the PMS application tile missing from the user portal. Problems often occurred after changes to PMS access configuration and involved the PMS/Connectedware systems and the Okta identity provider. Account provisioning and access entitlement for these services were owned by the PMS/product team rather than central IT.

Solution

IT Operations confirmed that account provisioning and access entitlement for Connectedware/Produktionsmanagementsystem (PMS) were owned by the PMS/product team rather than central IT. Central IT routed affected users to the PMS team's support channels and closed central tickets after directing users to open an access-request via the Connectedware portal or the Produktionsmanagementsystem Fernstudium Jira Service Management instance (atlassian.net), selecting the appropriate access-request category (for example 'Request access to PMS'). Incidents included Okta sign-in failures when users attempted to authenticate with their email as username following PMS access-configuration changes; no detailed error codes were recorded in central IT tickets. In multiple cases the owning PMS/product team later restored access with no troubleshooting or remediation recorded in the central IT ticket; some access requests were declined and central tickets were closed without remedial action (occasionally marked 'Won't Do').

76. Office add-in blocked by required administrator approval (Zebra BI for Office)
90% confidence
Problem Pattern

Users were blocked from signing in to or connecting applications and integrations because Microsoft Entra (Azure AD) required tenant administrator approval or consent. Symptoms included persistent consent prompts such as 'administrator approval is required' or 'approval requested', failed add-in sign-ins, or connector authentication failures (examples: Office add-ins in PowerPoint, Teams features like Copilot or Shifts, third-party connectors such as Funnel.io to Microsoft Ads). The app or connector could not proceed until a tenant administrator granted approval or added and approved the application in the tenant.

Solution

Access failures were resolved after a tenant administrator granted the required application approval/consent or manually added and approved the applications in the Entra (Azure AD) tenant. In one case a tenant admin approved an individual user’s access and a Zebra BI Office add-in sign-in succeeded. In incidents affecting Microsoft Teams apps (Copilot and Shifts), clearing the Teams client cache did not restore access; access returned only after an administrator added the apps and approved the required permissions. In a Funnel.io connector case, the requester and an Entra/Azure AD administrator met and the admin granted the required permissions/admin consent for the Funnel.io Microsoft Ads connector; the connector then successfully authenticated. After tenant-level approvals were applied, users could sign in or complete connector setup and blocked functionality returned.

77. Power Platform environment access blocked by missing environment security-group membership
91% confidence
Problem Pattern

Users were unable to open Power Platform canvas apps or specific Power Apps: either receiving “You can't open apps in this environment. You are not a member of the environment's security group.”, seeing only an "Access request" dialog, or the app page failing to load/remaining blank without an explicit error. Affected components included Power Platform environments and apps that relied on Azure AD group–based access controls (environment security groups or app-specific AAD groups) and on Power Platform license assignment. Symptoms often corresponded to missing Azure AD group membership or missing Power Platform license, and sometimes followed account status changes (for example internal→external).

Solution

Affected users typically regained access after their Azure AD group membership and Power Platform environment membership were reconciled. In environment-scoped incidents a Power Platform administrator refreshed affected users' environment membership from the Power Platform admin center, which restored membership in the environment security group and allowed canvas apps to open. In other incidents a new Azure AD security group was created and tied to the Power Platform environment; that group was used to manage environment membership and Power Platform license provisioning, after which users gained access. For app-level access controls, assigning users to the PowerApp-specific Azure AD groups that controlled the app's access (examples observed: IUG-AAD-ASS-PowerApp-FreelancerInvoicing-AppUser and IUG-AAD-ASS-PowerApp-ModulSkillset-AppUser) restored access when users were missing from those groups. Across resolved incidents the underlying cause was missing AAD group membership or missing Power Platform license; restoring membership or provisioning the appropriate license resolved the issue. In at least one ticket support also added the user to the required group and attempted browser cache/cookie clearing and alternate browsers, but the app page still failed to load and support could not open the link; that case was escalated to the app-owning (LCC) team, indicating that when group/license reconciliation did not restore access the failure could be app- or environment-managed and required app-owner investigation.

78. SaaS team seats/tokens consumed or deactivated causing lost team access (Claude team seats)
90% confidence
Problem Pattern

Users were either prevented from accessing a shared Claude Team or prevented from being granted access because team seats/tokens or provider licenses had been exhausted. Symptoms included UI or provisioning failures stating seats/tokens were used or that no licenses were available, and loss of access to shared projects, chat history, or integrations despite the user accounts remaining present.

Solution

Access incidents were resolved in two ways depending on the cause. When team seats/tokens had been deactivated or misapplied, a Claude specialist restored entitlements by re-adding or reactivating the users' team seats/tokens; affected accounts regained access to shared project spaces, chat history, integrations and normal team functionality. In cases where provisioning failed because there were no available provider licenses, the application team escalated license entitlement with the Claude provider and negotiated additional or reallocated licenses; one reported case remained unresolved at time of closure with no permanent fix applied.

Source Tickets (2)
79. Miro Enterprise access missing from Okta dashboard due to license/assignment and approval workflow
90% confidence
Problem Pattern

Users could not access Miro Enterprise because the Miro app tile was missing from their Okta dashboard and SSO attempts were denied. Symptoms included absence of the Miro tile in Okta, Microsoft 365 SSO redirecting back to the Miro login with an error, and email sign-in producing other errors. Incidents commonly occurred after onboarding, department changes, or when the user's Okta app assignment or Miro license had been removed. Affected systems: Miro Enterprise, Okta, and Microsoft 365 identity provider.

Solution

Access was restored by assigning or reassigning the Miro Enterprise application/entitlement to the affected Okta user accounts and ensuring associated license entitlements were present. In multiple cases the assignment followed the organization's access/license approval workflow; an administrator (for example, Michael Lutz) granted the Miro entitlement in Okta and users then saw the Miro tile and could sign in to the Enterprise workspace. One incident involved Microsoft 365 SSO failing and support directed the user to initiate SSO from the institution's Okta portal while an administrator granted the missing Okta app permission; after the assignment the user could access Miro. The common resolution in this pattern was restoration of Okta app assignment/permissions and any required Miro license entitlements.

80. Corporate ChatGPT/OpenAI access requests stuck in approval or invitation workflow
92% confidence
Problem Pattern

Access requests for corporate LLM services (ChatGPT/Playground/GPT models, OpenAI API, Anthropic Claude, and related tools) became stuck or unprocessed in approval or invitation workflows. Symptoms included unassigned or invisible Automation for Jira approval tasks; undelivered or unaccepted vendor invitation emails; Microsoft Forms showing 'Your response was already submitted' or producing no follow-up; automated provisioning failing to complete; inconsistent product access (for example Copilot working while Playground remained inaccessible); and internal or vendor-side system outages blocking account setup. Affected requests were sometimes opened in the wrong service portal and were auto-closed after the 14‑day timeout with no further activity.

Solution

Requests were completed by ensuring a valid approver was assigned and any vendor invitation was accepted. When Automation for Jira left approval tasks unassigned or approvers could not see actions, support confirmed approval status with approvers, reassigned approval tasks, or assigned an acting supervisor so the workflow proceeded and vendor invites were sent. When Microsoft Forms intake produced no follow-up or showed 'already submitted', support provided the correct account-request link and the user completed the form; access was then enabled. Administrators manually sent ChatGPT/Playground and GPT‑4 invitations or created accounts where automated invitation/provisioning failed, and provisioning and licensing were validated after acceptance. Email delivery and Jira automation logs were reviewed to verify invite and approval actions. Product ownership routing was corrected when requests had been submitted to the wrong support channel. Local client issues were addressed when relevant (for example clearing browser cache resolved an LMS course/completion problem). Internal IU systems outages were recorded as a contributing factor when they blocked account setup; one outage was resolved on 2025-06-16 which allowed the user to complete ChatGPT Playground setup via the provided links. Requests identified as informational or withdrawn were closed; requests where users never accepted vendor invitations remained inactive and were auto‑closed after the 14‑day timeout.

81. AI SaaS account creation blocked by organization-level restriction (Claude)
95% confidence
Problem Pattern

Users were unable to create or sign in to Claude after their organization enforced SSO. Symptoms included the error “Account creation is blocked. Your organization has blocked new account creation.” or prior personal/paid Claude Pro accounts (created with a company email) becoming inaccessible after SSO enforcement, preventing sign-in and management of subscriptions.

Solution

Access failures were resolved by either enabling the account within the organization’s SSO environment or by transient backend propagation after SSO enforcement. In one case the user was granted an assigned Claude license and the Claude account was authorized for the institution’s Okta SSO; after those changes the user signed in successfully. In another case a privately purchased Claude Pro account created with a company email became inaccessible when company SSO was enforced but signing in again after the enforcement restored access and the user regained access to the subscription.

Source Tickets (2)
82. SSO access loss due to missing Okta app assignment or group membership and short propagation delays
90% confidence
Problem Pattern

Users were unable to access SSO-backed applications after signing in via Okta or saw applications unexpectedly missing from portals or local application lists. Symptoms included explicit errors such as "this application is not assigned to the user", downstream portals showing no app tiles, and applications removed or unselectable in local dropdowns with no error messages. Incidents commonly followed recent Okta app assignment changes, group membership changes, or account resets and affected Okta-managed SSO and connected apps (for example Microsoft365/Co‑Pilot365, Deskbird, Miro, CARE/AcademyFive, Cursor AI/Claude AI API).

Solution

Access incidents were resolved in multiple ways depending on cause and affected system. When missing app access was due to Okta assignment or group issues, restoration of the user's Okta app assignment or required Okta group membership, re-enabling the Enterprise application assignment, or completing an Okta account reset restored access. Administrators re-enabled specific applications in Okta for affected users (examples included CARE/AcademyFive and Deskbird). Where provisioning changes were recent, downstream portals typically populated after a short propagation window (commonly 5–10 minutes); some Microsoft365/Co‑Pilot365 cases required up to 15–20 minutes. Separately, a subset of incidents (including a Cursor AI/Claude AI API case) resolved without recorded administrative remediation and reappeared after a longer interval (hours to about a day). After assignments/groups were corrected or the system-side propagation completed, users regained sign-in access and application availability.

83. Vonage desktop app access and account provisioning for Windows 11 users
90% confidence
Problem Pattern

Users reported inability to use the Vonage desktop app after submitting an access/license request. Provisioning workflows often showed approver(s) pending or referenced a Twilio account that could not be located; no explicit error messages were presented. Affected systems: Vonage (and sometimes Twilio).

Solution

A Vonage access/account was created for the affected user in the target environment (Windows 11 when applicable), the access/license request in the provisioning workflow was completed, and the new account record was recorded and linked in Salesforce. When a referenced Twilio account could not be located during provisioning, a Vonage account was created directly to restore access. The ticket was closed after the account and license were provisioned and recorded.

Source Tickets (2)
84. Approval workflow mis‑handled (accidental approver action causing state confusion)
90% confidence
Problem Pattern

An approver in the Automation for Jira approval workflow accidentally approved a SaaS access/license request while intending to reject it, producing conflicting approval state and user confusion. The symptom was a request that briefly appeared approved before the approver clarified the intent to reject, affecting OpenAI/ChatGPT API access requests and institutional approval records. Users reported confusion about the final decision and next steps.

Solution

The approver corrected the approval state and the request was recorded as rejected. The approver directed the requester to the institution's ChatGPT information page on the intranet for guidance and offered a direct point of contact (the approver) for any remaining questions. The ticket was closed with the request rejected.

Source Tickets (1)
85. ChatGPT Team account migration and chat-history preservation concerns
90% confidence
Problem Pattern

Users requested transition from personal ChatGPT accounts to an OpenAI ChatGPT Team account and asked whether their existing chats and conversation history would be preserved after being invited into the Team. The symptom was uncertainty about data persistence and whether manual backups were necessary before accepting a Team invitation. Affected systems included OpenAI ChatGPT Team invitations and the Automation for Jira approval workflow.

Solution

The approver executed the approval workflow and triggered an invitation for the user's existing ChatGPT account. The user received the invitation and was informed that their existing chats should remain available after the account is moved to the Team. The invitation was sent and the request was closed as completed.

Source Tickets (1)
86. Automation-for-Jira auto-declined Software Catalog requests when approver was missing or unavailable
91% confidence
Problem Pattern

Approval-type application access requests routed through Automation-for-Jira were automatically declined and closed after the platform's 14-day approval timeout when the configured approver field was missing, null, unavailable, or when no approval was recorded. The automation posted messages such as "your ticket is missing the approver" and "Your ticket has been 'declined' automatically (14 not approved or approver no longer available)". Affected workflows included Software Catalog and application-specific access requests (examples: d.velop, Calendly, Microsoft Bookings, ChatGPT/OpenAI, ScreenPal, Okta, Salesforce Marketing Cloud); closed requests could not be reopened.

Solution

Automation-for-Jira detected missing, null, or unavailable approver fields on approval-type application access requests and automatically declined and closed those requests after the platform's 14-day approval timeout. The automation left log entries and posted messages on tickets (for example: "your ticket is missing the approver" and "Your ticket has been 'declined' automatically (14 not approved or approver no longer available)"). In multiple incidents support attempted to change or assign replacement approvers, but when no valid replacement was present or required-role approvals did not arrive the automation still timed out and closed the request. Closed requests could not be reopened and no provisioning or catalog changes were performed. Affected workflows included Software Catalog and individual application workflows such as d.velop, Calendly, Microsoft Bookings, ChatGPT/OpenAI, ScreenPal, Okta, and Salesforce Marketing Cloud (requests referenced Windows 10 and Windows 11). Requesters resubmitted new access requests that specified an appropriate approver to obtain access.

87. Time-limited SaaS account provisioning via approval automation (Storyblok)
95% confidence
Problem Pattern

A user requested a Storyblok account with read permissions to all DACH spaces and an explicit expiration (limited until end of year). The request was routed through the approval automation and required a CC-approver and a provisioning action tied to SSO access.

Solution

Approval was requested from the configured CC-approver and the Storyblok account was provisioned for irina.simon.ext@iu.org with read access to all DACH spaces. An expiration date was set to end of the calendar year and the user validated access through Storyblok SSO and confirmed via Teams.

Source Tickets (1)
88. Staging environment access separate from production (EPOS Stage assignment required)
90% confidence
Problem Pattern

Users could access production but could not access corresponding non-production environments. Reported symptoms included failed logins to the EPOS staging instance while production remained available, and requests for elevated admin permissions in a Jira Sandbox that could not be granted because the sandbox instance was unlicensed or limited to a Jira Standard license. Affected systems included EPOS stage, Okta provisioning, Atlassian Cloud (careerpartner.atlassian.net), and Automation for Jira.

Solution

Two distinct access causes were handled separately. For EPOS Stage access, an administrator assigned and provisioned the user to the EPOS Stage application in Okta; after assignment the user could open the stage environment from their Okta Dashboard and the access gap was closed. For the Jira Sandbox admin request, support identified the EPOS project (https://careerpartner.atlassian.net/browse/EP) and attempted to copy production data into the Sandbox and mirror project permissions so the requester could operate with admin-level rights for Automation for Jira testing. The Sandbox remained unlicensed (only a Jira Standard license available) which prevented granting the requested admin permissions; no technical change resolved the permission limitation during the ticket and the request could not be fulfilled under the current license state.

Source Tickets (2)
89. User moved teams but app permissions already present — Okta dashboard visibility confusion
85% confidence
Problem Pattern

A recently transferred user reported inability to log in to Jira and Miro after moving teams, with no error messages provided. The symptom was an inability to open or access the apps despite claims of prior or expected permissions; systems referenced: Jira, Miro, Okta.

Solution

Support verified that the user already had the necessary permissions for both Jira and Miro and that the applications were accessible from the user's Okta Dashboard. The user was informed of the Okta-assigned access and subsequently confirmed they could open both applications.

Source Tickets (1)
90. SaaS access requests resolved by approver approval and invitation/provisioning (ProductFruits, ChatGPT, Calendly)
85% confidence
Problem Pattern

Users requested access or licenses for third-party SaaS (for example ProductFruits, OpenAI ChatGPT team/Pro, Calendly, and Lucid Suite) and reported they could not open the application or that no account appeared. Tickets contained no technical error messages; requests showed as pending in internal approval workflows or awaited vendor invitation/license provisioning. Access did not appear in Okta or vendor portals until approver approval and/or vendor invitation/license assignment completed.

Solution

Requests for third-party SaaS access were processed through the Software Catalog approval workflow (often surfaced via Automation for Jira). Tickets were resolved once the recorded approver approved and the vendor invitation or license assignment occurred. After approval: ProductFruits access was added and verified on users’ Okta dashboards; OpenAI ChatGPT team/group-account and ChatGPT Pro invitations/licenses were issued to the requested users (separate from individual Playground access); Calendly invitations were sent; and Lucid Suite (Lucid Spark and Lucidchart) was assigned to users’ Okta accounts. Jira automation sometimes continued to indicate approvals were pending while approvers manually issued invitations or assignments. Some tickets were later auto-closed when users did not confirm receipt of delivered invitations.

91. Access requests stalled by missing or unassigned approver in Automation-for-Jira workflows
91% confidence
Problem Pattern

Access requests submitted through Automation-for-Jira or Application Request workflows sometimes remained in 'Awaiting Approval' with no valid approver shown, or approvers attempting to act received 'access denied'. Approval steps commonly referenced an empty assignee, an unset or hidden manager field, a departed or unlinked approver account, or a removed approval role; approvers also sometimes declined because they were uncertain they were the correct approver. Affected systems included Automation-for-Jira approval steps and downstream provisioning bridges; observed symptoms included requests pending indefinitely, approvals failing with 'access denied', requests being declined, or requests closed without completing provisioning leaving users unassigned or unlicensed.

Solution

Incidents were resolved by ensuring the Automation-for-Jira approval step referenced a valid approver or by confirming the request had already been processed. Where approval steps referenced no valid approver (empty assignee, unset/hidden manager field, departed or unlinked approver account, or an approval role that had been removed), support corrected or re-linked the approver; once a valid approver was set the approval completed and provisioning proceeded. When an approver declined because they were not the correct approver or were unsure, support recorded the decline and closed the request as Declined. In cases where the approval role had been removed because the request had already been processed, support informed the approver/requester that no further action was required and closed the ticket (sometimes marked Won't Do). When downstream provisioning performed assignments directly, issuing the application assignment through the identity/provisioning bridge triggered delivery (examples: assigning GitLab via okta.iu.org triggered provisioning; assigning Deskbird via the Atlassian API user granted the license). When an identical request had already been provisioned elsewhere the original ticket was closed as Won't Do. When no valid approver existed, requesters were asked to provide an appropriate approver or to resubmit the request with correct approver information; support also offered manual account creation if the requester supplied a reference user and approver confirmation, otherwise tickets awaited requester response and were later closed.

92. Playground Assistant capacity and instruction-size limits causing imprecise responses
90% confidence
Problem Pattern

A custom OpenAI Playground Assistant (KPM Course Finder) produced insufficiently precise or unreliable answers without explicit error codes. Symptoms pointed to hitting capacity limits related to large data volume and instruction size rather than authentication or connectivity failures. Affected systems included the Playground Assistant, ChatGPT Team provisioning, and OpenAI ChatGPT.

Solution

The request was escalated to the owning team and an invitation to join the ChatGPT Team was issued to the requester. The requester accepted the ChatGPT Team invitation, after which the Playground Assistant (KPM Course Finder) delivered the expected capacity and precision and the issue was marked resolved.

Source Tickets (1)
93. LMS365 course creation/editing blocked by missing LMS group membership
95% confidence
Problem Pattern

User reported inability to create or edit courses in LMS365 without error messages; the symptom was missing create/edit permissions tied to LMS365 group membership or role assignment. Affected systems: LMS365 and the organisation's group-based provisioning for course authoring.

Solution

The request was escalated to the LMS365 specialist team. A named specialist (Marcel Hebestreit) added the user to the LMS365 groups that granted course create/edit permissions. After group membership was applied the user was able to create and edit courses and the ticket was closed.

Source Tickets (1)
94. Trello board admin requests owned by application team — redirect and owner provisioning
90% confidence
Problem Pattern

Users requested admin access to a specific Trello board (IU_FS) but could not perform admin actions; IT Operations did not hold application ownership and the request could not be fulfilled directly. Affected systems: Trello board access and internal service ownership boundaries.

Solution

IT Operations confirmed Trello administration was owned by the Team Teaching Formats, advised requesters to use that team's service portal, and forwarded/redirected the request. The Team Teaching Formats completed the provisioning and granted the requested admin rights on the IU_FS Trello board to the specified users.

Source Tickets (1)
95. Service account provisioning stalled by missing Workday cost‑centre approver
90% confidence
Problem Pattern

Request to create a SSO-enabled service account for a team (Cloudinary employerbranding@iu.org) remained unprocessed and awaited approval; the provisioning ticket was closed without account creation due to an absent or incorrect cost‑centre manager entry in Workday and related Automation-for-Jira approval gating.

Solution

The IT team closed the Jira provisioning request and marked it Done without creating the Cloudinary service account. The requester was informed that the Workday cost‑centre manager needed to be corrected and that the Cloudinary account creation request would need to be re-submitted once the Workday cost‑centre/approver information was fixed. No SSO-enabled user was provisioned during the original request.

Source Tickets (1)
96. No existing accounts for multiple internal portals (myCampus, EPOS, CARE) — manual account creation and credential provisioning
91% confidence
Problem Pattern

Users reported missing or non‑existent accounts or failed sign‑ins to internal portals (myCampus, EPOS/Epost, CARE, LIBF, DeskBird, Discovery). Symptoms included authentication failures such as “wrong password” errors, no password‑reset email received, ambiguous credential stores (myCampus credentials separate from Okta), confusion over which institutional email/username was registered, use of incorrect portal URLs, and Okta accounts that were not activated. Affected users were unable to complete tasks that required portal access (course booking, recognition/application entries, library resource access).

Solution

Technicians first checked for an existing account and the correct sign‑in location (verified the portal URL and the exact username/email on record) and then provisioned or assigned accounts as required. For myCampus, technicians verified or provided the username tied to the separate myCampus password store and re‑triggered the portal password‑reset flow when reset emails had not arrived; they also validated which institutional email/username was registered and corrected mail routing or activation state when required. For Okta‑integrated services (for example DeskBird, EPOS where applicable), accounts were assigned through Okta and successful sign‑in via okta.iu.org was confirmed; when Okta accounts were present but not activated (which in some cases prevented creation of Helpdesk portal tickets), technicians used administrative channels to activate or provision accounts before proceeding. CARE accounts were created using explicit loginname values. EPOS/Epost access used the IU email address and the existing Okta password mapping so users could sign in with their email; EPOS account information was sometimes reused to complete recognition/application entries, course bookings, or to integrate with downstream services such as EBSCO. LIBF accounts were created by the specialist team when required. Technicians used comparison/reference users to replicate required permissions during provisioning and verified successful sign‑in to the requested portal(s); where users did not confirm permission parity, access was assumed based on the replicated reference configuration. When users reported ambiguous service names, sign‑in locations, or which institutional email to use, technicians requested clarification and corrected the URL/identifier before continuing.

97. 1Password access issues: separate master-password/Emergency Key model and account recovery
95% confidence
Problem Pattern

Users were unable to access 1Password because their account was not provisioned or assigned a license and was awaiting an activation/invitation email, or because they had forgotten their 1Password master password or Emergency Key and SSO did not surface errors. In some cases users had a license but still could not access a specific vault because vault-level permissions were controlled by the vault owner and were not automatically granted. Affected systems included 1Password, Okta/provisioning, corporate email, and the application self‑service portal.

Solution

New 1Password accounts were provisioned either by assigning the 1Password application in the identity/provisioning system (Okta), which generated activation/invitation emails that users received and confirmed, or by processing license requests submitted through the application self‑service portal (Atlassian Service Desk). For accounts awaiting activation, administrators unlocked the user’s Okta account and triggered or resent the activation/invitation email so the user could complete activation and access their vault. For users who had forgotten their 1Password master password or Emergency Key, account recovery flows were initiated and recovery emails were sent; access was restored after users completed the recovery link flow. Support clarified that 1Password authentication relied on a separate master password and Emergency Key and was not integrated with SSO/Okta. Where users had a valid license but still lacked access to a specific vault, support confirmed that vault-level permissions were granted by the vault owner (not centrally by the provisioning team); users were directed to the vault owner or designated colleague to obtain vault access. In one instance a license assignment request was processed while access to the OnePortal vault was granted only after the requester was referred to the vault owner for permission.

98. Okta application assignment / user entitlement missing (SaaS provisioning)
95% confidence
Problem Pattern

Users and service/API accounts were unable to access SaaS applications via Okta SSO when Okta-to-application integrations were missing, disabled, misconfigured, had expired/invalid credentials, or when user/application accounts were locked. Symptoms included absent app tiles in the Okta App Dashboard, failed SSO launches or redirects (no redirect, immediate return, or a generic/unhelpful error), missing role/entitlement assertions, and automation/API authentication failures due to expired or revoked tokens. Affected systems included Okta, user portals (for example SharePoint), and target SaaS apps (for example Salesforce, Figma, Jira, JFrog).

Solution

Access failures were resolved by provisioning or enabling the SaaS application in Okta and linking users’ Okta identities to the target service. Technicians assigned applications to users or Okta groups, applied required licenses/entitlements and billing cost-centers, and treated separate application instances (for example prod vs UAT) individually. Where vendor-side SAML was required, Okta app SAML metadata endpoints, sign-on URIs, entity IDs, audience URIs and encryption certificates were supplied to vendors so they could import metadata.xml and accept Okta assertions; product/service accounts and author permissions were created or linked as needed. Locked user or service accounts were unlocked in Okta to restore SSO access. Service and API accounts were granted the application, appropriate API-access permissions, and had API/service tokens replaced when expired or invalid; automation/service accounts were configured per request (for example MFA exemption for automation). Requests to add SAML role assertions (for example assignedRoles in a SAML claim) or to enable SCIM provisioning were recorded and scheduled. In instances where an Okta app tile existed but the service had not yet been initiated, launching the tile triggered the SSO redirect and restored access. Changes typically propagated within about 5–10 minutes and technicians confirmed access restoration before closing the ticket.

99. Okta app access blocked by cost-center / group assignment mismatch (USU)
95% confidence
Problem Pattern

Users were prevented from accessing the USU application in Okta when the application's Okta group assignments were scoped to specific cost-centers that did not include the user's current cost-center. Failures typically appeared after a user's cost-center changed or when a cost-center had not been enabled for the USU app. Affected systems: Okta and USU; symptom: expected access to USU was unavailable despite prior group assignment.

Solution

Requests to add or enable missing cost-centers for the USU application were escalated to the specialist team. The specialists updated the Okta application/group mapping to include the missing cost-centers (examples included CC16000 "Service Operations" and CC10690 "Teacher Experience"), and in one case the IU-CFCM-Leser mapping was updated. After the cost-center was added to the USU app mapping, users whose access failed because of the cost-center mismatch regained access. For proactive enablement requests (no current access errors), the cost-center was enabled in Okta and the requester performed subsequent group assignments manually.

Source Tickets (2)
100. Internal test environment access blocked by pending approval and request channel
90% confidence
Problem Pattern

A user could not access the SF Test environment because the access request was sitting in an Automation-for-Jira approval state and the support team lacked permission to directly grant access. The request had not completed the required service-portal approval workflow.

Solution

Support advised using the SalesTech Service Portal to submit the access request. Once the request was processed through the portal the Automation-for-Jira approval completed and the SF Test environment access was granted; the ticket was closed.

Source Tickets (1)
101. Post-device-change access and application-specific 403 error (EPOS / d.velop)
90% confidence
Problem Pattern

Users were unable to perform student searches in EPOS; search requests returned HTTP 403 Forbidden. The issue frequently appeared after account provisioning changes or device/laptop swaps, and some users also reported concurrent loss of access to d.velop. Initial credential or permission adjustments did not always clear the 403 and in some cases the error persisted for individual users.

Solution

D.velop access issues were resolved by performing password resets and ensuring users used their Care/myCampus credentials for EPOS. EPOS account permissions were aligned to a working reference user role; this restored access for multiple affected accounts. In several cases signing out of EPOS and signing back in was required for the permission changes to take effect. Where the HTTP 403 persisted after permission alignment and session refresh, the issue was escalated to the EPOS specialist/application team, who applied a final fix and cleared the error.

102. Corrupted browser profile causing loss of saved credentials and blocked web app access
70% confidence
Problem Pattern

After a full PC restart the user reported loss of saved passwords, distorted/incorrect web rendering, and inability to access multiple web services (VPN, SharePoint, d.velop, Salesforce, Twilio). Some services remained reachable only via Okta application links while direct browser sign‑in failed. Symptoms indicated a local browser (Chrome) user‑profile corruption rather than remote service or credential issues.

Solution

Access to affected SaaS (Salesforce, Twilio) was restored by launching the applications through Okta application links which bypassed the corrupted local profile state. Investigation identified the Chrome user profile as corrupted and responsible for lost saved credentials and rendering issues; the profile was deemed unrecoverable. Normal browser-based access was re-established by moving to a clean browser profile (recreating the Chrome profile) and re-authenticating, while Okta links served as the immediate workaround.

Source Tickets (1)
103. myCampus staff/backend access missing due to absent staff account or permissions
95% confidence
Problem Pattern

Users reported they could not perform staff-only actions in myCampus (mycampus.iubh.de) — for example, access the backend, see staff options in their profile, or create Praxisberichte. Affected accounts lacked staff-level permissions or an employee/back-end staff account and no error codes were reported. Issues occurred when users attempted to reproduce student issues or complete staff tasks for customers.

Solution

Access problems were resolved either by creating a dedicated BackEnd user account and granting the same rights as the referenced staff member, or by assigning the specific MyCampus staff permissions to the requester’s existing account (for example, enabling creation of 'Praxisberichte'). The required permission scope was clarified via Microsoft Teams before changes were applied. Requesters were given credentials or confirmed working access after changes; it was documented that MyCampus permission synchronization can take until the next day for additional staff options to appear in the user’s profile.

Source Tickets (2)
104. SaaS dashboard or workspace access blocked by missing license/entitlement
90% confidence
Problem Pattern

Users reported lack of access to SaaS dashboards or workspace content (e.g., couldn't view a Twilio backlog dashboard in DataDog; could not be found or shared with in Confluence). No explicit error messages were provided—symptoms were simply absence of visibility or ability to open required dashboards/pages.

Solution

Access was restored by assigning the required product entitlements: an administrator granted the DataDog account access so the user could view the Twilio backlog dashboard, and a Confluence product license was assigned to the affected user. Both users tested access and confirmed the dashboards/pages were accessible; license/entitlement propagation was expected to occur within minutes.

Source Tickets (2)
105. Salesforce new-user provisioning and credential activation for employee onboarding
95% confidence
Problem Pattern

Requests to provision Salesforce access for new hires or employees reporting no usable Salesforce account. Reported symptoms included no Salesforce user record, absence of activation/invitation email, inability to log in, or requests to copy an existing employee's permissions; some requests were password‑reset or activation‑link requests for accounts that already existed. Affected systems: Salesforce and users' email for activation/password links.

Solution

Case owners verified whether a Salesforce user record already existed by searching the org and checking last login. They recorded the new user's full name and approver confirmation when required and created a Salesforce user account and assigned a profile where none existed. Usernames were assigned (not always corresponding to an actual mailbox), and permissions were set; when requested, permissions were copied from a specified reference user. Invitation/activation or password‑reset links were sent to the user's email and provisioning was confirmed. Tickets were closed after the activation/invitation was issued or per the requester's instruction when no login confirmation was received.

106. Service account provisioning for Power Automate / Power Apps automation
90% confidence
Problem Pattern

Requests to provision or grant access to svc.iu-it.org service accounts for Power Platform (Power Automate flows, Power Apps) and related services such as Power BI. Users reported capability or permission needs—commonly to run, take ownership of, transfer, or manage flows—or observed Microsoft licensing/trial-expiration warnings that they feared would disable flows; requests frequently contained no explicit error codes.

Solution

Service accounts in the svc.iu-it.org namespace were provisioned for requesting teams so they could run, transfer, or manage Power Platform automations; requesters were notified and follow-up ownership/usage details were sent by email. When requests involved related services (for example Power BI) or surfaced Microsoft trial-expiration warnings, support verified the service account's Microsoft licensing (for example confirming a Per User Plan license covers Power Automate flow functionality). In at least one case the license verification showed the required functionality was already covered and the trial warning did not indicate an actionable problem, so the access request was cancelled and closed as "Won't Do." Affected systems included Power Platform/Power Automate, Power Apps, Power BI, and Azure AD/Office 365 service account licensing and provisioning.

107. Access requests resolved by sending invitation or direct admin assignment
92% confidence
Problem Pattern

Users reported inability to access SaaS or internal applications because their account or presence was missing from the target interface, a required invitation or onboarding state was pending or expired, credentials were unknown or expired, or required roles, permissions, or space/folder membership were not assigned. Symptoms included failed sign-in (including SSO/Okta), explicit 'user not present' or 'user not on interface' messages, missing or expired invitations, insufficient permissions, and inability to enter named spaces or folders. Affected systems included invitation- or role-managed SaaS apps and internal environments (for example OTRS) where explicit reference-user records, account creation, membership, hardware provisioning, or credential dispatch controlled availability.

Solution

Resolutions began with confirming whether the user's account or presence existed on the target interface and then taking the appropriate administrative action. Recorded outcomes included accepting or resending missing invitations, creating accounts when none existed, locating or providing existing usernames/credentials, and directly assigning required roles, permissions, or space/folder membership. In several cases a service account or administrator applied assignments after approvers were identified; one Datadog case required a team lead to name approvers and a DevOps contact before the role was applied. Agents verified SSO/Okta availability for apps (for example confirming Confluence and Salesforce appeared in Okta and that the user was logged into Salesforce) and used platform-specific recovery flows (for example restoring Care access via the myCampus “Forgot Password” flow). Other recorded resolutions included granting Growthbook after invite acceptance, resending internal Playground invites, restoring Adobe Sign by applying required permissions, provisioning Calendly/Zoom and other SaaS accounts by sending invites, and adding users to a Storyblok Forms space. Where resource names were ambiguous, agents clarified folder or SharePoint names to locate the correct target. One resolution required hardware provisioning: a purchase order was created, hardware was ordered, automatic credential dispatch was configured, and credentials were subsequently sent to the user. In some cases the absence of a reference-user entry (for example in OTRS) indicated access was not required and the ticket was closed as no-action-required.

108. Temporary admin-elevation option not visible in portals — Self Service app required
90% confidence
Problem Pattern

Users attempting to install applications (for example, Logitech Spotlight Presenter or Adobe Creative Cloud/InDesign) reported either that the temporary admin/self‑service admin option was not visible in IU portals or that installations failed with a higher‑privileges error (e.g., “You need higher privileges”). Affected installs were performed on Windows 11 via Company Portal or app installers while users were authenticated through Okta. Systems implicated included Okta authentication, Company Portal (Intune), Adobe Creative Cloud, and Windows 11.

Solution

Temporary administrative elevation was provided through the Self Service application in Okta. In the Presenter App case, support opened the Self Service app in Okta, selected the temporary admin entry (30‑minute elevation), and the user completed the Logitech Spotlight Presenter installation. For Adobe Creative Cloud/InDesign on Windows 11, support assigned the user to the Okta group IU‑ZZ‑OK‑ASS‑Adobe‑Creative Cloud to grant the Creative Cloud license and had the user install Creative Cloud/InDesign via the Company Portal while signed in with their IU email and Okta password; the license assignment plus installing via the Company Portal addressed the access/licensing and privilege errors. Where installations reported “higher privileges” errors, the Self Service temporary admin elevation was the mechanism used to obtain the required local admin rights.

Source Tickets (2)
109. Okta account state or credential reset required after unexplained SSO login failure
91% confidence
Problem Pattern

Users could not access Okta‑integrated applications via SSO: login attempts failed with no specific error, generic authentication failures or access‑denied messages, application errors (for example 'The service is currently unavailable' in Jira Service Desk), or activation/reset links that did not open or were not used. Some incidents exhibited credential mismatches where the Okta password was out of sync with Windows/Microsoft or Workday identities. Affected systems included Atlassian/Jira, Workday, Fonto TEAC, Office, MOSES, course‑management tools, and VPN access.

Solution

Two primary resolution patterns recurred. In many incidents technicians verified the user’s Okta profile and application assignments, triggered an Okta account reset, and the user completed the activation/reset flow after receiving the Okta email; SSO authentication then succeeded. In other cases a simple re‑authentication at the Okta portal (okta.iu.org) or confirming application access via the Okta Dashboard restored access without a full reset. Incidents involving Workday and Fonto TEAC required additional coordination: support sometimes added the user as a ticket participant or confirmed Workday application visibility in the Okta Dashboard, while Fonto issues that were outside Okta ownership were routed to the Fonto support team (projekt-teaq@iu.org). Several tickets described activation/reset links that failed to open or were not acted on by users; those cases often remained unresolved when users did not follow the link. A subset of incidents showed passwords out of sync between Okta and other identity sources (for example Windows/Microsoft authentication or Workday-backed identities), which was documented in ticket notes and in some cases required cross‑team coordination to investigate; outcomes were not always recorded when the user’s state persisted. Affected targets included Atlassian/Jira, Workday, Fonto TEAC, Office, MOSES, course‑management tools, and VPN.

110. Access requests for SharePoint‑managed resource ('Index') pending approval outside IT
90% confidence
Problem Pattern

Users attempting to open or edit resources on iubhfs.sharepoint.com reported 'access denied' errors or lacked edit permissions (for example, inability to modify the Mitarbeiterliste); in some cases no explicit error appeared and users only saw missing edit controls. Access-request submissions created via Automation for Jira were observed to remain in an 'awaiting approval' state without provisioning. Affected resources were administered by SharePoint site or area owners rather than central IT.

Solution

Support determined the affected resources were governed by the SharePoint site or area owners and therefore could not be provisioned by central IT or via the Automation for Jira workflow. Requesters were informed that access had to be granted by the site/area owner using the site's access-request mechanism or site-specific access-request form; for the Index resource support provided the SharePoint page URL (https://iubhfs.sharepoint.com/sites/IUG-Knowledge/SitePages/DS-Regeln-in-der-STudienberatung-.aspx) as the correct request location. When a site owner could be contacted directly they granted the required permissions (for example, edit rights on the Mitarbeiterliste), resolving the issue. Automation for Jira entries remained in an awaiting-approval state and access was provisioned only after the site/area owner approved the request; when support could not identify the owner because they lacked access to the area users were advised to contact the site owner or their manager.

111. Access blocked by missing group membership, Okta app enablement or reference-user permission mapping
90% confidence
Problem Pattern

Users were unable to access internal applications or resources despite having accounts or SSO entries. Symptoms included SSO login loops or repeated sign-in windows, Office/Microsoft 365 apps (Teams, Outlook) failing to add or sign in, Power BI dashboards showing an "upgrade to an account" prompt, and individual Learning Hub, SharePoint, GitLab, Salesforce or Confluence items returning "access denied" while top-level pages loaded. Problems frequently appeared after Okta or identity-source changes, Office installs, MFA device changes, or license assignment changes. Affected systems included Atlassian/Confluence, Power BI, Microsoft 365, SharePoint, GitLab and Salesforce tied to Okta and Azure AD/Entra identity sources.

Solution

Access issues were resolved by ensuring the user identity, application assignments, group memberships and identity-source mappings were consistently provisioned and by correcting any missing licenses or MFA registration. Specific fixes observed across incidents included: enabling the application's Okta SSO assignment; adding users to Learning Hub or application-specific SharePoint groups; adding the Okta group into Atlassian Access when an Entra/AAD group existed but the Okta identity was not mapped; correcting Atlassian references to an outdated external address so authentication redirected to the current identity endpoint; creating Salesforce accounts with the same permission set as the referenced user and allowing the approval step to complete; assigning the correct Microsoft 365/Power BI license or ensuring the user signed in with an organizational account to remove the “upgrade to an account” prompt; and installing or registering MFA clients/devices (for example, installing Okta Verify Desktop or registering the provided YubiKey) when MFA device registration was missing or the Okta Verify client was not running. Changes were given time to propagate (typically ~5–10 minutes) and access was rechecked after propagation.

112. Stage environment access to third‑party testing tool required vendor invitations
95% confidence
Problem Pattern

Testers could not view onboarding emails because they lacked access to the Mailtrap Stage environment; the problem manifested as missing access rather than explicit error messages during Stage E2E testing.

Solution

Access was granted by sending Mailtrap environment invitations to the affected users. Invitations included the environment link and any usage instructions required; recipients confirmed access and the blocking for Stage E2E testing was removed.

Source Tickets (1)
113. Application access blocked by missing assignment or unapproved provisioning request
90% confidence
Problem Pattern

Users clicked an Okta dashboard tile or opened an application/web access link but could not open or use the app; no explicit error messages were shown. Affected systems included internal apps (Abrechnungs‑App, Jira) and web application links; users reported inability to open or edit items, join meetings, or access role-specific tools. Incidents occurred on endpoints such as Windows 11 (Dell) and sometimes involved users without local administrator rights.

Solution

Access for affected users was restored after administrators directly granted the required application entitlements or approved pending provisioning requests. In reported cases admins assigned users to the Abrechnungs‑App and to Jira and users confirmed access worked after a short propagation delay. In a separate incident where a user could not open a web access link, restoration coincided with escalation to the user’s team lead and direct contact between support staff and the user; the user later confirmed access was restored.

114. SSO login failure caused by account deactivation after prolonged inactivity
95% confidence
Problem Pattern

Users who were inactive for an extended period attempted to access Salesforce via Okta SSO and were unable to sign in; affected accounts had been deactivated/disabled due to inactivity, and launching the Salesforce app from the Okta dashboard resulted in an error or blocked access.

Solution

Affected users’ Salesforce accounts/Okta entitlements were re-enabled by an administrator. In successful cases the account reactivation propagated shortly afterward and the user launched Salesforce from the Okta dashboard (SSO) and access was restored. Some tickets recorded only the reactivation action without a confirmation of successful login; in those cases support also instructed the user to sign in to the institution’s Okta dashboard and launch Salesforce from there, and requested the exact error message when sign-in still failed.

Source Tickets (2)
115. GitLab repository access requested via Atlassian service portal
95% confidence
Problem Pattern

Users were unable to access specific GitLab repositories or projects: repositories or projects were not visible in the GitLab UI even when users appeared as members, repository links returned “Not Found (gitlab.com)”, or access attempts produced no explicit GitLab error. Affected systems included GitLab (self-hosted and gitlab.com), Okta, and Atlassian/Jira service desks; users reported inability to reach project resources, pending access requests, or incorrect links.

Solution

Support provisioned the GitLab application via Okta when a user’s account or application assignment was missing. For repository-level access, support confirmed whether project membership existed in GitLab and whether a project-specific Atlassian/Jira access request had completed; where requests were pending, approvers or admins processed approvals (in one case via Jira automation) and repository owners or DevOps granted the requested membership (for example, viewer access). In cases that produced “Not Found (gitlab.com)” errors or failed link opens, support verified the repository URL and informed the requester when the provided link was incorrect. Tickets were closed after the GitLab application assignment, approval workflow completion, correct repository membership, or corrected link restored access to the repository.

116. Broad myCampus authentication outage caused by faulty deployment
90% confidence
Problem Pattern

Multiple users experienced login failures and authentication errors in myCampus, including 'login error after plugin check' and failed automated password resets. Monitoring showed elevated authentication errors for ~30–45 minutes. The outage affected instructors and new users attempting to sign in.

Solution

Investigators correlated the authentication errors with a recent deployment and identified a faulty deployment as the root cause. Functionality was restored after the faulty deployment was reverted/fixed and system health returned to normal; monitoring showed the error rate subsided and normal login behavior resumed.

Source Tickets (1)
117. EPOS access failures due to account profile or missing EPOS-specific permissions
91% confidence
Problem Pattern

Users launching EPOS via Okta or Salesforce experienced access and authorization failures: HTTP 403 responses, generic ‘Error’ banners, or ‘credentials incorrect’ messages. Affected accounts showed missing EPOS-specific UI sections (for example Lehrende, Documents, Finance/Finanzreiter, Studierenden Verwaltung), greyed or read-only profile fields (for example Academy ID), inability to perform write actions (for example unenrolling students, editing progress), and stale-session behavior where student lookups or search masks returned no results. Third-party integrations sometimes reported mismatched identifiers (for example CARE ID) for the affected accounts.

Solution

Access and functionality issues in EPOS were resolved by restoring each affected account’s EPOS-specific state and permission set to match a known-working reference account. Technicians compared Okta and EPOS account configurations against colleagues with the same role and reproduced failures via the Okta EPOS tile and via Salesforce to confirm scope. Remediations included correcting incorrect EPOS profile fields (for example wrong email), removing invalid field values, and adjusting or removing incorrect Okta group assignments to mirror the correct configuration. Missing EPOS-specific permissions and incorrect role/group assignments were provisioned or removed to restore required edit rights (for example enabling write access to the Finance/Finanzreiter tab, document-management modules, or Studierenden Verwaltung); changes that required specialist handling were forwarded to the specialist team for direct processing. For multi-user incidents, teams coordinated bulk role/permission assignment and compiled lists of affected user accounts/email addresses for the specialist team to apply changes. Affected users were asked to sign out and sign back in; authentication mismatches and HTTP 403 errors cleared after re‑authentication and session‑cache refresh, and permission and role changes were given time (typically ~5–10 minutes) to propagate before re‑login. Reports of identifier mismatches from third‑party systems (for example CARE ID) were recorded alongside account-state fixes so the source of identifier changes could be investigated while access was restored. Some tickets were root-caused to permissions/role differences but were closed before changes were applied; those recommended coordinated role assignment and collection of affected-user lists for bulk remediation.

118. Power BI / Power App dashboard sharing for academic users using IT groups and RLS
80% confidence
Problem Pattern

Request to grant a group of academic staff view-only access to specific Power BI dashboards (Course Booking Overview) while preventing exposure of other app pages that contain student personal data. The requirement included using IT-managed groups (Azure AD/ALEA dynamic groups) and ensuring row-level security to limit data exposure.

Solution

Access was planned to be granted via IT-managed Azure AD/ALEA security groups (the IUG-AAD-DYN-M365-Sharing-AcademicTeacher group was referenced) so that professors and lecturers received view-only entitlements to the specific report. Guidance and configuration focused on applying group-based sharing and Row-Level Security (RLS) to prevent access to pages with student personal data, coordinating changes through the ALEA group management flow and the relevant service mailbox.

Source Tickets (1)
119. Atlassian site access denied despite Okta SSO and asset assignment
90% confidence
Problem Pattern

Users authenticated to Atlassian via Okta SSO but could not access the Atlassian site or specific Confluence/Service Desk spaces/pages despite the Okta asset and IUG-Atlassian-SSO assignment appearing. Symptoms included access denied errors or inability to open pages (sometimes with no explicit error message), and could occur across browsers and devices or only until the user re-authenticated.

Solution

Investigators confirmed the Okta Atlassian asset and IUG-Atlassian-SSO assignment were present but observed two distinct causes that resolved these access failures. In some cases the Atlassian account did not have Site Access at the Atlassian site level; granting Site Access in the Atlassian site admin console restored portal access. In other cases users remained signed in with sessions that did not reflect current permissions; a full sign-out and subsequent sign-in via Okta refreshed the session and allowed access to Confluence spaces. Each remedy was verified by the user regaining access after the respective action.

Source Tickets (2)
120. User/employee visibility missing in Academy Five due to location-specific permission
90% confidence
Problem Pattern

A manager could not find an employee in the Academy Five schedule (Stundenplan) and therefore could not approve leave. The employee record did not appear when searched; symptoms indicated a visibility or location-permission mismatch rather than a system error. Affected system: Academy Five scheduling/visibility controls.

Solution

It was confirmed the manager's default location was set to 'Distance Learning' and the employee lacked access permission for that location. The employee was granted the required 'access' permission for the 'Distance Learning' location in Academy Five and subsequently appeared in the schedule, restoring the manager's ability to approve leave.

Source Tickets (2)
121. Developer access provisioning in vendor DB portal (MongoDB Atlas) for collection-level use
85% confidence
Problem Pattern

A developer requested access to a vendor-managed DB portal (MongoDB Atlas) to use specific collections and the same collection permissions as another user. No error messages were reported; the request was for account-level access and authorization to target databases/collections.

Solution

DevOps provisioned the requested MongoDB Atlas (account.mongodb.com) developer access and granted the user authorization to the specified target databases (reportserver and reportbuilder) and collections consistent with the referenced user. The user confirmed they could access the Atlas account and collections after provisioning.

Source Tickets (1)
122. GitLab access activated by enabling the Okta GitLab application for new user
92% confidence
Problem Pattern

Users could not sign in to or access GitLab because their Okta GitLab application access or account linkage had not been provisioned. Symptoms included inability to reach repositories or repository-specific permission errors, prompts to authenticate outside Okta, access requests stuck in pending approval due to approver assignment or hidden email addresses, or vague/unexplained errors immediately after accepting GitLab's Terms of Service. Affected systems included GitLab, Okta (okta.iu.org), and approval/workflow tools (for example Jira).

Solution

Support enabled the GitLab application on affected users' Okta accounts (okta.iu.org) and assigned GitLab licenses when required; those access changes propagated within the typical 5–10 minute window. When access requests were stuck in pending approval, support corrected approver assignments or completed the approval in the workflow (for example Jira automation) so the Okta app assignment could proceed. For accounts that had been created outside Okta or where SSO was not yet provisioned, support unlocked SSO or routed the request to the DevOps Service Desk to provision or link the account. Support also advised users to link their GitLab account to the institutional IU group (https://gitlab.com/groups/iu-group) when applicable. Cases that produced unexplained errors immediately after accepting GitLab’s Terms of Service were escalated to DevOps for further investigation. The same Okta app-assignment and approval-check process was applied when granting access to other institutional applications (for example AWS or integrations used for deployments such as Salesforce).

123. SSO group assigned but no provisioned user account in target SaaS (SSO authentication without app user mapping)
91% confidence
Problem Pattern

Users completed Okta SSO but were denied access because the target SaaS had no matching active local account, had an inactive or unlinked account, or had a mismatched SSO identifier/username/email (including typos, duplicate external accounts, or when the SaaS username differs from the user email). Symptoms included app‑specific errors such as “No active <App> account found for ID <email>”, “Unknown User: There is no active account for <email> at the org with id <id>”, “You are not a part of any organizations that are SAML enabled.”, “access_denied” with 404, localized “user not found” text, or misleading “Username or password invalid” despite successful Okta authentication. Failures commonly occurred on first‑time logins before provisioning/import completed, after username/email changes that impacted org membership or licenses, or when apps were launched via non‑Okta portals. Affected systems were SaaS apps that require separate local accounts or provisioning (examples: GitLab, Miro, Datadog, Port.io, Workday, Salesforce).

Solution

Support confirmed Okta authentication had succeeded but access failed because the SaaS did not map the SSO identifier to an active local account, the local account was inactive or unlinked, the SSO identifier (username/email) differed or contained a typo, provisioning/import runs had not yet created the account, or the user’s org membership or license had been lost after an email/username change. Incidents were resolved by one of the following corrective actions depending on the SaaS onboarding model and root cause: administrators created or reactivated the local SaaS account and associated or relinked the Single Sign‑On ID/email to that account (examples: re‑adding and linking a Miro account; restoring a license after an email change); where onboarding was automated, access became available after the provisioning/import run or after support manually triggered an Okta user‑import/task so the user record imported immediately (Workday example); directory email/identity mappings were corrected or duplicate external accounts were consolidated/enabled so the SaaS could match the SSO identifier (GitLab contractor example); in cases where the assigned SaaS username differed from the user’s email, the username/email mapping was corrected and the user regained access (Salesforce example). Tickets also showed app‑specific misleading errors (Datadog “Unknown User…”, SAML‑membership errors, Port.io “access_denied” with 404, verification codes delivered but login still failing, and forgot‑password emails not received). Where a SaaS required its own access request process, support redirected requesters to that portal and some tickets were closed after no response. Overall, resolution required aligning the SaaS account/organization/license state with the SSO identifier or allowing provisioning/import propagation to complete.

124. SaaS access tied to legacy email after legal name/email change
95% confidence
Problem Pattern

Users were unable to sign into SaaS applications when the application account record retained a previous email address after a legal name or email change. Symptoms included failed logins, password-reset emails being sent to an old/alternate address the user no longer controlled, and inability to access service resources (for example course materials or account dashboards). Affected systems included SaaS apps such as ChatGPT Playground, PMS, and MyCampus. Triggers commonly involved M365 account renames or identity/email updates that were not reflected in downstream application accounts.

Solution

Support determined that affected users' application accounts remained associated with their prior email identity, and resolution varied by application. In one ChatGPT Playground case support removed the old account entry, created a new account/entry for the user's current email, and sent an invitation to the updated address which restored access. In a PMS case the account was still linked to the old email and support referred the user to the application owner’s service portal so the application team could update the account email; access was restored after the app team updated the record. In a MyCampus case the stored MyCampus email differed from the user’s Microsoft 365 address, causing password-resets to be delivered to an unavailable address; support instructed the user to authenticate to MyCampus via the Okta dashboard and access the MyCampus app while signed in with the existing Microsoft 365 account, which restored access without updating the app-stored email. Resolution paths therefore included reprovisioning or recreating the account by support, sending an invitation to the updated email, referral to the application team/service portal to edit the account, or using SSO (Okta) to bypass app-level password-reset/email mismatches when supported by the application.

125. Application edit/repository permissions missing (Confluence, GitLab)
90% confidence
Problem Pattern

Users reported inability to edit Confluence pages or access GitLab repositories due to missing application-level edit/repository permissions. No specific error codes were provided; the symptoms were lack of editing controls in Confluence and lack of GitLab project access for a new team member. Affected systems were Atlassian Confluence and GitLab and the issue presented as insufficient role or permission assignments within the target application.

Solution

The incidents were resolved when the application owners/admins granted the appropriate application-level permissions to the affected users. Confluence editing rights were assigned by the Confluence space admin (Stefan Amarasinghe) and GitLab project/repository access was granted by the GitLab owner/admin (Ramazan Arslan), after which users could edit pages or access the GitLab resources.

Source Tickets (2)
126. Account invitation email delivered to junk/spam preventing onboarding (1Password)
95% confidence
Problem Pattern

A user did not receive a SaaS account join invitation because the provider's invitation email was delivered to the user's junk/spam folder and subsequently deleted. The affected system was the vendor invitation workflow (1Password) and the symptom was a missing activation/join email rather than an authentication or permission error.

Solution

Support resent the 1Password invitation to the user's email address, which restored the normal account-join workflow after the new invitation was received in the user's inbox.

Source Tickets (1)
127. Lost Confluence spaces and Jira boards after extended absence (SSO/assignment propagation)
90% confidence
Problem Pattern

User returned from an extended leave and found previously available Confluence spaces missing (only default spaces visible) and Jira boards redirecting to the service portal instead of opening. The account remained present in Okta/SSO but space- and board-level visibility was gone and users could not access familiar project content. No explicit error codes were shown; symptoms were missing space listings in Confluence and redirection instead of board access in Jira.

Solution

Support restored Confluence visibility by granting the user general Confluence access so the missing spaces could be re-added to the user's view. Jira access was restored after the user signed in via the Okta dashboard, logged out and back in, and allowed a short period for Okta/SSO provisioning changes to propagate; subsequent login presented the normal Jira boards. No further remediation was required.

Source Tickets (1)
128. Access requests for non‑IT‑managed systems (Workday) redirected to product support
95% confidence
Problem Pattern

Users reported inability to access Workday (login failures or missing permissions) or inability to view specific Workday objects (for example DS Customer Details or invoicing/billing records). Requests frequently arrived to IT or other teams (for example EPOS) with no Workday error codes; some records showed a 'pending approval' status captured by Automation for Jira. The affected system was Workday; its permissions and approval workflows were managed outside the IT organization.

Solution

IT support identified that Workday access and administration were handled by HR rather than IT. Requesters were informed which team owned Workday permissions and directed to the HR Workday support mailbox (wd-support@iu.org) for permission changes or administrative questions; IT then closed or relinquished the ticket. When Automation for Jira recorded a 'pending approval' status, IT noted the approval workflow was external and that follow-up needed to occur with the HR/Workday support channel or the listed approver. In cases where requests were misrouted to other product teams (for example EPOS), IT recorded the misrouting, advised the requester to contact HR for Workday access, and closed the ticket. Some tickets were closed automatically after a period of inactivity (system-marked Done after 14 days); they could be reopened if the requester replied within the system's reopen window (7 days).

129. Scheduled/integration service inactive blocking Twilio Power Outbound calls
90% confidence
Problem Pattern

User had Twilio access but Power Outbound functionality produced no inbound calls or activity; no explicit error messages were shown. Systems involved included Twilio, Salesforce and the Power Outbound integration; symptom persisted after initial access provisioning.

Solution

The request was forwarded to the specialist team, who confirmed the user already had a Twilio account, granted/activated Twilio access for the user, and ensured the Power Outbound service/process was started and running according to its schedule (service run scheduled from 10:00). The user tested after the scheduled start time and confirmed calls were arriving, which resolved the issue.

Source Tickets (1)
130. Missing Jira project permissions blocking basic ticket operations
91% confidence
Problem Pattern

Users saw 'access denied' errors or were unable to view, create, edit, assign, transition, or download attachments on Jira or Jira Service Management issues and boards. Affected users could not open project boards, access specific tickets, assign issues to themselves, or sign in with an existing identity. These failures were caused by missing Jira accounts, missing project- or board-level permissions/roles, or misapplied/conflicting project-role assignments (for example, simultaneous Member and Developer roles).

Solution

Access failures were resolved by ensuring the user had an active Jira account and by assigning appropriate project- or board-level permissions and roles so users could view, create, edit, assign, download attachments, and transition issues. In Service Portal cases, the Jira Service Management role was applied when required. External-collaborator incidents were resolved by granting external access and applying permissions to the Jira account that matched the user’s Jira identity when multiple email addresses existed to avoid giving access to the wrong address. Several incidents were traced to conflicting project-role assignments (for example, a single user assigned both Member and Developer); removing the conflicting role and setting the correct project role restored access. License assignment was applied when required. Account and permission changes typically propagated within a few minutes. Board-level access for specific boards was sometimes managed separately by project owners.

131. SSO provisioning mismatch causing 'Unknown User' error in DataDog
85% confidence
Problem Pattern

Okta SSO logins to DataDog returned 'Unknown user' indicating no active account for the user at the target org; the user did not appear in DataDog's user list (including deactivated users). The failure reflected an Okta-to-DataDog provisioning/matching mismatch where Okta changes (for example name or email updates or app reassignment) prevented creation or activation of the target account. Similar SSO failures occurred for other SaaS apps (e.g., Miro) when provisioning created a separate/new account.

Solution

Okta-to-DataDog provisioning mismatches were resolved by reassigning the DataDog application to the user's Okta account and allowing Okta provisioning/synchronization to complete (several hours). After the sync the user appeared in DataDog user management and an invite was re-sent to the user's email; accepting that invite activated the account and restored SSO access. In one incident a technician recreated the Okta user account which also restored Datadog access, but the same recreation produced a brand-new Miro user without previous boards or edits; those Miro resources could not be restored by IT and required re-invitation by the board owner(s).

Source Tickets (2)
132. Missing Okta app assignment or account linking preventing dashboard access (Lucid, GitLab)
80% confidence
Problem Pattern

Users could not access Okta-integrated applications via SSO: app tiles were missing from Okta My Apps, SSO launches produced errors or access-denied messages, or no provisioned service account existed for the user. Some users had pre-existing standalone accounts that were not linked to Okta/SSO; other failures occurred when the Okta user record was associated with an outdated email or identity that did not match the target service's account mapping. Affected services included Lucidchart, GitLab, Atlassian Service Portal and other Okta-integrated apps.

Solution

Affected applications were assigned to users' Okta accounts via the Okta Dashboard, which made the app tiles available and, when applicable, provisioned new service accounts. For Lucidchart, assignment in Okta provisioned access once any portal approval completed. GitLab users who had pre-existing standalone accounts required linking those accounts to Okta/SSO; the portal assignment plus account-linking restored normal SSO access. Several tickets reflected access requests that were pending approval in the Okta portal; completion of the assignment resolved those gaps. In one case the user's Okta record remained associated with an old email address, and correcting the Okta email/association and adjusting the Service Portal/Atlassian account mapping restored SSO access.

133. Jira Service Management access redirected to Service Portal due to missing product entitlement
75% confidence
Problem Pattern

Users assigned Service Desk project roles or expected to access a JSM portal were redirected to the Jira Service Portal or could not open the Service Desk interface when following direct Service Desk links. Authentication succeeded and no error codes were shown, but users landed on the portal or saw the portal entry missing or unclickable. This frequently occurred for newly onboarded users whose account provisioning had recently completed. Affected systems included Jira, Jira Service Management, and project-specific portals (for example, Service on Campus).

Solution

The incidents were resolved by granting the affected user a Jira Service Management product entitlement on their Atlassian/company account (site access). After the JSM product license was provisioned on the user account, direct Service Desk links opened the Service Desk interface, portal entries (including Service on Campus) became visible and clickable, and assigned project roles functioned as expected. In these cases the root cause was that product-level Jira Service Management access had not been provisioned during onboarding despite correct project role assignments.

Source Tickets (2)
134. Existing account regained access after password reset or invite delivery
90% confidence
Problem Pattern

Users could not sign in or did not receive password‑reset or invitation emails for accounts that already existed. Affected services included Okta-managed access, portal provisioning, Atlassian/IUGroup, and third‑party apps such as d.velop; reported errors were sometimes non‑specific and lacked explicit error codes. Symptoms included failed sign‑in with an existing password, inability to complete password‑reset or initial‑invite flows (including being unable to change a password to open a ticket), missing or outdated account email addresses, and missing invitation/reset notifications.

Solution

Support verified that affected accounts already existed and restored access by reissuing password‑reset emails or application invitations. When an account had an incorrect or outdated email, support updated the account email and then sent a fresh reset or invitation; when users had not completed an initial reset/invite, a new notification was sent. Okta‑managed access used Okta password‑reset emails; application access used email invitations (for example, Growthbook) and, in one case, a new d.velop invitation was issued. When users could not initiate a password change or create a ticket, support waited until the user was online and performed live troubleshooting to investigate and resolve authentication (for example, Atlassian/IUGroup) while confirming successful sign‑in. In situations without a prior ticket or notification, support located the account by the reported email address before reissuing credentials; users confirmed receipt of reset/invite emails and subsequently regained access.

135. App access restored by assigning app roles/groups or enabling SSO entitlement
95% confidence
Problem Pattern

Users could not access specific applications despite attempting the app's access request flow; symptoms included 'Access Denied', persistent unapproved access requests, or inability to open the app via Okta SSO. Affected systems included SharePoint sites, InvoicingApp controlled by a security group, SF Macros inside Salesforce, Okta‑protected apps (Deskbird), and internal EPOS role assignments.

Solution

Application owners or administrators granted the missing resource permissions and entitlements. Examples from these tickets: the SharePoint site access was granted by the site administrator; SF Macros permissions were enabled for the named users by the Macros administrator (Sarah‑Maria Vogel); a security‑group owner added the user to the InvoicingApp access group; the Deskbird Okta application was activated for the user's Okta account; and EPOS staff and employee roles were assigned to the new developer. Users confirmed access after group/role changes propagated.

136. SaaS access contingent on formal Software‑Request approval
90% confidence
Problem Pattern

User requested credentials for a third‑party SaaS but did not receive access because the organization's provisioning required an approved Software‑Request; symptom was missing account/credentials until approval completed.

Solution

The user was informed that an approved Software‑Request was required and provided the Software‑Request form link. After the Software‑Request was submitted and approved through the service portal, access credentials for the SaaS (Calendly) were issued and the user gained access.

Source Tickets (1)
137. Sandbox / Playground account provisioned by manual invitation
95% confidence
Problem Pattern

User requested access to an internal Playground/sandbox environment but no automatic account existed and no error messages were shown; the requester could not proceed with tasks until a Playground account was created and an invitation delivered via email.

Solution

Support sent a Playground invitation email from the application owner (Vogel, Sarah‑Maria) to the requester (Ester), which provisioned the Playground account and allowed the user to access the environment. The ticket was closed after the invitation was sent.

Source Tickets (1)
138. LMS course content and progress not visible due to missing LMS permission group
80% confidence
Problem Pattern

Users in IU Learning Hub (LMS / LMS365) could not open course items or have progress recorded: course items displayed as "not completed" and attempts to open content returned "does not have access" or access-denied messages. Affected course content included LMS365 modules and videos hosted in Microsoft Teams.

Solution

Support added the user to the LMS permission group (LMS Gruppe). This change restored access to IU Learning Hub / LMS365 course items and Microsoft Teams–hosted materials, and allowed learning progress to be recorded rather than appearing as "not completed." The ticket status was updated accordingly. For membership or dynamic-group issues that prevent permission-group assignment, the People Projects team (people-projects@iu.org) was identified as the owner to adjust or investigate group membership.

Source Tickets (2)
139. Onboarding bulk SaaS access requests with Salesforce provisioning needing a reference user
90% confidence
Problem Pattern

During onboarding the user requested access to multiple SaaS applications (Miro, Jira, Confluence, Canva, Salesforce) and lacked the required licenses/permissions to start project work; Salesforce provisioning required a reference user to complete the setup.

Solution

IT provisioned the requested accesses for Miro, Salesforce, Jira and Confluence and added the user to Canva. As part of the Salesforce setup process the IT team requested a Salesforce reference user to complete role/profile mapping. The user was asked to verify that all requested accesses were available post-provisioning.

Source Tickets (1)
140. Existing SaaS account but user unable to sign in due to credentials (password reset resolved)
90% confidence
Problem Pattern

User reported inability to sign in to an existing SaaS account (no error codes or application-specific errors provided). The account record existed in the application but the user could not authenticate or access the service. Issue was user-facing inability to log in rather than missing account provisioning or role assignment.

Solution

Support confirmed an active account record for the user in the target SaaS and issued a password reset link. The reset link was delivered to the user and the requester confirmed restored access after completing the password reset process. No further configuration or role changes were required.

Source Tickets (1)
141. Access blocked until both Okta SSO entitlement and application-owner group membership were provisioned
90% confidence
Problem Pattern

Users could not access GitLab-hosted projects, sites, or package registries after a GitLab–Okta SSO integration. Symptoms included 404 errors when opening project sites (for example, iu.tech), inability to retrieve NPM packages, or inability to view repositories even when a user could log into GitLab via a non-SSO method. The issue was tied to the user lacking an Okta SSO entitlement or the required application-level GitLab group membership.

Solution

Access was restored by ensuring both the user's Okta SSO entitlement and the application-level GitLab group membership were provisioned. In practice, ITOPS enabled the user's Okta SSO entitlement so the user authenticated via corporate SSO; DevOps then adjusted project access or added the user to the appropriate GitLab group to grant repository and package access. In one incident a 404 on the iu.tech site was resolved after the user switched to Okta SSO authentication (and/or DevOps adjusted GitLab access). DevOps support was engaged when application-level changes were required.

Source Tickets (2)
142. Department‑managed course app (Charly) linked from MyCampus but access controlled by Exams Office
90% confidence
Problem Pattern

Department‑managed course or exam applications linked from the central MyCampus portal were inaccessible because account provisioning, role assignments, or application licenses were controlled by the Zentrales Prüfungsamt. Symptoms included third‑party 'start a free trial' prompts when institutional SSO or entitlements were not present, 'You are not authorized to view this portal' errors when opening the Prüfungsamt Jira Service Management board, inability to access user profiles or platform functions (for example, instructors appearing with student privileges in Moodle mod_quiz), or no explicit error while the app remained unusable. Affected systems included MyCampus links, department‑managed apps (e.g., Charly), Moodle‑based online exam platforms, and the Prüfungsamt service portal.

Solution

Support determined the affected applications were managed and provisioned by the Zentrales Prüfungsamt (Exams Office) rather than central IT, so central IT could not create accounts, assign roles, or grant application licenses. Reported symptoms varied: external apps showed a 'start a free trial' prompt when institutional SSO or entitlements were not provisioned, users saw 'You are not authorized to view this portal' when accessing the Prüfungsamt Jira Service Management board, platform functionality or user profiles were inaccessible, and some instructors were signed in with student roles (e.g., Moodle mod_quiz). Access and functionality were restored after the Prüfungsamt provisioned the required accounts/licenses or corrected role/enrollment assignments on the respective platform; instructors regained grading privileges once roles were fixed. Users were referred to the Prüfungsamt service intake (Jira Service Management at atlassian.net) or to Exams Office contacts (zpa-dualesstudium@iu.org, akad-pruefungsamt@iu.org, lehrende-pruefungsmanagement-dualesstudium@iu.org) for provisioning and entitlement requests. When the application was outside central IT responsibilities, support sometimes closed tickets after making the referral.

143. SaaS access requiring vendor/portal provisioning or separate SelfService request
90% confidence
Problem Pattern

Users reported inability to access third‑party SaaS applications needed for work — common symptoms were 'no access' or inability to view content without explicit error codes. Problems occurred even when users were added to internal Okta/IT groups or had requested access. Underlying causes varied: some products required external vendor provisioning or a separate application request via a vendor portal, while others required users to create an external account (for example, a free self‑signup).

Solution

Cases were resolved by recognizing two distinct provisioning models and following the model each product required. For vendor‑provisioned products, Okta group membership alone did not create an active application account and requests were handled through the vendor or an Application SelfService portal (for example, a Port.io request submitted via the Atlassian service portal was processed and closed as Done; Marketing Cloud provisioning required the external Marketing Cloud request portal and the vendor request link was provided). For products that supported self‑signup, access was resolved by the user creating an external account (for example, the user created a free Figma account with team‑lead approval attached).

144. Invitation-based SaaS access blocked by undelivered invite (resend resolved)
90% confidence
Problem Pattern

Users did not receive account-related emails (invitation links, password-reset emails, or access-token/reset links) from SaaS or SSO-integrated applications. Emails were often routed to spam/quarantine or marked as phishing by mail clients, or recorded as sent but could not be validated because sent-items copies were not available; in-app “request approval” or similar UI actions sometimes produced no visible effect. Affected systems included invitation-based SaaS and SSO-integrated apps (examples: Calendly, Atlassian, JFrog, n8n).

Solution

Incidents were resolved by one of two primary outcomes observed across tickets. In many cases support reissued the missing email link (a resent invitation, password-reset email, or access-token/reset link restored onboarding or account access). In several incidents the invite or reset had been routed to spam/quarantine or labeled as phishing by the mail client; admins resent the invite after confirming the quarantine and advised recipients to check Spam/quarantine folders. In other cases users gained access by signing in through the identity provider portal (for example, Okta SSO granted access to JFrog) which bypassed the undelivered email flow. One ticket recorded forwarding the issue to vendor support and a vendor agent sending a reset link directly to the user. Support sometimes could not locate the originally sent message because sent-items copy was not enabled, which was noted during troubleshooting.

145. Jira board/project access controlled by board/project owner rather than central IT
81% confidence
Problem Pattern

Users with valid Atlassian/Jira product access were unable to view or open a specific Jira project or board (often a company-managed project) while retaining general platform access. Attempts to open the project link returned permission/access errors or pages failed to load with no explicit error; some users could not view or watch individual issues. The failure was isolated to a single project/board whose membership and view/watch permissions were managed by the project/board owner rather than centrally.

Solution

Support verified that affected users had an active Atlassian account and valid Jira/Mondayboard product access, and granted product access when it was missing. Investigation showed the incident was isolated to a company-managed board/project whose membership, browse, and watch permissions were controlled by the project/board owner rather than by central IT; granting product-level access alone did not enable viewing or watching issues. Incidents were resolved when the project owner added the user in Project settings > People (Users and roles) and assigned a role that included Browse Projects/watch rights (for example, Browser/Viewer). When the project owner could not be identified from platform metadata, agents advised contacting the tenant/Jira admin to identify or assign an owner or requested the requester supply the owner contact; some tickets were closed after 14 days with no response. Tickets were closed after product access was granted when applicable and after users were informed that owner-controlled membership was required to view/watch the project or issues.

146. External/guest myCampus account access restored via password‑reset for temporary lecturers
95% confidence
Problem Pattern

Former or external lecturers could not sign in to myCampus with their external (ext) account and reported being locked out or lacking credentials; symptoms were inability to authenticate but the account existence was uncertain.

Solution

Support verified that the external lecturer account was still active (christian.mayer.ext@iu.org) and confirmed account validity. The lecturer was instructed to use the myCampus 'forgot password' flow to set a new password and regain access; the ticket was closed after this guidance.

Source Tickets (1)
147. GitLab repository access granted by group membership
95% confidence
Problem Pattern

Users were unable to access GitLab repositories or projects they previously used. Symptoms included inability to view or open repositories, and SSO-related login failures when attempting to reach projects—often without explicit error messages. Affected systems included GitLab and the institution SSO integration.

Solution

Access was restored either by adding the user's account to the IU GitLab group/organization or by re-granting the user's project-level permissions in GitLab. In some cases users had submitted requests via the DevOps Portal (Atlassian Service Desk) and access was fixed after the account was added to the group; in SSO-related cases administrators re-applied project permissions which resolved SSO login/access failures. Systems involved included GitLab and the institution SSO; after permissions were updated users confirmed they could access the repository or project and were directed to verify their GitLab group or project membership.

148. Viva Goals blank/white page in browser resolved by private mode or Teams app
90% confidence
Problem Pattern

Viva Goals loaded to a blank white screen in multiple browsers while other Microsoft 365 left‑menu apps functioned normally; symptoms reproduced across Safari, Firefox and Edge and occurred despite correct group membership and licensing.

Solution

Support confirmed correct licensing and group membership and the immediate workaround that resolved the blank page: opening Viva Goals in Microsoft Edge InPrivate mode. An alternative workaround that also worked was using the Microsoft Teams Viva Goals app. Clearing browser cache or using private/incognito mode were recommended if the issue recurred.

Source Tickets (1)
149. Onboarding access gaps when specific applications or reference users were omitted from the request
85% confidence
Problem Pattern

New hires or users reported missing access to specific SaaS apps (example: GitLab, Miro) during onboarding despite a general access request. The original ticket or onboarding form had omitted the target application and/or a reference user, so the Okta SSO application entitlement was never assigned and the user could not reach the app for day‑one tasks.

Solution

Investigators confirmed the application had been omitted from the original onboarding request and no reference-user mapping existed. The missing SaaS application (GitLab / Miro) was manually enabled/assigned in Okta for the user; the app became available within minutes after assignment. Requesters were informed to include specific applications and a reference user in future onboarding tickets so standard app entitlements are provisioned automatically.

Source Tickets (2)
150. Login failures caused by local SaaS password changes instead of using Okta SSO
90% confidence
Problem Pattern

A user reported being unable to authenticate to a SaaS product (Salesforce) after changing the product password directly; the password-reset flow did not restore access and authentication attempts failed. The environment uses Okta SSO, and the user attempted to use or reset a separate SaaS credential instead of the SSO path.

Solution

An administrator issued a Salesforce password reset and informed the user to sign in via the Okta SSO portal (okta.iu.org), where no separate Salesforce password is required. After the reset and guidance to use Okta SSO, the user's access was restored and the ticket was closed.

Source Tickets (2)
151. OpenAI / ChatGPT access provisioned via vendor invitation email
91% confidence
Problem Pattern

Users requesting corporate OpenAI/ChatGPT access did not receive the vendor invitation or confirmation email required to activate accounts, preventing account creation. Symptoms included no invitation delivered after initial request or resend, invitation links that were expired or invalid, invite emails missing from inboxes or routed to Spam/Junk, access-request portals showing requests as completed and blocking activation, provisioning states indicating an account already existed for the user, or vendor-mandated phone/SMS verification blocking signup when the user lacked a company mobile device. Affected systems included corporate OpenAI/ChatGPT/Playground provisioning, access-request forms (e.g., IU Learning Hub, SharePoint), and email delivery.

Solution

When vendor invitations were missing, blocked, or invalid, administrators generated and sent the vendor invitation to the user’s corporate email and resent fresh invitation links (sometimes more than once) when original links had expired or failed. Support checked provisioning and access-request systems and, when an account already existed for the user, closed the ticket without issuing a new invite. Email delivery was confirmed and delivery issues were addressed (including routing to Spam/Junk). Support handled request‑form states that incorrectly showed completion by manually dispatching the vendor invite. In cases where vendor signup required mobile phone/SMS verification and users lacked a company mobile device, support re-sent the invite and advised users to provide a private/personal mobile number so the verification step could be completed. Access was provisioned after users accepted the vendor invitation and finished account setup (including any required phone verification).

152. Care: granting cross‑location access for centralized B2B Customer Service team
90% confidence
Problem Pattern

Users assigned to centralized or cross-site roles were unable to view locations or specific sections in Care and related systems (e.g., Academy Five). Symptoms included missing locations in location lists and missing section visibility (for example, the 'Prüfungsleistungen' / Examination results section) without error codes. Affected users included centralized B2B Customer Service members and academic staff who needed cross-regional access to student data.

Solution

Care administrators updated the affected user accounts to grant cross-location and cross-regional access and to restore missing section-level permissions (notably the 'Prüfungsleistungen' / Examination results section) and role assignments in Care Admin and Academy Five. The permission and role changes were applied by the Care admin (Mike Möhling) and took effect immediately or after the users signed out and signed back in; users confirmed access afterward.

153. Access requests blocked by user confusion and duplicate tickets when some entitlements already existed
90% confidence
Problem Pattern

Users reported missing access to GitLab, Confluence and/or AWS but provided no explicit error messages. Multiple duplicate requests were submitted for the same access need, causing uncertainty about request status. In several cases some entitlements (GitLab, AWS) were already present while other product access (Confluence) remained unprovisioned.

Solution

Support reviewed ticket history and system entitlements, confirmed that GitLab and AWS memberships were already present for the user, and granted the missing Confluence access. Duplicate tickets were identified and consolidated; the user was notified of the existing provisioned access, the newly granted Confluence entitlement, and that the outstanding request was closed.

Source Tickets (3)
154. Access to corporate ChatGPT/OpenAI blocked by missing invitation or pending approval
90% confidence
Problem Pattern

Users reported lack of access to the corporate ChatGPT/OpenAI account after requesting it; there were no explicit error messages, only that no invitation or approval email had been received and the user could not use the ChatGPT service. The symptom was inability to sign in or appear as a member of the organization account despite an approved request being expected.

Solution

Access was restored when an administrator sent the organization-level ChatGPT/OpenAI invitation to the user's corporate email. The user accepted the invite and confirmed they could access the corporate ChatGPT account; the ticket was closed after confirmation.

Source Tickets (2)
155. Internal developer tool and documentation access blocked by missing Okta tiles or group assignment
85% confidence
Problem Pattern

Users could not view internal developer resources (Conductor Kafka event streams, Syntea documentation in GitLab) or access the Jira support portal; symptoms included absence of Okta dashboard application tiles and denied access without explicit error codes. The issues presented as inability to reach the expected app views or documentation due to missing application entitlement or group membership.

Solution

The users' accounts were granted the required application permissions and group memberships and new Okta application tiles were added to their Okta dashboards. After the assignments and providing the Okta portal link where applicable, users were able to open Jira and view Conductor/Kafka events and the Syntea documentation in GitLab.

156. Conduktor (Kafka topics) access required platform‑owner permission assignment
90% confidence
Problem Pattern

Users reported missing or insufficient Conduktor access: inability to sign in via IU Okta SSO, missing Conduktor entitlements or Okta application assignment, inability to view required Kafka topics, or lack of Conduktor admin privileges. Symptoms typically presented without explicit error codes. Affected systems included Conduktor, Kafka (topic‑level permissions), Okta SSO, and dev-auth (for local development).

Solution

Access failures were resolved by ensuring the Conduktor SaaS entitlement/application was assigned in Okta and allowing Okta application assignments time to propagate (about 5–10 minutes). Where users could authenticate but could not view topics, the platform owner granted topic‑scoped Kafka permissions (for example, Student Enrollment topics). Conduktor admin requests were resolved by adding users to the Conduktor Okta admin group / assigning the Conduktor admin role. Support also assigned Conduktor licenses (and Figma licenses when requested). Dev-auth (auth-dev) account provisioning was treated as out of scope and was referred to the DevOps/service owner.

157. Installed client but no provisioned account or license (VPN / workspace apps)
90% confidence
Problem Pattern

Users were unable to access specific applications (examples: NordLayer VPN, Deskbird, Twilio Flex) despite clients being installed or access requests submitted. Symptoms included failed sign-in attempts or lack of access with no explicit error messages; in Twilio cases, authentication sometimes only succeeded via the Twilio Flex-specific sign-in URL. Incidents frequently followed onboarding or role changes where required accounts, licenses, or permissions were missing.

Solution

Access failures were resolved either by provisioning missing accounts/licenses and granting required permissions after obtaining administrative approval, or by directing users to the correct service sign-in endpoint. Named administrators assigned NordLayer and Deskbird licenses/accounts and granted Twilio Flex access on user profiles; once provisioning completed, users were able to sign in. In some Twilio/Flex incidents the problem was resolved by having users sign in via the Twilio Flex URL (https://flex.twilio.com) or an alternate Twilio sign-in link when the standard portal failed. These incidents commonly occurred during onboarding or role changes and were closed after confirmation that provisioning or the correct sign-in endpoint allowed successful authentication.

Source Tickets (3)
158. Platform license granted but board/workspace permissions still owner‑controlled (Miro)
90% confidence
Problem Pattern

User could not open or access a specific Miro board because their account lacked a Miro platform license in Okta. No error codes were shown; the symptom was inability to open the specified board. Board-level access was potentially separate from platform license entitlement.

Solution

General Miro access was enabled by assigning a Miro license to the user's Okta account. It was noted that, even after licensing, access to particular boards could still require the individual board owners to grant explicit permissions.

Source Tickets (1)
159. SharePoint site access denied despite 'Contribute' permission
95% confidence
Problem Pattern

Users were unable to access content on a specific SharePoint Online site after being granted 'Contribute' permission. Symptoms included persistent 'Access denied' or 'You don't have permission' UI, failure of Okta dashboard links to open the site, and missing top navigation/menu with a prompt to 'enable Office Graph' on the sharepoint.aspx page. Issues persisted across browsers and after propagation delays and affected team intranet sites and site Members groups. No standard SharePoint error codes were reported.

Solution

Access was restored by increasing the user's effective site permission level from Contribute to Edit by adding the user to the site’s default Members group; the original Contribute grant remained but the Members-group Edit membership produced the needed access. This membership change was applied and verified on the Syntea (Synthetic Teaching) SharePoint site. One additional ticket recorded UI symptoms (missing top navigation/menu and an 'enable Office Graph' prompt) and a failing Okta dashboard link; that ticket noted access was restored but did not document the remediation steps.

Source Tickets (2)
160. Private SaaS instance access required vendor invitation link
80% confidence
Problem Pattern

Users could not access a private SaaS application or its workspace because they lacked an account or membership on the organization's deployment. Symptoms included inability to reach or enter the workspace, generic access-denied behavior, the vendor dashboard showing no account or site entry for the requested location, or the target device's content being managed locally (e.g., via USB) instead of through the SaaS. Problems commonly appeared during initial access or provisioning requests for the corporate SaaS instance.

Solution

Access was restored either by issuing invitation links for the organization's private SaaS instance or by confirming that the SaaS did not apply to the target resource. Administrators generated and sent invitation links (examples observed: Growthbook and d.velop); recipients used those links to create/activate accounts and join the workspace, after which access was granted. In other cases an investigation found no account or site entry in the vendor dashboard (example: ViewNeo) and the device's content was updated locally via USB, so SaaS access was not applicable and no invitation was issued. These outcomes applied to single or multiple users and did not require changes to SSO configuration.

Source Tickets (3)
161. Shared mailbox visibility in Outlook required admin grant plus user-side mailbox addition
90% confidence
Problem Pattern

A new employee was unable to open or see a team/shared mailbox in Outlook despite administrative provisioning. The symptom was inability to open the shared mailbox client-side; no explicit error codes were reported. Affected systems included Outlook and the specific shared mailbox address (cpse-fernstudium@iu.org).

Solution

Administrators granted the user permissions to the shared mailbox on the mailbox object. After the admin-side permission assignment, the user gained access by adding the shared mailbox to their Outlook client (per Microsoft support guidance). The combination of admin grant + user-side mailbox addition resolved the access issue.

Source Tickets (1)
162. External instructor using private/non‑corporate email unable to sign in to Okta, Office and myCampus
78% confidence
Problem Pattern

External/guest instructors using private/non‑corporate emails reported loss of access to Okta and Office 365 services (office.com, Teams, Microsoft Forms) and related campus services (myCampus/Moodle). Symptoms included desktop Office apps failing while web access continued, inability to sign in directly to office.com/Teams, and inconsistent credential acceptance across entry points (for example, an old password worked via MyCampus while direct access required a newly set password). Logs often showed prior successful sign‑ins but current authentication failed or behaved inconsistently. In some incidents license assignment changes for external‑lecturer accounts correlated with the loss of desktop app access.

Solution

Support inspected sign‑in history and confirmed prior successful logins, then generated and sent password‑reset/activation emails for Okta and myCampus when users had incomplete activation flows. For one incident support identified that external‑lecturer license assignments had been changed, which disabled desktop Office apps while web access remained; an admin re‑applied/reset the appropriate license assignment and desktop Office functionality was restored. Teams/Exchange access and Moodle/myCampus were checked for inconsistent credential acceptance (cases were observed where an older password still granted access via MyCampus/Teams while direct office.com access required the newly set password). Vendor‑managed billing/Abrechnungstool issues were communicated to the vendor and considered out of scope for internal SSO support. Several tickets remained awaiting user action when users did not complete the provided password reset/activation steps.

Source Tickets (2)
163. macOS local admin privilege required for installing Teams/npm fulfilled via temporary SelfService elevation
90% confidence
Problem Pattern

A macOS user without local administrator privileges could not install Microsoft Teams or npm; installations were blocked because the device account lacked admin rights and the user reported no specific error codes beyond permission failure.

Solution

The user was added to the Mac admin group which made the SelfService 'Admin for 30 min' app available. The user launched the 'Admin for 30 min' app to obtain temporary administrator privileges and then successfully installed Microsoft Teams and npm.

Source Tickets (1)
164. Expired or invalid SaaS activation link preventing Datadog access despite Okta tile visibility
92% confidence
Problem Pattern

A user sees a SaaS application tile in Okta but cannot access the application because the emailed account confirmation/activation link expired or the account remained unconfirmed. In some incidents the activation link redirected to the institutional/IdP login page but failed to accept credentials, sometimes suspected to be caused by account renaming or username mismatches. Symptoms included 'unable to login', error messages prompting re‑invitation, or activation redirects that never completed; affected systems included Datadog, GitLab, and LinkedIn Learning.

Solution

Support reviewed Okta provisioning records and the associated service request state and either re‑completed or re‑issued the account activation/invitation so a fresh confirmation email was generated; after the re‑invitation processed, users reported access was restored. In at least one incident where the emailed activation link redirected to the institutional login and would not accept credentials, support instructed the user to sign into Okta and launch the application from its Okta tile (SSO), which immediately restored access without issuing a new invitation. Incidents commonly involved Okta provisioning's time‑limited confirmation window (typically ~3 days) causing unconfirmed accounts to present as login failures; account renaming or username mismatches were suspected contributors in some cases.

Source Tickets (3)
165. Salesforce onboarding: permission mapping via comparison/reference user
91% confidence
Problem Pattern

Users reported lacking Salesforce permissions compared to a colleague's account, preventing environment-specific tasks (for example creating Selbstzahlerverträge), accessing consoles (Service Cloud, Marketing Cloud), or viewing linked records from integrated systems (for example EPOS) and DWH source data. Symptoms included inability to see or open linked Salesforce records, missing profile or permission-set assignments, absent public-group membership or approver settings, and often no explicit error messages. Permission mapping was frequently blocked when requesters could not nominate a valid reference user or when frontline support lacked privileges to modify permissions.

Solution

Support used an existing Salesforce reference user where available: support searched for the nominated account and replicated the reference's profile, permission-set assignments, approver settings and public-group memberships to the requester account. The same reference-user mapping was applied for console/organizer access (Service Cloud, Marketing Cloud) and for access needed to retrieve DWH source data. Specific missing permissions were added when required (for example granting the DMSD permission to create Selbstzahlerverträge). When a valid reference user was missing or the reference had outdated/incomplete permissions, tickets were escalated to SalesTech or permissions subject-matter colleagues who identified the correct role and permission mapping and applied the changes. When frontline support lacked the privilege to modify rights (being limited to account creation), requesters were directed to submit a SalesTech Service Portal or Jira Service Management request and the SalesTech/permissions team applied the permission changes. For integration-related requests (for example read-only access so EPOS staff could open linked Salesforce records), approvals were recorded in tickets but support repeatedly requested a valid reference user before provisioning; provisioning actions and approvals were recorded in the ticket when completed, though some tickets lacked technical steps or were closed for inactivity.

166. Missing Okta application assignment blocking SSO access to SaaS apps
91% confidence
Problem Pattern

Users authenticated successfully to Okta but could not access specific third‑party SaaS or Okta‑integrated applications via SSO. Symptoms included the error "The user is not assigned to the application", missing or hidden application tiles or SSO buttons in the Okta dashboard, or immediate denial upon opening the target application. Affected services observed included Atlassian Confluence and Jira (and Trello), Storyblok, Monday.com, OneTrust, Microsoft 365, and Okta‑integrated AWS applications.

Solution

Issues were resolved by ensuring the user had the required Okta Enterprise Application assignment or membership in the SSO group for the target service. Support located the user in the Okta Admin Console and either assigned/activated the relevant Enterprise Application (examples: Monday.com, OneTrust, Microsoft 365, Confluence, or Okta‑integrated AWS apps such as aws.CP.AIG2M.Dev) or added the user to the designated Okta SSO group for group‑based integrations (examples: Atlassian/Jira and Storyblok; IU‑ZZ‑OK‑DYN‑Atlassian‑SSO). Several tickets noted that product licenses (for example Jira) were already provisioned but SSO access remained denied until the application assignment or group membership propagated. When an application tile was not visible in the user’s Okta Home, support verified that the user could authenticate to Okta and used the Okta Dashboard group listing to access the application while investigating; after assignment or propagation completed, users authenticated via Okta SSO and reached the target application. In one Confluence case support assigned/activated the Confluence app in Okta and directed the user to check the Okta portal for the tile.

167. Application access controlled by separate product owner (non‑IT) requiring requester redirection
80% confidence
Problem Pattern

User had a corporate identity but could not access specific internal/course management applications because those apps were owned and permissioned by another internal team. There were no SSO or credential errors; the limitation was that access and role assignments were controlled by an internal product owner (e.g., LCC for Deputatsplaner and Kompetenzabfrage).

Solution

Support determined that the two applications were managed by the LCC team and informed the requester that access must be requested from that owning team. The ticket was closed after advising the user to contact LCC for the app‑level permissions required for course assignment and scheduling.

Source Tickets (1)
168. New hire unable to sign into Okta/Microsoft 365 due to initial account/authentication state
75% confidence
Problem Pattern

A newly onboarded employee could not sign in to Microsoft 365 and saw 'The user is not assigned to the application' while Okta sign‑in also failed. The user had not previously authenticated to Okta and the device was not yet signed into Windows, leaving the account in an initial/unactivated state and preventing SSO access.

Solution

The issue was resolved by sending a password‑reset link to the employee’s registered recovery (Gmail) address. After the user reset their password via that link and completed an initial Okta sign‑in, Microsoft 365 access succeeded via Okta SSO.

Source Tickets (1)
169. Product-level account provisioned but content/site access remained owner-controlled
90% confidence
Problem Pattern

Users could authenticate to an application (Confluence, SharePoint, MyCampus, Salesforce) or had product-level access created, but they still could not view pages, sites or course content. No explicit error codes were reported; symptoms were limited visibility or inability to open specific spaces/sites/courses despite successful sign-in. Requesters expected IT product provisioning to grant content-level access and sought broader visibility or admin-style access.

Solution

Product-level entitlements and accounts were provisioned (Confluence, SharePoint, Salesforce, MyCampus). In each case the remaining blocker was content-level permissions controlled by space/site/course owners: Confluence and SharePoint access had to be granted by the space/site owners, and MyCampus/Salesforce visibility was aligned by using a supplied reference user. IT created the accounts (Salesforce password-setup email sent) or assigned the product entitlement, requested a reference user where needed, and confirmed that after owners copied/assigned the matching content permissions the users could access the requested pages/courses.

170. Okta application assignment, external‑user provisioning and SSO login loops
88% confidence
Problem Pattern

Users reported inability to access web apps (Deskbird, Jira/Atlassian, Confluence, GitLab, Figma, Lucidchart) despite having IU accounts or being collaborators. Symptoms included missing Okta dashboard tiles, blank access (no account provisioned), or a login loop when Atlassian accounts were configured with non‑IU/external email addresses. Requests also included time‑limited/temporary access needs and missing product licenses.

Solution

Access issues were resolved by provisioning or assigning the target applications and licenses within Okta and by creating/activating target‑system accounts for external collaborators. Temporary access was granted by assigning the Okta application with an expiration date (example: Deskbird access set to expire 28‑Feb‑2025). For external/consultant Atlassian users an Atlassian account was created and a password‑reset/invite link was delivered to the consultant's private email, and users experiencing a login loop were routed to the IU Service Portal/Okta tile so Atlassian SSO mapped correctly to their IU session. Requested Confluence, GitLab, Figma and Lucidchart entitlements were assigned in Okta so the developer could sign in via the institution SSO.

171. Access blocked by missing invitation or site‑owner controlled invite links
90% confidence
Problem Pattern

Users were unable to open d.velop portals or SharePoint sites/documents (for example, verifizierte Zeugnisse or iubhfs sites) despite having an account or expected group membership. Affected pages or documents failed to open or appeared inaccessible with no explicit error code or visible permission change. Failures were associated with outstanding or undelivered invitations, missing site membership because site owners/administrators had not issued invite links, or incorrect approver/permission attributes on the user record.

Solution

Access was restored by ensuring outstanding invitations were delivered or by having site owners/site administrators issue invite links and add users to site membership. For the d.velop portal a new invitation email was triggered and delivered; in at least one case an incorrect approver attribute on the user record was corrected before the invitation was sent so the portal accepted the access change. For SharePoint affected site owners or administrators issued invite links and added users to the site; in several cases users were directed to ask someone who already had access to identify the site administrator because IT support could not grant site access directly. After invitation emails or links were delivered and any approver/permission attributes were fixed, users confirmed successful access.

172. SharePoint booking portal and embedded PowerApp access requiring site/App-owner permissions or AAD security-group membership
90% confidence
Problem Pattern

Users could open a SharePoint-hosted booking portal but were blocked from area-specific actions (for example a PowerApp 'Creative Lab..beantragen') with generic 'access denied' symptoms. IT staff were able to grant general SharePoint access but the embedded PowerApp or per-area booking functions remained inaccessible because those permissions were controlled by the site or app owners and by specific Azure AD security-group membership. Requests sometimes included creating or populating a security group from a Teams channel to manage PowerApp access.

Solution

General SharePoint access to the TeamsProvisioningAdmin/booking portal was granted by IT. For PowerApp or area-specific permissions that were owner-controlled, the site/app owners were engaged and users were added to the owner-managed group. Where required, a new Azure AD security group was created and populated with members from the Teams channel and project owners were assigned (owners set as requested). Adding the user to the group that had the PowerApp permissions restored the denied booking/PowerApp actions and the requester confirmed access.

Source Tickets (3)
173. SharePoint thesis-submission workflow with directory-based supervisor/student access
95% confidence
Problem Pattern

A privacy-compliant thesis submission process was required so staff could create an entry per thesis, select both supervisor and student from the user directory, and provide the student with a submission link and upload area. Users reported a need for per-thesis visibility and controlled access for supervisor and student without exposing other entries.

Solution

A SharePoint-based submission workflow was implemented that created one entry per thesis (displayed as tiles). Staff could lookup supervisor and student via the directory when creating an entry; the system granted both the selected supervisor and the student access to the thesis-specific SharePoint folder and provided the student with a submission link. Permissions were scoped per-entry so supervisors could access submitted files and students could upload only to their assigned folder, meeting the requested data-protection and access requirements.

Source Tickets (1)
174. Microsoft Bookings access lost after account converted from cloud-only to AD-backed (license propagation issue)
90% confidence
Problem Pattern

User abruptly lost access to Microsoft Bookings and saw a message that the license had changed after their account was converted from a cloud-only account to an AD-backed account. The user could no longer edit existing appointments or availability slots and reported that recent changes became non-editable.

Solution

Support identified that the user account had been migrated from cloud-only to an AD-backed account and confirmed the user needed the AD-based A5 group license that includes Bookings. The A5 group license was assigned to the AD account and time was allowed for license assignment and propagation. After propagation completed, Bookings access and edit capabilities were restored and verified with the user.

Source Tickets (1)
175. Microsoft Loop access requiring admin enablement/whitelisting
90% confidence
Problem Pattern

Users reported they could not use Microsoft Loop (no access/availability) and required explicit provisioning before they could use Loop features. There were no application errors beyond lack of access.

Solution

An IT administrator enabled and whitelisted the requesting user for Microsoft Loop. After the user was provisioned/whitelisted for Loop, the user confirmed that Loop access worked successfully.

Source Tickets (1)
176. Cloudya phone features missing after department transfer (function keys unassigned)
95% confidence
Problem Pattern

After a department or role change the user’s Cloudya phone profile lacked assigned/configured function keys and administrative phone features, causing inability to use specific phone functions. No explicit error messages were returned; telephone feature buttons were simply absent or non-functional. Affected system: Cloudya (Cloudya WS Südwest).

Solution

An administrator updated the user’s Cloudya profile by adding and configuring the missing function keys in the Cloudya WS Südwest system. The configuration changes propagated within a few minutes and the user confirmed the phone features were working afterwards.

Source Tickets (1)
177. Salesforce login failed when password-reset link was broken — Okta SSO tile used to regain access
90% confidence
Problem Pattern

Users could not sign in to Salesforce because their local Salesforce passwords were not accepted and the "forgot password" workflow failed. Password-reset emails contained expired or non-functional links, producing a broken reset-link page; affected systems included Salesforce, Okta, email clients (e.g., Outlook) and web browsers. Users reported that clearing browser cache or switching browsers did not restore access.

Solution

Access was restored by signing in to Okta and launching Salesforce from the Okta dashboard tile; Okta SSO authenticated the user and opened Salesforce without requiring a local Salesforce password reset. This approach resolved cases where the Salesforce password-reset email contained an expired or non-functional link and browser-based attempts (cache clearing, alternate browsers) had not worked.

Source Tickets (3)
178. Salesforce Case field visibility missing due to mismatched user permissions and manager‑approved change
90% confidence
Problem Pattern

A user reported that the 'Quality Codes' field was not visible when processing Cases in the CFCM (Customer Feedback Complaint Management) queue. There were no error messages; the symptom was missing field/menu visibility. A colleague with correct access could see the Quality Codes, indicating the affected account had a different Salesforce permission set or profile.

Solution

Investigators compared the affected user's Salesforce permissions to the colleague's and confirmed the user lacked the same access needed to view Quality Codes. The incident was converted to a Service Request because the permission change required manager approval. After the manager approved, the user's Salesforce permissions were adjusted to match the colleague's permissions. The user was then able to process Cases and view the Quality Codes.

Source Tickets (1)
179. Atlassian Jira board access blocked by board-level lock requiring owner grant
90% confidence
Problem Pattern

Users reported they could not view or interact with items on a specific Jira board (for example CRM or KFK Migrations). The board appeared locked and affected users lacked required board-level permissions even when they were listed as board members. Requesters were unable to access board items and often could not identify or contact the board owner/administrator to request the explicit access grant.

Solution

The board was confirmed to be in a board-level locked state that required an explicit access grant from the board owner/administrator. Support verified the requester’s membership on the Jira board but found the required board permissions were not assigned. The board owner/administrator granted the missing board-level permissions on the Jira instance, after which the requester’s access to the board and its tickets was restored.

Source Tickets (2)
180. Learning Hub (LMS) course access controlled by HR provisioning
90% confidence
Problem Pattern

Users were unable to access the IU Learning Hub via the company intranet, either receiving an 'insufficient permissions' / 'Der Benutzer verfügt nicht über Berechtigungen' access‑denied error that included a correlation ID and timestamp, or seeing the Learning Hub fail to load with no specific error. Affected systems included the Learning Hub (LMS), Azure AD and the intranet. Issues commonly occurred during onboarding or when HR‑controlled course entitlements or required Azure AD group membership were missing.

Solution

Investigations produced two common resolution outcomes. In cases where course entitlements were controlled by HR, support determined that access had to be provisioned through HR provisioning; HR required the LMS correlation ID, timestamp and the user’s email, and handled requests via the people-projects@iu.org mailbox. In other cases support corrected Azure AD configuration—either by adding the LMS course/application entry (recorded as “LMS Kurs im AAD”) or by adding the user to the Azure AD group that grants intranet/Learning Hub access—which restored access. Tickets were closed after confirming access or after notifying users when no further response was received.

Source Tickets (3)
181. Expired 1Password activation link prevented account setup; recovery link restored access
90% confidence
Problem Pattern

User reported that a previously sent 1Password activation link had expired and they could not complete account activation or set a password. The issue involved 1Password's email activation workflow and a user-facing expired token; the user requested a new activation or recovery link to regain access.

Solution

Support verified the 1Password account state, found the account already activated, and sent a 1Password recovery link so the user could set a new password. The recovery link allowed the user to regain access and the ticket was closed.

Source Tickets (1)
182. PDF editing access requests resolved by internal PDF Creator alternative
90% confidence
Problem Pattern

User reported inability to edit PDF documents and requested Adobe Acrobat access or license. Symptom was lack of PDF-editing capability (no specific error messages). The user expected an Acrobat entitlement but did not have an installed or licensed PDF editor. Affected systems mentioned: Adobe Acrobat and company software portal.

Solution

The user was advised to install PDF Creator 24 from the Company Portal as it provided the required PDF editing tools. Support confirmed that the alternative met the user's needs provisionally and kept the option to enable Adobe Acrobat if the portal-provided app proved insufficient.

Source Tickets (1)
183. Automated test-account email contained blank credentials; account not found in CARE or Salesforce
85% confidence
Problem Pattern

An automated E‑Commerce test-access email reached the contact but both username and password fields were empty. Support could not locate the account in the CARE system and had no access to the related Salesforce Opportunity record. The environment only allowed password resets (passwords were not readable) and usernames in CARE were retrievable only when searched by AcID/MNR/full name.

Solution

Support attempted to locate the user in CARE and check the linked Salesforce Opportunity but could not find the person and lacked Salesforce access to investigate further. The technician documented that CARE exposes usernames when searched by AcID/MNR/full name and that stored passwords cannot be read (only reset). As an immediate workaround the requester manually sent the missing access credentials to the user so the test account could be used; the ticket was closed after the manual delivery.

Source Tickets (1)
184. Calendly invites and group membership caused invisible users; individual developer accounts requested
60% confidence
Problem Pattern

Users invited to Calendly accepted invites but did not appear in the workspace; support had created a second Calendly group ('Upskilling') and some users could not be found, likely due to Calendly group-membership constraints (users appearing to be allowed in only one group) and changes to group admin assignments. Requesters asked for individual developer Calendly accounts instead of sharing a single account.

Solution

Support validated which individuals required their own Calendly access and provisioned individual accounts for the named developers. The team reconciled Calendly group membership and admin assignments so invited users became visible in the correct group rather than being hidden by the duplicate/group‑membership configuration; access was confirmed for the requested users.

Source Tickets (1)
185. Approval‑routing error in Automation-for‑Jira blocked SaaS provisioning
90% confidence
Problem Pattern

User could not access a SaaS dashboard (DataDog/Twilio) because the provisioning request remained pending in the approval workflow. The approval was routed to an incorrect approver in Automation for Jira, leaving the access request unapproved and the account/permissions unavailable. Affected systems included DataDog, Okta SSO and the Jira approval automation.

Solution

The ticket was updated to assign the correct approver in the Automation-for-Jira workflow, which generated a new approval request. Once the proper approver reviewed the request, the application owner granted the DataDog entitlement via Okta and the user was authorized to access the requested dashboard.

Source Tickets (1)
186. Missing Okta-assigned SaaS access (account not provisioned or tile not launched)
90% confidence
Problem Pattern

Users could not access Okta-provisioned SaaS applications or the IT Service Portal because their Okta account or email was not registered or entitled. Symptoms included missing application tiles on the Okta dashboard, 'email address not registered' when opening the IT Service Portal link, no apps visible in Okta, inability to launch apps from intranet or Teams, repeated Authenticator re-authentication prompts, and 'access denied' for specific resources after SSO. Affected systems included Salesforce, GitLab, Confluence, DataDog, Deskbird, SharePoint (via CARE), intranet/Teams launch paths, and the IT Service Portal.

Solution

Access was restored when the user’s Okta account and entitlements were provisioned or corrected so SSO entitlements and application tiles appeared on the Okta dashboard. Common fixes that resolved incidents in this category included assigning or enabling the Okta SSO entitlement for the affected user, completing a Self Service access request in the IT Service Portal that received the required cost-center manager approval (which auto-provisioned the app tile), and provisioning or correcting the user’s registered email in the service portal/Okta so the user could sign in. Specific product actions recorded: administrators activated entitlements for GitLab and Confluence; Deskbird was enabled so it launched correctly from the intranet and Teams; assigning Salesforce to a user’s Okta dashboard removed repeated Microsoft Authenticator re-authentication in intranet/Teams flows; and SharePoint permissions surfaced through the CARE integration were restored when SSO succeeded but content access returned “access denied.” Okta entitlement changes typically propagated in about 5–10 minutes. Separate space- or product-owner approvals could still be required for access to particular areas or content. (One matched ticket recorded the symptom but contained no actionable resolution details.)

187. Internal wiki edit permissions were owner‑controlled and required owner grant
90% confidence
Problem Pattern

User could view an internal wiki page but could not edit it; no explicit error messages were reported, the symptom was inability to save or modify wiki content and a request for edit access was submitted. The page and its edit rights were controlled by an internal owner rather than central IT, and the requester needed elevated page‑level permissions to perform edits.

Solution

Edit access was granted by the page owner (Sarah‑Maria Vogel) on 2024‑08‑13 at 09:10, after which the requester (Klaudia) acknowledged having the required edit permissions on 2024‑08‑16. The change resolved the inability to edit the wiki page.

Source Tickets (2)
188. Datadog access stalled by pending approval and incomplete account verification
90% confidence
Problem Pattern

Users could not reach Datadog because their access requests remained pending in the Automation-for-Jira workflow and the Datadog application tile did not appear in Okta until the application was assigned and the user completed Datadog's verification email. Affected systems included Datadog, Okta, Automation-for-Jira and Atlassian provisioning; symptoms were lack of an Okta tile and inability to sign in, with no explicit error codes.

Solution

Access was granted after the Automation-for-Jira approval step was processed and the Atlassian provisioning API assigned the Datadog application to the users. For one onboarding case, Conduktor was also enabled in Okta. Users were required to complete Datadog's verification email; the Datadog tile appeared in Okta and access became available after verification. Remaining service requests (Sentry, AWS, JFrog, SonarCloud) were escalated/handed off to the DevOps team for their separate provisioning workflow.

Source Tickets (3)
189. Salesforce access failures: missing Okta tile, password reset and UAT account provisioning
90% confidence
Problem Pattern

Users could not sign in to Salesforce: the Salesforce application tile was missing from Okta 'My Apps' preventing SSO sign‑in, password‑reset attempts failed or no password‑reset email was received, and users could not access Salesforce UAT/test accounts or could not confirm account existence. Affected systems included Salesforce (production and UAT), Okta SSO, and email delivery for password resets.

Solution

Support initially issued Salesforce password‑reset links and recommended signing in via the institution's Okta 'My Apps' SSO tile. When users did not receive password‑reset emails or could not reset a password, administrators verified and re‑enabled/provisioned the Salesforce application assignment in Okta so the Salesforce tile appeared on users' dashboards; affected users then regained access via Okta SSO without requiring a password change. For UAT/testing access, administrators created UAT accounts and sent verification emails when they had environment access so users could complete activation. In cases where support confirmed they did not have access to the UAT environment, support could not create or manage UAT accounts and users were directed to the Salesforce team for account recovery or new UAT access. For new hires, Salesforce access was provisioned and accounts were aligned/mapped to a reference user to replicate required permissions. Twilio telephony access requests were recorded and handled separately when applicable.

190. M365 Copilot access blocked by automated license provisioning and missing service‑portal request
80% confidence
Problem Pattern

Users reported lack of access to Microsoft 365 Copilot with no error messages; they were unable to use Copilot or access its features. The organization's Copilot entitlements were controlled by an automated provisioning workflow that did not run for some users, causing affected users to lack assigned licenses. Affected systems included Microsoft 365/Copilot, the IT service portal (Jira Service Management), and the Learning Hub.

Solution

Support determined that Copilot licenses were provisioned by an existing automated workflow. The issue was resolved by having the user submit the designated 'Copilot for M365' provisioning form in the IT service portal (Jira Service Management) and complete the required Learning Hub introductory course; completion of the form and course triggered automatic assignment of the Copilot entitlement. The ticket was closed after the user was informed that the license had been assigned.

Source Tickets (2)
191. Vendor document system access granted by account provisioning (d.velop)
90% confidence
Problem Pattern

Users were unable to access applicant documents in the d.velop document management system due to missing or unprovisioned accounts, undelivered or expired invitations, or authentication/access-denied errors. Symptoms included inability to open vendor-hosted documents, sometimes with no visible error and sometimes with an explicit access-denied error or screenshot. Affected system: d.velop.

Solution

Support resolved d.velop access issues by ensuring users had active, provisioned d.velop accounts or valid invitations. In some incidents a new d.velop account was created and provisioned for the user, after which access to vendor-hosted applicant documents was confirmed. In other incidents support resent the user’s d.velop invitation and requested the user to accept it; tickets noted follow-up for confirmation and were closed when no response was received. Access was confirmed after account creation or after the user accepted the resent invitation.

192. Team membership blocked by missing Team owner and broken approval workflow
75% confidence
Problem Pattern

A requester could not add a new employee to a Microsoft Teams team because they were not an owner and the existing owners were unreachable. The linked approval workflow (Automation for Jira) had incorrect approver mapping and an approver reported the absence of an Approve button in the Jira approval UI. SharePoint access for the new user was also pending because it required approval tied to the same workflow.

Solution

The approver mapping in the Automation for Jira workflow was corrected. Where the Jira approval UI could not be used, an approver left a manual approval comment which was accepted. Team ownership/admin rights were adjusted so the requester could add the new member, and the pending SharePoint approval was completed accordingly.

Source Tickets (1)
193. Access and permission alignment when multiple reference users or duplicate accounts exist (ePost / Epos)
80% confidence
Problem Pattern

Users requested ePost/EPOS Service Desk access but support was uncertain which reference user or existing EPOS/Care account to use because of name discrepancies, alternate reference names/emails, or duplicate accounts. Affected users reported no explicit error messages; the common symptom was lack of visibility of the EPOS Service Desk portal or EPOS Project in the Service Portal. Multiple existing EPOS accounts with differing roles made it unclear which project-level permissions were missing and delayed permission alignment.

Solution

Support requested a reference user and performed targeted account discovery (including alternate names and emails) to locate any existing EPOS/Care account for the colleague. When an existing account was found, support reconciled and adjusted that account's project-level roles and permissions to match the supplied reference user's permissions. For EPOS Service Desk access issues, support confirmed that entitlement to the Service Portal Overview correlated with visibility of the EPOS Service Desk portal and ensured EPOS Project access/roles were granted where missing. The work addressed cases with multiple existing accounts and varying roles (several roles per account), handled batch provisioning for multiple employees, and users were then asked to verify portal visibility once changes were applied.

Source Tickets (2)
194. SSO login succeeded but workspace/space access remained owner‑controlled (Storyblok)
95% confidence
Problem Pattern

Users authenticated successfully via SSO (Okta) but could not open or view specific application workspaces, spaces, or content pages (examples: Storyblok spaces, Lucid spaces, Confluence pages). Affected users reported no error messages, often had valid application accounts or licenses, and the application could appear on the Okta dashboard while the targeted spaces/pages remained inaccessible. Integrated assets accessed through an application (for example Cloudinary via Storyblok) were sometimes also unreachable.

Solution

SSO authentication was confirmed in all incidents, but access failures were traced to application-level authorization rather than SSO. Incidents were resolved by one or more of the following actions as appropriate to the application: completing outstanding application-request approvals in the Jira automation; assigning the application or entitlement to the user account (Storyblok assignments were performed via the Atlassian API in documented cases); and administrators or content owners granting required permissions or space membership directly within the application (examples: Storyblok spaces, Lucid spaces). For integrated services surfaced through a parent app (example: Cloudinary via Storyblok), access was restored by granting the appropriate permissions inside the parent application. Confluence page and workspace access was controlled by Confluence site owners rather than central IT, so affected users required site-owner page/workspace grants even when they held valid Confluence licenses. In several incidents granted permissions only became visible after propagation delays; after approvals, assignments, or owner/site‑level membership grants and any propagation completed, users regained visibility of the requested spaces or pages. Technicians sometimes escalated to subject-matter teams when they lacked permission to modify space membership; in at least one case the affected account was deprovisioned as a final action recorded in the ticket.

195. GitLab account provisioning and Okta-backed GitLab Pages authorization
90% confidence
Problem Pattern

Users could not access GitLab-hosted resources or GitLab Pages (iu.tech). Symptoms included inability to view or submit handbook/website content, inability to update repositories, or receiving access/permission denied errors despite having a GitLab account or Okta application. Affected systems included GitLab, Okta, and GitLab Pages; root causes ranged from missing GitLab accounts or Okta app assignments to insufficient repository/Page permissions.

Solution

Users were given GitLab accounts and the GitLab application was assigned to their Okta profiles when account or app assignment was missing, restoring repository and collaboration access. For the iu.tech GitLab Pages site, Okta SSO was integrated with GitLab so site authorization was fulfilled via GitLab (backed by Okta). In cases where requesters already had GitLab accounts but still could not view site content or handbooks, DevOps granted the required repository/Page permissions. Support also advised users to link their Okta accounts if access issues persisted. Access was confirmed for the requesters and tickets were closed.

196. Adding SaaS Enterprise apps to a user’s Okta dashboard during onboarding
90% confidence
Problem Pattern

Users reported inability to access SaaS applications via Okta SSO: the app tile or SSO account was missing from their Okta dashboard, or they could not launch the target app without explicit error messages. Affected systems were Okta and the target SaaS (examples: Salesforce Marketing Cloud, GitLab, Jira, Monday.com).

Solution

Access issues were resolved by enabling or unlocking the product’s Okta Enterprise App for the affected user and confirming any required product license was assigned. In several cases the user’s Okta account entry for the app was unlocked rather than re-provisioned. Users were informed that provisioning or unlock changes typically required a short propagation window (~5–10 minutes) before SSO access became active. It was also noted that granting product-level access via Okta did not modify owner-controlled content permissions inside the target product (for example, Jira board membership remained controlled by app owners/approvers).

197. Confluence access request failed because user lacked a product license at time of request
85% confidence
Problem Pattern

Users invited to a Confluence space reported they could not view or edit space pages and continued to see the 'request access' prompt despite invitations or approver confirmations. The issue occurred when the affected account did not have an active Confluence product license at the time of the access request, and persisted across Confluence/Atlassian user provisioning and space permission propagation.

Solution

Access failures were resolved after a Confluence product license was applied to the affected account and license mapping/assignment issues were corrected. In cases where the original access request had been made before the license existed, users either retried access after license propagation (changes took effect after approximately one hour) or re-submitted the access request so the space owner could manually approve it; once the license was present and the request was approved, permissions propagated and access became active. Incidents also noted approver-side delivery/availability problems (for example, mailbox visibility) that had delayed manual approval prior to license assignment.

Source Tickets (2)
198. Access request where the user already had an account
95% confidence
Problem Pattern

Users reported they could not access a SaaS application (vague “can't access” or no explicit error). Investigation showed the target account or entitlement already existed in the SaaS or via the organization's SSO/IdP (e.g., Okta), causing user-facing uncertainty about their access state; this commonly occurred during onboarding.

Solution

Support confirmed the user’s account and the required permissions already existed in the target system (for example, Jira) and in the organization’s SSO/IdP (for example, Okta). The user was advised to sign in through the IdP/Okta dashboard and then successfully logged in; no additional provisioning or entitlement changes were required and the ticket was closed. This pattern frequently appeared during onboarding requests where access had been pre-provisioned.

199. GitLab access restored by assigning application entitlements
95% confidence
Problem Pattern

Users were unable to access GitLab even though they had an IU/Okta session or expected onboarding entitlements. Symptoms included SSO prompts that required "sign in through the organization first", missing repository access for new hires, or a previously working account becoming inaccessible after account-state changes.

Solution

Support identified the affected accounts and re‑granted the GitLab Enterprise application/permissions in the identity/access management system. After the GitLab application was assigned to the users' IAM accounts, support verified successful sign‑in and repository access.

200. Automated provisioning blocked by incorrect or missing approver in entitlement workflow
90% confidence
Problem Pattern

Provisioning requests were stalled or users could not access applications because the configured approver on the app's approval/workflow was incorrect or not reachable. Symptoms included login failures despite valid SSO sessions and entitlement requests that remained unapproved.

Solution

Support changed the approver configured for the application's approval workflow and granted the requested entitlement. After the approver setting was adjusted and the application access was assigned, the affected users could sign in and access the application.

Source Tickets (3)
201. Corporate ChatGPT setup failures resolved by reissuing invitation
90% confidence
Problem Pattern

Users could not access or join the corporate OpenAI/ChatGPT organisation after following an organisation invitation or after removing themselves. Symptoms included invitation links appearing expired or the flow unexpectedly prompting for a password instead of a passwordless sign-up, error messages such as 'Error code 40' or 'incorrect password/email', or loss of organisation membership with no error. Admins were unable to find an active account or membership record for the user in the corporate provisioning system.

Solution

Support verified that no active account or organisation membership record existed in the corporate provisioning/provisioning directory (either because the original invitation had expired or because the user’s membership had been removed). Support reissued a fresh corporate OpenAI/ChatGPT invitation via the organisation’s invite/SharePoint process; in observed cases a new invitation (sometimes issued more than once) produced a working link. The user accepted the latest invitation and completed registration or regained organisation membership; tickets were closed after successful signup.

202. Onboarding and staging/dev environment access provisioning for multiple tooling
85% confidence
Problem Pattern

New joiners or support staff reported missing accounts or entitlements across multiple SaaS and staging/dev environments (examples: EPOS, CARE, MyCampus/MyWorkday, Sentry, Datadog, JetBrains, 1Password, Miro, Lucidchart, GitLab), preventing onboarding and day‑to‑day support tasks. Some requests required cross‑team verification or handover because accounts were centrally managed or credentials were stored in shared vaults.

Solution

Support verified the user’s profile and provisioned application access for available tools, and offered password‑reset links where applicable. CARE and EPOS (production and staging) access were granted. Monitoring access was aligned to Datadog (Logz.io had been discontinued) and Datadog entitlements were issued where appropriate. For centrally managed or team‑owned services (Okta‑provisioned apps, GitLab repo access, DevOps portal items, Egencia, Conduktor, MyWorkday, Miro, Lucidchart) requests were routed to the owning teams or processed through the normal onboarding provisioning channels. The OpenAI Team account was identified as managed by the ALM team and the request was forwarded to ALM for assignment. JetBrains IDE access (DataGrip, PyCharm) was located in the Service&support 1Password vault but had not been officially handed over; this was recorded and escalated so the vault handover or credential transfer could be completed. Remaining tool entitlements followed the standard onboarding provisioning process.

Source Tickets (2)
203. Requested access for an unsupported/alternate vendor (Cloudya) closed after confirming team uses different telephony
90% confidence
Problem Pattern

A user requested access or credentials for a specific vendor telephony system (Cloudya) where the requesting team already used a different platform for telephony, causing a mismatch between the requested tool and the team's supported vendor.

Solution

Support reviewed the request, confirmed the Studienberatung team used Twillio for telephony, and therefore did not provision a Cloudya account. The Cloudya request was closed with that explanation.

Source Tickets (1)
204. Stalled Automation-for-Jira application requests resolved by manual app assignment
90% confidence
Problem Pattern

Application requests in the Automation-for-Jira approval workflow remained in a 'waiting for approval' state, preventing users from launching or seeing SaaS applications via their Okta/SSO dashboard. Users saw no explicit error messages; affected apps included Storyblok, Datadog, and Salesforce Marketing Cloud. Requests stayed pending until an approver or an administrator completed the approval or assignment.

Solution

Pending application requests in the Automation-for-Jira approval workflow were resolved by completing the Application Request and assigning the SSO Enterprise Application to affected users through the Atlassian application-assignment flow (Atlassian API / Application Request). Where the Automation-for-Jira approver notification had been sent but not acted on, administrators performed a manual assignment after prompting or reminders. Once the assignment was confirmed by Atlassian/Okta, users regained access and the application tile became available on their Okta dashboard. Affected examples included Storyblok, Datadog, and Salesforce Marketing Cloud.

205. Existing Salesforce account access restored via password reset and Okta/portal sign‑in guidance
85% confidence
Problem Pattern

User could not access Salesforce to create reports despite an existing account; no explicit error messages were captured. The user expected to sign in but reported lack of access to Salesforce functionality.

Solution

Support confirmed that a Salesforce account already existed for the user, triggered a password-reset email, and advised that Salesforce is also accessible through the Okta dashboard and the company intranet. Access was restored after the user completed the password reset and used the recommended sign-in paths.

Source Tickets (1)
206. EPOS role/permission discrepancy resolved by backend role propagation
62% confidence
Problem Pattern

Users were unable to access expected EPOS functions or UI sections (for example enrollment/Immatrikulation, opening accounts, Studi Infos, or unenroll actions). Affected accounts showed missing or inconsistent EPOS role attributes or group memberships compared with reference accounts; attempts to perform affected actions sometimes produced unspecified errors or simply no access. Systems involved included EPOS and related user provisioning (for example Care), and client-side browser cache could make permissions appear stale.

Solution

Support inspected affected accounts' EPOS role attributes and group memberships and compared them to reference accounts to confirm discrepancies. Resolution outcomes varied: in some incidents missing roles later appeared when backend role propagation completed even though no explicit configuration change was recorded; in others an administrator directly added or adjusted EPOS groups/permissions. In a subset of requests support did not implement changes (requests were closed as declined/'Won't Do') and access remained unchanged. After any backend or administrative changes, access typically returned once roles propagated and the client picked them up — changes usually became visible after users signed out and signed back in (commonly after ~5–10 minutes). Client-side browser caching sometimes caused the UI to continue showing the old permission state or produced transient unspecified errors immediately after group assignment; retesting in a different browser or in private/incognito mode or clearing browser cache/cookies made permission changes visible.

207. Vendor‑managed delayed account creation for Egencia (onboarding latency)
90% confidence
Problem Pattern

Users were unable to access Egencia immediately after hire or when submitting expenses. Symptoms included generic or unspecified SSO errors when launching Egencia from the Okta Dashboard, missing vendor activation/instruction emails, accounts not appearing in Egencia’s provisioning system, or Egencia denying access because Workday entitlements were missing or incorrect. Problems were traced to vendor-side provisioning delays, missing Okta SSO group membership, provisioning-source errors (for example bulk-uploaded accounts with incorrect corporate email domains), and corporate email delivery/matching failures. Affected systems included Egencia provisioning, Okta SSO groups, Workday entitlement sync, and corporate email/domain records.

Solution

Incidents were traced to four recurring causes and resolved as follows. Vendor-side onboarding latency: Egencia sometimes created accounts but completed activation only after the vendor’s provisioning window (typically 2–4 days); access was confirmed once the account appeared in Egencia or the vendor activation email was received. Okta provisioning-group issues: support restored access by adding users to the required Okta SSO group and coordinating with procurement so the vendor activation/instruction email was issued; access was confirmed after users completed the vendor’s activation steps and launched Egencia via Okta Dashboard SSO. Workday entitlement problems: Egencia provisioning and SSO access were blocked when a user’s Workday entitlement or access was missing or incorrect; restoring the Workday entitlement allowed Egencia to provision the account and restored access. Provisioning-source / bulk-upload domain mismatches: some bulk-uploaded accounts were created with the wrong corporate email domain (for example LIBF vs Walbrook), which prevented vendor-side matching and caused authentication/authorization failures; access was restored after the account email/domain was reconciled with the provisioning source or vendor records and the vendor issued the activation. Tickets also showed that Workday could list a user as eligible before Egencia provisioned the account, and that vendor-side staff availability sometimes delayed issuance of the activation email; in those cases admins followed up with the vendor contact and applied the vendor-provided fix, after which user access was restored.

208. Immediate access granted by manual app assignment or admin unlock (Atlassian API / Okta)
85% confidence
Problem Pattern

Users reported lack of access to SaaS applications (Mira, Jira, Monday.com, Deskbird) where no explicit error appeared but the app tile or workspace was unavailable. Causes included missing app assignment, pending approval in Automation-for-Jira, or the app being locked in the SSO portal, preventing immediate sign‑in via Okta/Atlassian SSO.

Solution

Support resolved access by performing a direct assignment or unlock through the platform admin interfaces: the Atlassian API system account assigned Atlassian apps to users where Automation-for-Jira approval was pending, and Okta administrators unlocked or provisioned Monday/Deskbird via the Okta app assignment. The assignments propagated to the user’s Okta dashboard (access typically visible within ~5–10 minutes) and Automation-for-Jira indicated the user as assigned before the tickets were closed.

209. Atlassian account and content-permission gaps for users and contractors
81% confidence
Problem Pattern

Users and external/contractor accounts were unable to access Atlassian products (Jira projects, Confluence content, or board-level resources) despite prior access or after a provisioning request. Requests sometimes originated from onboarding/configuration needs (new project configurator) or migration tasks and reported no specific error codes; Automation-for-Jira workflow warnings (due-date/lead-time) appeared during request submission. Affected systems included Jira, Confluence and board/space-level permissions where content access was owner-controlled.

Solution

Provisioning and permission fixes were applied per case: an Atlassian user account was created for the external configurator using the provided external email and the account was provisioned; the account was configured to send the password-reset email to the user’s private address on the scheduled start date. For an inability to view Confluence content, the Confluence access permission was added to the user’s account and the user was instructed to re-login. For a Mondayboard/Jira access request, Jira permissions were granted for the specific user, and the requester was advised that access to particular boards/spaces remained under the board owner’s control.

210. Expired one-time access links for bot/service accounts
90% confidence
Problem Pattern

A bot/service account could not access a web management interface because the one-time access link or generated password previously provided to the bot had expired. The user reported no actionable error codes; the one-time link mechanism and validity window were implicated as the likely cause. Affected system in the reported case was PRISMAsync Remote Manager used by a UiPath bot account.

Solution

The support team identified that the original one-time access link had expired (the environment used two-week validity for one-time links). A new one-time access link and password were generated and sent for the bot account (CPG-UiPath-BC9@sv.iu-it.org), and access was confirmed after the new credentials were used.

Source Tickets (1)
211. Salesforce in‑app feature permission (Callout Builder) granted by admin
90% confidence
Problem Pattern

Users reported inability to access specific Salesforce UI components or objects (examples: Callout Builder, contract-creation flows, dashboards or report folders). Symptoms included missing UI elements or actions silently failing with no explicit error messages. Requesters frequently cited another user's access as a precedent. Some tickets also showed an Automation-for-Jira approval entry marked 'awaiting approval' while the affected user remained unable to use the feature.

Solution

Requests for Salesforce UI or object access were resolved in two ways depending on support privileges. When support staff had the required Salesforce administration rights, the necessary permission(s) were added to the user’s Salesforce profile (examples confirmed: Callout Builder access, contract-creation permissions) or read access was assigned to dashboards, reports, and report folders. When support lacked the required privileges, users were directed to submit the request through the SalesTech Service Portal and existing approved users were cited as precedents. Multiple tickets noted an Automation-for-Jira approval entry remained marked 'awaiting approval' even after the permission had been applied and the user confirmed access.

212. Okta-linked GitLab account locked — admin unlock restored group access
95% confidence
Problem Pattern

Users were unable to access GitLab groups and projects via Okta SSO. Symptoms included being redirected to unexpected 404 pages when launching GitLab from Okta, inability to reach required repositories or groups, GitLab accounts appearing locked, and GitLab-specific two‑factor authentication failing (for example after machine changes). Affected systems were Okta SSO and GitLab; users did not always report GitLab error codes.

Solution

Access failures were resolved by actions on the GitLab account associated with the user’s Okta identity. When a GitLab account was locked, administrators unlocked the GitLab account linked to the Okta user; group and project access typically returned after a short propagation delay (~5–10 minutes). When Okta-launched GitLab redirected users to unexpected 404 pages, unlocking or correction of GitLab provisioning/permissions was performed and access restored after propagation; in several cases administrators could only perform the initial unlock and advised users to open a DevOps ticket because the GitLab application and deeper provisioning/permission fixes were managed by the DevOps team. When GitLab two‑factor authentication stopped working (commonly after a machine change), DevOps reset the user’s GitLab 2FA credentials and adjusted account permissions as needed, which restored access. Some tickets included unrelated access requests (for example AWS) in the title but no AWS-specific symptoms were recorded.

213. Okta SaaS application provisioning requests: assignments applied or deemed unnecessary
85% confidence
Problem Pattern

Requests were submitted to add or enable SaaS applications in Okta for specific users or test accounts (Freshdesk, Calendly, Salesforce UAT). Users reported the application tile or SSO assignment missing in Okta and requested IT provisioning.

Solution

Outcomes varied by request: the Freshdesk Okta application was assigned/enabled for the named user and access was confirmed; multiple new CST Nord employees were added to Calendly by the platform owner/admin and accounts were provisioned; a request to add Salesforce/Salesforce UAT for an API test account was reviewed and the account was already present in Salesforce, so no Okta change was required and the request was closed as Won't Do.

Source Tickets (3)
214. Developer tool not configured for corporate SSO (invitation-only access)
90% confidence
Problem Pattern

User requested corporate SSO access to a developer SaaS (Cypress) but the application was not configured for SSO. The user expected an Okta/SSO assignment but reported no explicit error messages — only that SSO access could not be provided. Affected systems: Cypress, SSO/Okta.

Solution

The request was declined because the Cypress instance did not support corporate SSO. Support clarified that the product was invitation‑based and access had to be granted from within the Cypress tenant (an existing teammate needed to send an invite). No Okta/SSO assignment could be applied.

Source Tickets (1)
215. Missing Okta application entitlement or provisioning causing login failures
90% confidence
Problem Pattern

Users reported inability to access SaaS apps (Miro, GitLab) via Okta SSO: sign-in failed or the app was inaccessible despite attempts to log in. Symptoms included authentication errors or lack of a provisioned app account/tile. Affected systems: Okta, Miro, GitLab.

Solution

Access was restored after the application entitlements were applied in Okta and account permissions were updated. For GitLab an administrator granted the requested access/permissions to the user account. For Miro the application was enabled on the user's Okta assignment and access returned after a short propagation delay (5–10 minutes).

Source Tickets (2)
216. SSO login succeeds but specific in-app features require product-owner role assignment
85% confidence
Problem Pattern

Users authenticated successfully via SSO and could open Okta/application tiles, but were unable to access specific applications or in‑app features: either UI elements/fields were missing or the application returned access/error messages. Symptoms correlated with application-side role or permission assignments, field-level security, product-owner entitlements, or account-level UI toggles rather than with SSO itself.

Solution

Support confirmed affected users could authenticate via SSO and access Okta/application tiles, then traced the failures to application-side entitlements rather than to SSO. Missing field or UI element access in Salesforce was enforced by Salesforce permissions and field‑level security; those requests were routed to the SalesTech Service Portal and, when the responding team lacked permission to change Salesforce settings, tracked via Automation for Jira. A Marketing Cloud case showed that users could log into Salesforce but received application-side errors when opening the Marketing Cloud tile; local admins revoked and re-granted basic Marketing Cloud permissions without resolving the error because additional product-owner/entitlements were required and the user was directed to SalesTech. In the IU Shop example a cost-center payment permission had not been assigned by the product/application owner at account creation. In a Vonage case the account was created with a Supervisor role instead of Admin and recorded calls were hidden until account-specific toggles under Accounts → Interaction Content were adjusted by the application owner; support recorded the assigned role in Salesforce and the user confirmed recordings after the owner changed the toggles. Across these incidents no changes to Okta/SSO were required when authentication and tile access were functioning; resolution involved application-owner or product-owner permission changes or requests handled by the application teams (SalesTech or equivalent).

217. GitLab SSO access denied due to missing Okta app assignment or OAuth email-visibility
90% confidence
Problem Pattern

Users could not access GitLab via corporate SSO: attempts to authorize SSO returned 'authorization denied' or sign-in failed and the user appeared to have no access. Affected systems were GitLab and Okta/SSO; symptoms included blocked OAuth authorization, missing group/project access, or an account that seemed de‑provisioned. In some cases the user’s GitLab email visibility prevented OAuth authorization.

Solution

Access was restored by provisioning the GitLab Okta application to the affected user accounts so the SSO-linked GitLab account was created/linked. In the case where OAuth failed because the GitLab email address was not publicly visible, an administrator re‑authorised the user in GitLab (after correcting the account visibility/state), which reinstated the user’s permissions. After the app assignment or re‑authorization, users regained access to their GitLab groups and projects.

218. Internal tool access provisioned by platform owners with environment scope and reference-user permission mapping
90% confidence
Problem Pattern

Users reported missing accounts or insufficient permissions for internal developer and analytics tools (Metabase, Conduktor) and code-hosting repositories (GitLab) without explicit error messages. Requests frequently omitted which environment (prod/stage/dev), whether the change should be applied to a user or a group, and which permission role or reference user to mirror. Access and permission changes for these systems were owned and enforced by platform/DevOps teams rather than central IT, preventing support from making direct permission changes.

Solution

Access issues were resolved by engaging the owning platform/DevOps teams and providing the specific scope and mapping details the owners required. For Metabase, requesters were asked which environment(s) and a reference user; DevOps granted the requester the same groups/permissions as the reference user (Anton) limited to the prod environment and asked whether additional environments were needed. For Conduktor, the owning contact enabled the user’s account (enabled 2024-05-27) and the user confirmed access two days later. For GitLab repository permissions, support confirmed repository-level and group-role management was owned by DevOps and advised the requester to submit the group-addition request through the DevOps Core Service Desk / Jira Service Management so DevOps could add the “IU Group / DWH” group with Developer role to the specified repositories.

219. Application visibility restricted to a specific corporate account/tenant
90% confidence
Problem Pattern

A user could not find or install an application (Engage) in the Microsoft 365 toolbar; the app was not visible or available when signed in with the user's primary account. No error messages were shown and the symptom was purely absence of the app in the toolbar.

Solution

Support confirmed the Engage app was only available to the LIBF/libf account identity. The user signed in with their LIBF account and reported the Engage app was then visible and usable, after which the ticket was closed.

Source Tickets (1)
220. Invitation-based SaaS account provisioning for vendor-hosted services (no existing account/invite)
95% confidence
Problem Pattern

Users could not access vendor-hosted SaaS (for example, a password manager or the Cascade training system) when they had never been provisioned. Symptoms included failed authentication when signing in with corporate credentials or SSO (Okta), lack of explicit error messages beyond inability to sign in, and absence of a provisioning/invitation email delivered to corporate mail. Affected systems included the external SaaS, Okta SSO, and corporate email delivery of invites.

Solution

Where the root cause was missing vendor-side provisioning, an administrator issued the vendor invitation to the user's corporate email; the user followed the vendor-provided signup link, completed account setup, and subsequently verified successful login to the service. In an additional matched case involving a SSO-integrated training app (Cascade) and Okta, support logged troubleshooting and recommended verification steps around SSO/account provisioning and invite delivery, but no confirmed resolution was documented in the ticket.

Source Tickets (2)
221. Software provisioning via application Self‑Service / Service Desk portal
90% confidence
Problem Pattern

User requested access to a licensed desktop application (process‑design tool) but did not have the software provisioned. Symptom was lack of access/installation entitlement for the application; no application-specific error codes were reported. The organisation used a Self‑Service / Service Desk request workflow for software delivery.

Solution

The user was directed to request the application through the organisation's application Self‑Service portal (service desk submission). The service‑desk request was processed via the provided Service Desk link and the application access/provisioning was completed through that workflow. Ticket was marked Done after confirmation.

Source Tickets (2)
222. Access owned by People Projects / HR or non‑IT teams requiring request redirection
88% confidence
Problem Pattern

Users could not access onboarding or HR-controlled learning content, including external providers such as Haufe Akademie. Symptoms included missing course enrollment or credentials, inability to complete required trainings, and workflow tools (e.g., Automation for Jira) reporting an 'approval pending' state; no system error codes were reported. The requests involved access provisioning workflows owned by non-IT teams (People Projects / People Products / HR).

Solution

Support confirmed that the requested course access was owned and provisioned by People Projects / HR (sometimes managed under the People Products team). The user was directed to the owning team's contact channel (people-projects@iu.org or people-products@iu.org) to request enrollment or obtain access credentials for HR-controlled learning platforms, including external providers such as Haufe Akademie. In cases where onboarding automations appeared stalled, Automation for Jira showed an 'approval pending' state that indicated the request was awaiting the owning team's action. The ticket was closed after the user was advised to contact the owning team for provisioning.

Source Tickets (3)
223. Internal portal or project visibility missing due to entitlement mismatch with reference users
92% confidence
Problem Pattern

Users could not access internal portals or projects: portal tiles or project entries were missing from dashboards and direct links returned 'Access Denied'. Affected systems included internal intranet/portal sites and service-center/project interfaces, with identity systems such as Entra (Azure AD) and HR provisioning (Workday) implicated. Diagnostics commonly showed missing permission-group assignments or entitlement attributes that were expected to be automatically granted, preventing visibility and access.

Solution

Support compared the affected account to reference user(s) and identified missing entitlements and/or group memberships. Where entitlement parity differed, the user's account entitlements were aligned to match the reference user, portal visibility settings were reapplied, and the user was added to the required project/role; dashboard tiles and project access then appeared. For cases where automation failed, diagnostics revealed a missing Azure AD/Entra permission group that should have been granted by Workday; support corrected the provisioning mapping or triggered a reprovision/sync and/or directly added the user to the Azure AD group, which removed the 'Access Denied' errors and restored intranet access.

224. Confluence environment access vs. page‑level restrictions
90% confidence
Problem Pattern

Multiple users requested access to Confluence content. While the Confluence environment access might be required, some pages may have page‑level restrictions that prevent viewing. Symptoms were inability to open specific pages which may be restricted by page owners.

Solution

General Confluence access to the environment was enabled for the requested users. It was noted that most pages are available to all users, but pages protected with page‑level restrictions remained controlled by the page owner/creator; those restricted pages required the page owner to add users directly. No further action was taken after confirmation period.

Source Tickets (1)
225. Salesforce direct-login blocked by missing Salesforce-specific security answer
93% confidence
Problem Pattern

User could not access Salesforce by direct login or direct links. Password‑reset attempts were blocked by a message indicating a required security answer had not been set, preventing self‑service resets and direct access while Okta SSO methods were available.

Solution

An administrator initiated and sent a Salesforce password‑reset email to the user. The user completed the reset, configured the required Salesforce authentication (security question/answer), and regained access. Support also clarified that Salesforce direct-login depended on the Salesforce password/authentication setup independent of Okta SSO.

Source Tickets (1)
226. Product-level entitlements and account upgrades applied by specialist teams (Figma, Adobe Creative Cloud)
90% confidence
Problem Pattern

Users had valid SaaS accounts but lacked product-level entitlements or workspace permissions, causing blocked functionality. Reported symptoms included inability to enable or use Figma plugins, failure to share designs, inability to create or edit Figma teams/orgs (UI options disabled or blocked), and inability to install or sign into Adobe Creative Cloud from the Company Portal despite correct credentials. Tickets typically did not include specific error codes.

Solution

Support routed these requests to product/application specialist teams, and the specialists applied backend entitlements or account-level permission changes. For Figma, specialists either upgraded the user account to enable plugins and team-sharing or granted admin-equivalent workspace permissions so the user could create and edit teams/orgs; affected users confirmed the restored functionality. For Adobe Creative Cloud, specialists granted the backend license/entitlement and users then installed the Creative Cloud entry from the Company Portal and signed in with their corporate credentials; the suite and individual apps became available.

Source Tickets (3)
227. GitLab SSO access denied due to missing Okta app assignment or non‑public GitLab email
95% confidence
Problem Pattern

Users reported inability to sign into GitLab via SSO with symptoms ranging from the explicit error 'User is not assigned to this application' to generic login failures. Affected systems were GitLab and the corporate identity provider/Okta application assignment. In some cases the user's GitLab account email visibility (not public) prevented SSO account-linking and successful sign-in.

Solution

Support assigned the GitLab enterprise application to the affected Okta user account which immediately restored SSO access. In one case the incident record also noted the user's GitLab profile email was not set to public, which was identified as an additional factor preventing SSO account mapping. After the Okta application assignment was applied users regained access.

Source Tickets (3)
228. M365 Copilot license/access request pending enterprise rollout
60% confidence
Problem Pattern

User requested access to Microsoft 365 Copilot to enhance productivity but reported no error — the request was a license/access inquiry. The service was not yet available to end users at the time of the request due to an organization‑wide rollout schedule.

Solution

The ticket was closed after communicating that Copilot for M365 was scheduled for rollout the following week and that an intranet announcement would publish the process for obtaining licenses once the service went live. No immediate provisioning was possible prior to the official rollout communication.

Source Tickets (1)
229. Okta dashboard tile missing despite existing service account (SSO app not assigned)
90% confidence
Problem Pattern

User had an existing external service account but the application tile was not visible in their Okta dashboard and SSO access was unavailable. Symptoms included successful/service-account existence confirmed by requesters but no app tile or SSO launch; no explicit error codes were reported. Affected systems in examples were Freshdesk and Marketing Cloud.

Solution

The Okta Enterprise Application was located in the Okta Admin Console and explicitly assigned/activated for the affected user accounts. Approver mapping for the Marketing Cloud request was adjusted where it prevented assignment. After the app entitlements were saved, Okta dashboard visibility and SSO launch were confirmed with the users.

Source Tickets (2)
230. 1Password account unrecognized after long inactivity or email/name change
90% confidence
Problem Pattern

User received a 'No Account found' error when signing in to 1Password after extended inactivity and after attempts with both old and new surname/email. The sign-in attempts failed to locate an existing 1Password account despite prior usage.

Solution

The 1Password access was re-provisioned for the user: the 1Password application/access was reassigned and a new automated account email (with access details) was sent to the user. The reassignment restored the user's ability to sign in.

Source Tickets (1)
231. Miro access blocked by deactivated account or missing team invitation
90% confidence
Problem Pattern

Users were unable to access Miro because their Miro accounts were deactivated or not assigned to the correct team or license. Symptoms included Miro accounts marked “deactivated” or errors such as “cannot be assigned” or “account not associated,” the Miro app missing from the user’s Okta application listing, and inability to join a specific Miro team due to lack of an invite or insufficient permissions. Password changes did not resolve these sign-in or assignment errors. Affected systems: Miro and Okta.

Solution

Account-assignment and visibility issues were resolved by administrative or automated provisioning actions. Deactivated or unassignable Miro accounts were reactivated/unblocked by administrators, which restored sign-in access and returned the Miro app to the user’s Okta application listing. In one case the application assignment was completed through the organization’s Application Self Service automation (approval routed to the designated approver), and that assignment restored access. Where users had no paid seat, reassigning a free Miro license restored limited access (view/comment/edit existing boards but not create new boards). Team membership problems were resolved when an existing team member or board creator sent a team invitation; after receiving the invite the user gained access to the team. Requests for paid/full licenses were handled via separate software/license request workflows.

232. Figma Developer Mode access gated by product expert enablement
85% confidence
Problem Pattern

Users reported they could not access Figma Developer Mode or Figma development accounts; no error codes were provided. Symptoms included missing Developer Mode entitlement or missing provisioned development accounts, which blocked design-to-dev tasks such as font integration. Affected systems included Figma, Figma Dev Mode, and the account provisioning/approval and budget workflows.

Solution

Two resolution paths were observed depending on the root cause. When the symptom was a missing Developer Mode entitlement in the Figma instance, a Figma specialist enabled/granted Developer Mode for the affected users; those users then confirmed Developer Mode and related integrations (fonts/features) worked. When the symptom was an unprovisioned development account or when provisioning required organizational approval and budget clearance, the request was moved into the account-provisioning/approval workflow and an approval/budget ticket was created; no direct provisioning was performed in the original ticket and the original ticket was closed/marked Won't Do while the provisioning approval proceeded.

Source Tickets (2)
233. Access requests closed when required approver was missing in Automation-for-Jira workflow
90% confidence
Problem Pattern

Access requests were left waiting or ultimately closed because the required approver was not specified or did not respond within the Automation-for-Jira approval workflow. Symptoms included automation flagging the request as waiting for approval and no access being granted.

Solution

Approver fields and request metadata were reviewed and an approver entry was adjusted in the system. Automation for Jira had flagged the request as waiting; because no approval was received, the ticket was closed without granting access. The requester was informed that a new access request specifying the correct approvers (team leads or cost‑center managers) and routed to the responsible fulfillment team would be required.

Source Tickets (1)
234. Missing SSO tile, vendor invitation or product license blocking SaaS sign‑in
90% confidence
Problem Pattern

Users were unable to access SaaS applications due to missing Okta dashboard tiles, expired or invalid vendor invitation links, missing product licenses/entitlements on their Okta account, or vendor-side access restrictions. Reported symptoms included a missing app icon on the Okta dashboard, invitation links returning errors or being expired, vendor pages showing 'you don't have permission' or 'permission denied' on documents, and vendor logins prompting for a payment/subscription plan. In some cases access was denied immediately until the appropriate Okta entitlement or vendor-side permission/subscription was present.

Solution

Access was restored by addressing the specific entitlement, invitation, or vendor-side gaps observed: the Salesforce Marketing Cloud application tile was added and assigned on the user's Okta dashboard so SSO could launch; a replacement OpenAI/ChatGPT invitation link was generated and sent after the initial invite failed; a Jira product license/entitlement was enabled on the user's Okta account and access normalized after a ~5–10 minute propagation; an expired Cloudinary account‑setup/invitation link was reissued. StoryBlok access failures were attributed to document‑level permissions or an inactive/paid subscription (login prompted for a payment plan); the StoryBlok ticket recorded that the issue was resolved but lacked documented remediation steps.

235. Intermittent redirect to IT Service Center when opening Jira Service Management link
60% confidence
Problem Pattern

A user clicking the Jira Service Management link was redirected to the IT Service Center instead of reaching Jira Service Management, preventing access. No error codes were reported; the symptom was an unexpected redirect rather than an authentication or entitlement failure.

Solution

The user retried accessing the Jira Service Management link and confirmed that access then worked; the intermittent redirect did not recur and the ticket was closed after user confirmation.

Source Tickets (1)
236. Automating Azure AD security‑group membership from LMS365 course completion (Power Automate)
90% confidence
Problem Pattern

A Power Automate flow intended to add learners to an Azure AD security group on Fabric Copilot course completion was inactive. The CourseCompleted trigger condition did not target a specific course because the course was unpublished and no course ID/container URL was available. The team was unsure whether to use the LMS365 connector or a SharePoint-based trigger and which security group/email template to use.

Solution

The flow was activated after the Fabric Copilot course was published and the course ID/container URL was obtained from People Experience. The existing Power Automate draft used the LMS365 CourseCompleted webhook trigger and the trigger condition was updated to target the specific course ID. The flow was connected to Azure AD to add learners to the designated security group (iug‑aad‑ass‑fabriccopilottestgroup) and the mail-template decision was clarified with the course owners before enabling the flow.

Source Tickets (1)
237. Miro access problems: Okta app assignment vs board‑level permissions
90% confidence
Problem Pattern

Users reported inability to access Miro with two distinct symptoms: missing Miro tile or SSO access in Okta (no error messages), and users who could sign in but lacked full permissions on a specific Miro board. Requests did not provide in‑app error codes and involved both Okta and Miro board owners.

Solution

For users missing the Miro tile, access was resolved by assigning the Miro Enterprise application to the user's Okta account so the SSO tile and provisioning became available. For board‑level access, the board owner granted full access to the requester (the Research Team board owner applied the permission change), after which the user confirmed access was working.

Source Tickets (2)
238. GitHub access provisioned via DevOps Service Desk (Jira Service Management)
90% confidence
Problem Pattern

Users attempted to access the corporate GitHub but had no direct self-service entitlement or Okta/SSO tile. Attempts to open GitHub did not create a provisioned account and access remained unavailable until an explicit access request was submitted to the DevOps Service Desk (Jira Service Management on atlassian.net). Affected systems: GitHub, DevOps Service Desk (Jira Service Management).

Solution

Access was granted after a formal GitHub access request was submitted through the DevOps Service Desk (Jira Service Management at atlassian.net) and processed by the DevOps team. The ticket noted that creating and submitting the service‑desk request, followed by the service desk’s approval/provisioning action, resulted in the user receiving GitHub access.

Source Tickets (1)
239. Vendor/brand‑platform managed shop access and cost‑center billing permissions
88% confidence
Problem Pattern

Users authenticated to the IU Merch Shop via SSO could not place orders billed to a cost center because either the Merch Shop portal tile was missing from the internal portal or the checkout 'cost center' billing field was not visible. Symptoms included a missing Merch Shop portal tile or a hidden/missing cost-center field during checkout, sometimes occurring despite expected Workday manager flags or alumni-ordering permissions. Affected systems: IU Merch Shop, SSO/provisioning, internal user portal/tile, Workday, and the external shop service provider.

Solution

Support verified SSO identity and role provisioning and then worked with product/brand teams and the external shop/service provider. Two distinct resolutions were observed: where a user already had the shop's manager/ordering permission but the checkout cost‑center field was hidden, the issue was escalated to the external shop/service provider who restored cost‑center visibility in the shop UI; where a user lacked SSO access or the required ordering permission (for example alumni cost‑center billing), support granted the required ordering permission and provisioned/enabled the Merch Shop portal tile so the user could place orders. Requests for elevated ordering or direct cost‑center billing permissions were routed to brand-platforms@iu.org because those permissions were managed by the brand/product team rather than central IT.

240. Miro access blocked by private account or missing enterprise provisioning / Okta link
85% confidence
Problem Pattern

User could not sign in to Miro with their institutional (IU) email, could not edit boards owned by other IU users, or could not create new boards. Symptoms included login failures, lack of edit permissions on shared enterprise boards, and account state that appeared to be a private/free account rather than an Okta‑provisioned enterprise account.

Solution

An administrator restored access by unlocking and re‑linking the user’s Okta-backed Miro account to the IU enterprise provisioning; after a short propagation period (reported ~5–10 minutes) the user could see and edit enterprise boards. A separate request to enable board creation remained unaddressed in the ticket; the request record contained recommended next steps (assign a full/enterprise license or have the product owner approve creation rights) but no change had been applied before the ticket was closed.

Source Tickets (2)
241. Jira board and service-account access requiring product entitlement or area-owner approvals
90% confidence
Problem Pattern

Users and a service account could not open specific Jira boards or sub‑areas and automations failed; symptoms included inability to view a board, to raise tickets in a board, or to run automation jobs. Some requested areas required explicit approvals from the area owners beyond central IT's general Jira access.

Solution

Access was restored by granting the missing Jira product/board entitlements and by obtaining the required area‑owner approvals. In one case a user gained access immediately after launching Jira via the Okta Dashboard. The service account regained board visibility after product access was explicitly granted. For an area scoped to 'DS QS Turnitin Verwaltung', the approver entry was adjusted and the area owners provided the required approvals; support noted that central IT could only grant general Jira access while specific sub‑area approvals remained the owners' responsibility.

242. Confluence space access restored by space/admin permission grant
80% confidence
Problem Pattern

Users could not open Confluence pages or access spaces (including the space not appearing in the user's space directory) and saw permission-related messages such as "This page has restricted content" or prompts to request admin access. Access-request or approval workflows (for example Automation for Jira) often showed approvals as pending. Okta SSO, an assigned Confluence license, or apparent space membership did not always prevent the issue. Affected systems included Atlassian Confluence and Jira.

Solution

Access failures were resolved by granting the required Confluence-level permission to the user account or by space/page owners explicitly granting access for the listed users. When approvals appeared pending in Automation for Jira, completion of the owner’s approval cleared the blockage. Initial local troubleshooting (clearing browser cache/cookies and testing in a different browser or Incognito mode) was attempted in some incidents but did not restore access. In at least one case access was restored only after specialist/admin teams adjusted backend provisioning or re-applied the Confluence license even though Okta SSO and license assignment appeared correct. Records noted that individual spaces or pages sometimes still required explicit owner approval even after Confluence-level permissions were applied.

243. Turnitin iPad app blocked by institutional Apple ID domain restriction
70% confidence
Problem Pattern

User could not create an Apple ID on an iPad using their institutional iu.org email and therefore could not obtain the Turnitin app via Self Service; device reported that Apple IDs for domain iu.org are not allowed.

Solution

Support confirmed that Apple IDs using the iu.org domain could not be created on the device. The ticket recorded that the support team presented alternative options and documented that using a personal/private Apple ID on the iPad was a viable option for installing the app; the restriction on creating iu.org Apple IDs on the device was the cause noted in the ticket.

Source Tickets (1)
244. Azure AD group membership missing or slow propagation blocking Microsoft Teams login
90% confidence
Problem Pattern

User was unable to sign into Microsoft Teams and received a 'no permissions' / login blocked symptom due to missing Azure AD access group membership. Affected systems included Microsoft Teams and Microsoft 365 identity (Azure AD). No explicit error codes were provided; the failure presented as inability to open or use Teams despite an active account and mailbox.

Solution

The user was added to the required Azure AD access group and the team waited for directory membership propagation. After approximately 30 minutes the group membership had propagated and the user confirmed Teams access was restored.

Source Tickets (1)
245. New SaaS account requests and approver routing requiring Self‑Service or approver reassignment
85% confidence
Problem Pattern

Requesters required new accounts or access to SaaS products (internal or third‑party) where no pre-provisioned account existed and the request needed to follow a product-specific provisioning or approval path. Symptoms included absence of an account, uncertainty about the approver, or no immediate provisioning outcome.

Solution

Requesters were directed to the Application Self‑Service Portal to create formal software/account requests. In cases where the approver configuration blocked provisioning, the approver entry was adjusted and the application owner created the account. After the portal submission and approver correction the platform owners completed provisioning and the tickets were closed.

Source Tickets (2)
246. Login or in‑app permission gaps resolved by credential reset or explicit permission assignment
80% confidence
Problem Pattern

Users could access their corporate email but were unable to sign into other services (MyCampus, Jira) or lacked in‑application edit permissions (Confluence). Symptoms were generic login failures or missing UI options (no edit button) with no clear error codes.

Solution

For login failures the support team issued a password reset delivered to the user's corporate IU email address, which restored access to MyCampus and Jira. For the Confluence case the user was explicitly granted edit permissions on the instance, after which the edit option became available and the issue was resolved.

Source Tickets (2)
247. Confluence product access granted; space-level permissions remain owner-controlled
90% confidence
Problem Pattern

User reported lack of access to Confluence (no error codes) and requested product access. The symptom was inability to open or use Confluence; no in‑app/space-specific errors were provided. The request did not include specific Confluence space names.

Solution

Confluence product access was granted to the user. The user was informed that access to individual Confluence spaces/pages is controlled by the respective space/board owners and must be requested from them separately.

Source Tickets (1)
248. EPOS: missing 'recognitions' role prevented entering recognitions
95% confidence
Problem Pattern

Users were unable to enter 'recognitions' in EPOS and received an error when searching for students. The symptom was blocked workflow for specific EPOS functionality for multiple named users. The error text was not provided in the request.

Solution

The required EPOS role 'recognitions-department-employee' was identified and assigned to the affected user accounts. Access to the recognitions functionality was verified after the role assignment.

Source Tickets (1)
249. Workday inaccessible via direct link; Okta app launch required for SSO
90% confidence
Problem Pattern

Users were unable to access cloud applications (for example Workday or Salesforce) when signing in directly or following direct links outside the Okta SSO flow. Direct sign-in attempts produced generic credential errors or username/password prompts that did not authenticate (e.g., “Check your username and password”). Affected users sometimes reported that forgot-password/password-reset flows did not deliver reset emails; the issue persisted across browsers and clients (including Outlook add-ins).

Solution

Access was restored by launching the affected application from the Okta (okta.iu.org) app dashboard so the Okta SSO flow completed. Attempts to sign in directly — including from Outlook add-ins — produced generic username/password errors or prompts that failed because SSO was required. Some users also experienced failed forgot-password flows where reset emails were not received and changing browsers did not help. IT support confirmed this behavior and resolved incidents by verifying successful Okta sign-in and opening the app from the Okta dashboard; users subsequently confirmed access was restored.

250. Cross‑system access changes after position change (Care, Vonage, Salesforce)
90% confidence
Problem Pattern

A user who moved into a team‑lead role lacked required permissions across multiple systems (Care, Vonage, Salesforce), including inability to delete bookings in Care. The request included role/approver changes and raised a question about granting Top Level Admin rights.

Solution

The user's approver role was adjusted and Vonage account permissions were configured for the new role. Care permissions were updated to add the ability to delete bookings and the change was tested successfully. Salesforce role changes were routed to the Salesforce specialist team for their provisioning. A Top Level Admin role was intentionally not granted.

Source Tickets (1)
251. Replicating AD group memberships and assigning Office license to match a reference user
95% confidence
Problem Pattern

User accounts or requests involving Active Directory group entitlements and Azure AD licensing: common symptoms included accounts missing expected AD group memberships, absence of an Azure AD Office A5 license, and lack of application access granted via group-assigned entitlements. Requests also included creating new Active Directory groups and Azure AD Entitlement Management access packages for business units. Reference users were often provided as the desired state to mirror.

Solution

Active Directory group entitlements and Azure AD access were restored or provisioned as requested. For accounts missing expected groups, AD memberships were updated to match the provided reference user (Marie Häusgen). New AD groups were created for the business unit when requested (examples: AzureAIADeveloper, AzureAIAAdmin, AzureAIAReadOnly). An Azure AD Office A5 license was assigned to accounts lacking the license, and Okta application entitlements were applied via the appropriate group assignments. Azure AD Entitlement Management access packages were created and made available for assignment.

Source Tickets (2)
252. Request for PMS access redirected to product owner service portal (non‑IT managed)
90% confidence
Problem Pattern

Users reported lacking PMS accounts or insufficient PMS permissions which prevented viewing course restarts, searching modules/metadata on iubh.connectedware.com, or seeing courses on ymCampus dashboards. Requests for PMS access were frequently pending and requesters were often unsure who could approve (for example when the usual approver was unavailable). The PMS was not managed by the IT team.

Solution

Support clarified that PMS account management was not handled by IT and directed users to submit access requests in the Media Production / CareerPartner Jira Service Desk portal (https://careerpartner.atlassian.net/servicedesk/customer/portal/24/group/110). Access requests submitted through the portal were processed by the portal’s Automation for Jira application-request workflow, which routed approvals (including cases where the usual approver was unavailable). In several cases a Product Data Manager submitted the portal request on the requester’s behalf, and IT closed its ticket after the user opened the portal request; access was assumed provisioned once the portal completed its approval workflow.

253. Okta OIDC client registration for backend web app (Authorization Code + client secret)
92% confidence
Problem Pattern

A backend-supported web application required an OIDC client in Okta using the Authorization Code flow with a client secret. The integration needed separate test and production callback/redirect URLs, did not use IdP‑initiated login, and did not perform logout/backchannel operations. No error messages were reported; the request was for Okta-side client configuration and correct redirect URIs.

Solution

An OIDC client was provisioned in Okta for the PIM application using the Authorization Code flow with a client secret. The provided test and production callback/redirect URIs were configured on the Okta client, and the client secret was generated and associated with the application. IdP-initiated login and logout/backchannel endpoints were left unused per the application design so the client settings matched the app's integration model.

Source Tickets (1)
254. Jira access redirected to home due to missing extended product license/permission
90% confidence
Problem Pattern

Clicks on direct Jira ticket or project links redirected users to the Jira start/home page instead of the target issue or project, with no explicit error message. Affected users lacked the required extended Jira license level or product permissions needed to view the ticket/project content. The symptom was consistent with insufficient Jira entitlement rather than a broken link.

Solution

The user was granted the required extended Jira permission/license by IT. After the additional Jira entitlement was applied the user was able to open the intended ticket and project links successfully and confirmed access restoration. Cost information about the extended license was not provided in the resolution record.

Source Tickets (1)
255. Turnitin account inaccessible after email migration and persistent password-change loop
85% confidence
Problem Pattern

User's Turnitin account was tied to an old institutional email address and password-reset emails were not being received after an address migration. After email aliasing was corrected, password-reset messages arrived but the user encountered a repeated password-change/login loop and could not regain access to stored exam submissions. No specific Turnitin error codes were recorded.

Solution

An email alias was added to the user's primary Exchange mailbox so Turnitin password‑reset messages were delivered to the user's mailbox (the message landed in the 'Other' focused inbox folder). The user changed the password after receiving the reset email, but a subsequent persistent password-change/login loop remained and prevented full access to the Turnitin account. Password-complexity and leaked-password checks were discussed with the user; the user abandoned further attempts and the ticket was closed without a final successful login.

Source Tickets (1)
256. Missing SaaS Admin Center profile — vendor re-invite restored Calendly access and calendar sync
90% confidence
Problem Pattern

A user could not sign in to Calendly and calendar events stopped syncing to Outlook. The vendor Admin Center did not show a profile for the affected user (no error codes returned), indicating the account was missing or unlinked in the Calendly organization. Symptoms began after a period of absence and prevented calendar integration.

Solution

The Calendly administrator resent an invitation to the user's email from the Calendly Admin Center. The user accepted the new invitation and confirmed that access to Calendly and Outlook calendar synchronization were restored.

Source Tickets (1)
257. Okta application assignment missing prevented Lucidchart access
92% confidence
Problem Pattern

Users could sign in to Lucidchart via Okta SSO but received 'access denied' or 'no access' when opening the Lucidchart application or specific Lucidchart document URLs (including invitation/shared links). In some incidents this symptom persisted even after the Lucid application was assigned/authorized in Okta.

Solution

Most incidents were resolved by locating the user account in the Okta admin console and assigning/authorizing the Lucid (Lucidchart) application to the Okta user; authorization was confirmed and the user subsequently regained access. At least one incident differed: assigning/approving the application did not restore access to specific Lucidchart document links (users saw 'no access' / access denied after signing in). That ticket recorded no definitive technical fix and referenced license-assignment, invitation-link behavior, and interactions with Atlassian provisioning (Confluence/Jira) as areas investigated, requiring further vendor or product-side follow-up.

Source Tickets (3)
258. myCampus course access granted by matching Care reference-user permissions
90% confidence
Problem Pattern

A staff user could sign into myCampus but could not open course pages or upload materials; course listings appeared but content was inaccessible and the UI showed a limited 'admin for 1 course' state. The user required staff-level media/production permissions to upload slides and manage course content.

Solution

A reference user with the required staff/media-production rights was identified and the affected user's Care/myCampus permissions were adjusted to match the reference account. After the permission alignment the user was able to open courses and upload materials and confirmed that access was restored.

Source Tickets (1)
259. CARE / myCampus access blocked by missing CARE Community membership or account-name mismatch
90% confidence
Problem Pattern

Users reported missing myCampus functionality or inability to obtain employee/admin views despite being granted access. Symptoms included seeing a student view instead of an employee/admin view, duplicate or mismatched accounts (different AC‑5 IDs or differing email addresses), failed password-reset flows where a login code was received but an error occurred when choosing a new password, inability to assign global or Betreuerboard roles, and missing CARE Community membership or DS location. Suspected or actual missing or mis‑mapped EPOS employee accounts and CARE/EPOS group assignment mismatches frequently coincided with these symptoms. Affected systems included myCampus, CARE (community and location attributes), EPOS, Info‑Center, Betreuerboard and global-role provisioning.

Solution

Incidents were resolved by correcting user identity records, account mappings and provisioning state across CARE, EPOS and connected services. Where users lacked CARE Community membership or had incorrect DS location attributes, adding the community membership and assigning the correct DS location restored attendance/timetable actions and the Info‑Center Lehrende DS view. Duplicate or mismatched accounts (including differing AC‑5 IDs or email addresses) were reconciled by locating and consolidating the canonical account or using the canonical username/password; after account/name reconciliation access returned. Accounts incorrectly typed as students were reclassified and outdated email addresses were updated to the iu.org address, which restored Betreuerboard and global-role enrolment in affected cases. When global-role provisioning did not complete automatically, role assignments were applied and, in several cases, required escalation to the specialist provisioning team. In cases where provisioning depended on EPOS state, creating or restoring missing EPOS employee accounts and correcting CARE/EPOS group assignments allowed myCampus admin roles to provision successfully. Password-reset failures that presented a login code but errored when choosing a new password were resolved after the account linkage was corrected (for example by resolving duplicate AC‑5 profiles or resetting the password on the canonical account). After these corrections the myCampus attendance/timetable functions, Info‑Center views and Betreuerboard/global-role access were restored.

260. Calendly account activation and invitation re‑send for team admins
95% confidence
Problem Pattern

A team member reported missing admin rights or unclear activation state for a Calendly team account. The account appeared in the admin list but the user either had no active session or had not completed the invitation/activation flow. There were no explicit error codes; the symptom was inability to sign in to Calendly with expected admin privileges.

Solution

Support verified the Calendly account and group membership, re-sent the Calendly invitation and re-activated the account through the admin UI (clicked the activation control). After the invitation was reissued the user was asked to sign in to complete activation and the ticket was closed following confirmation that the activation path had been triggered.

Source Tickets (1)
261. Salesforce access when invitation email not delivered but Okta SSO available
90% confidence
Problem Pattern

A user could not access Salesforce because they did not receive the activation/invitation email, despite production access being expected via corporate SSO/Okta. The symptom was a missing or undelivered invitation email (checked inbox, spam, deleted items) while Okta-based access methods were still available. The user could not complete self-service activation via the email link.

Solution

An administrator provisioned the user by copying permissions from a reference user and configured the Salesforce provisioning accordingly. The user then accessed Salesforce successfully via the Okta dashboard instead of relying on the missing invitation email.

Source Tickets (1)
262. IU Shop access audit: verifying Okta/Extra‑Account provisioning for suspected users
90% confidence
Problem Pattern

A report of an unexpected invoice contact prompted a check whether a named individual had SSO access to the internal IU Shop. The concern was potential unauthorized ordering ability, not a technical error message. Systems involved included Okta and the IU Shop's Extra‑Account provisioning process.

Solution

Support searched Okta and found no account for the named user, concluding there was no Okta/SSO access. The team confirmed that Extra‑Accounts were managed by an initial XLS import and subsequent additions by the ITOPS contact (Markus); sample Extra‑Accounts were present in the IU Shop Okta group, validating the group‑based provisioning workflow and indicating the queried user did not have SSO access.

Source Tickets (1)
263. Applicant portal access blocked by incorrect registration email address
95% confidence
Problem Pattern

An applicant could not access the application portal or request a password reset because the account was registered with a mistyped email address (e.g., .con instead of .com). The symptom was inability to receive activation or reset emails and no explicit error codes during login attempts. The systems involved included the applicant portal and linked backend records.

Solution

The erroneous email address in the applicant's record was corrected to the proper domain (changed from souhaila.bou2003@gmail.con to souhaila.bou2003@gmail.com). After the correction the applicant could access the portal and initiate a password reset.

Source Tickets (1)
264. Approval workflow approver reassignment during approver absence
95% confidence
Problem Pattern

Approval workflows stalled because the assigned approver was absent (for example, on parental leave) and could not complete required approvals. Symptoms included outstanding/pending approval tasks in the ticketing or approval-routing system (e.g., ITOPS), dependent access requests (such as VPN access) not progressing, and no explicit system errors beyond requests remaining in an awaiting-approval state. Affected systems included approval-routing records and ticketing/request systems.

Solution

Approval blocking was resolved by reassigning the approver on the organization’s approval-routing or ticketing record to an alternate approver and saving the change. In each case the approver field was updated in the relevant ticket/approval record (for example in the ITOPS request), the change was recorded in ticket comments, and the request/approval step was marked as updated/completed, which allowed downstream access provisioning (such as VPN requests) to proceed.

Source Tickets (2)
265. Onboarding gaps when apps omitted from employee initial-equipment form
90% confidence
Problem Pattern

New hires did not receive application licenses or entitlements on day one because required SaaS/apps (examples: Storyblok, Artifactory, 1Password vaults, Datadog, Deskbird, Egencia, GitLab) were not included on the employee initial equipment / access request form. Symptoms were missing access at start-of-employment with no in-app error codes reported and ad-hoc follow-ups required after onboarding.

Solution

Support advised the hiring/requesting manager to include all required applications on the employee initial-equipment/access request form so provisioning ran before the start date. As a practical mitigation a prepared template of required apps was provided for pasting into the form's description field to ensure all typical MarTech/dev tools were listed; exceptions (e.g., GitLab) were noted where a different provisioning path applied.

Source Tickets (1)
266. Freshdesk access provisioned via Workday-controlled group membership
90% confidence
Problem Pattern

A user requested Freshdesk (Freshworks) access and asked that the access request be routed via the Workday HCM contact. There were no application error messages; the request path and entitlement method were the primary blockers.

Solution

The user account was added to the Workday-managed group IU-ZZ-OK-ASS-Freshworks. Group membership granted the required Freshdesk access, and requestors were informed that Freshdesk access should be requested via the designated Workday HCM contact (Florian Achatz) going forward.

Source Tickets (1)
267. Data Warehouse (DWH) access for shared mailboxes required platform-owner provisioning
90% confidence
Problem Pattern

Request for read-access to the Data Warehouse (DWH) for a team/shared mailbox failed; the mailbox had no DWH read permissions and users could not query or view warehouse data. The requester routed the issue to central IT but discovered the DWH platform provisioning was owned by a separate DWH team and remained unfulfilled.

Solution

IT Operations clarified that DWH access was owned by the DWH platform team and provided the dwh-team contact. The requester then contacted the DWH team and the DWH team granted read-access to the specified shared mailbox (syntea-trainex@iu.org), restoring the mailbox's ability to access the warehouse.

Source Tickets (1)
268. Claude API CLI access blocked by insufficient Claude role assignment
65% confidence
Problem Pattern

User could not authenticate to the Claude API from a terminal/CLI environment; SSO/browser access was not the reported pathway. The account had been assigned only the generic 'Users' role and attempts to login via Terminal failed with no explicit error text recorded. Affected systems: Claude AI API and local Terminal/CLI usage for developer access.

Solution

The issue was resolved by changing the user's Claude role from the generic 'Users' assignment to a role that included API/CLI access privileges so the account could authenticate from Terminal. After the role was updated the developer was able to login to the Claude API from the CLI.

Source Tickets (1)
269. Claude team membership/approval stuck on pending invitation
90% confidence
Problem Pattern

Users requested access to a corporate Claude/Anthropic AI team or the default Cloud license and saw their request remain in "awaiting approval" with no team invitation delivered. Approval-notification emails continued while the requester lacked team membership or a license. In some cases the Claude team had reached capacity so provisioning was delayed and tickets were later auto-closed when requesters did not respond to proposed alternatives. Affected systems included Claude/Anthropic team membership, invite/email delivery, Cloud license allocation, Automation for Jira, and IU AI Chat.

Solution

Requests were routed through the Automation for Jira approval workflow and remained in a pending/"awaiting approval" state until the designated approver acted (examples observed: ida.busemann@iu.org, anja.zimmermann@iu.org, kai.becker@iu.org). Approval via the workflow did not itself provision access; after approver approval a workspace administrator manually sent a direct team invitation and confirmed delivery. Once the invitation was sent the awaiting‑approval notifications ceased and the requester received Claude/Anthropic team membership and the requested default Cloud license allocation. Where the Claude team had reached capacity, administrators were unable to provision immediately and offered alternative options (for example waitlisting or different license allocations); if the requester did not respond the ticket was placed on hold or auto‑closed without provisioning. Affected systems included Claude/Anthropic team membership and invite delivery, Cloud license allocation, Automation for Jira approvals, IU AI Chat access, and Microsoft (iu.org) credentialed access.

270. Service/system account requests for non‑Okta-managed apps and databases
90% confidence
Problem Pattern

Teams requested non-interactive credentials or access (service/system accounts, API keys, IAM role assumptions, read-only database credentials, or non-Okta web UI accounts) for applications and databases not managed via Okta. Requests frequently targeted cloud accounts (AWS), on‑prem databases and SaaS products, and often required change-data-capture or binlog access (for example, MySQL binlog) or network/firewall/VPN changes to enable ingestion from tools running in Kubernetes. Requesters reported missing keys/accounts, unclear application ownership, or no supported provisioning path, which blocked automations, data replication, or integrations.

Solution

Requests for credentials or API keys for applications and databases not managed through Okta were routed to the owning application or specialist teams; owners completed provisioning via their own service processes. EPOS requests were approved by the EPOS owner and fulfilled through the EPOS service-account process (an invite issued for the zpa-service account and the 'exam-admin' permission applied). Where cloud access was required, owners granted access by creating appropriate AWS IAM roles or enabling cross-account role assumption and by issuing database credentials as needed. Network, firewall, or platform teams updated connectivity to allow ingestion from Kubernetes-hosted tools (for example, Airbyte) when required. Requests needing replication-level access were resolved by granting read access to the CDC stream (for example, MySQL binlog) or providing replication-capable credentials. Secrets or service-account passwords were delivered using the SAFE Portal (with at least one recorded case of delivery via email). Ticket notes commonly recorded authorization/ownership checks, account creation/configuration details, notification of the requester, and documentation of the change. Tickets involving cloud-to-corporate VPNs or running VPN clients in cloud VMs were handled by network/platform or application-owner teams rather than central identity.

271. Okta user profile update requested to match upstream Salesforce role
95% confidence
Problem Pattern

Users request Okta profile/role changes after their Salesforce profile/role changed (examples: FS or DS Studienberatung). No authentication failures were reported; the symptom was an identity-record mismatch where Okta assignments, tiles, or entitlements did not reflect the upstream Salesforce role.

Solution

Okta profile and assignment records were edited in the Okta admin console to match the users' updated Salesforce roles. Changes were saved and confirmed so Okta records matched the Salesforce profile and downstream tiles/entitlements aligned. Examples in this corpus included updating a user to FS Studienberatung (change saved 2025-11-03) and updating viktoria.dick@iu.org to DS Studienberatung (change saved 2025-11-03 07:34 by Jan Winter). No login or authentication errors were reported in these incidents.

272. Perceived revoked SaaS access when user had an active account but hadn’t used Okta SSO
90% confidence
Problem Pattern

User reported sudden loss of access to a SaaS application (Salesforce) and inability to open reporting; user believed their account had been revoked. No explicit error messages were provided; the symptom was inability to access the service via the user's prior sign-in method. Support-side checks showed the target application account was still active but the user had not launched the app via the corporate Okta SSO tile.

Solution

Support verified the Salesforce account remained active and the access issue was caused by the user not launching Salesforce through the corporate Okta SSO tile. The user was instructed to sign in to Okta and open Salesforce via the Okta dashboard (SSO). No confirmation of successful sign-in was received and the ticket was auto-closed after 14 days of no response.

Source Tickets (1)
273. Mixed SSO application assignment and separate environment/role requests (jfrog + multi‑environment AWS roles)
80% confidence
Problem Pattern

User requested SSO access to a third‑party service (jfrog.io) and role access for multiple AWS environments (dev, preprod, prod). The user had Okta permission for the AWS DEV/sandbox environment but lacked access to other AWS environments and could not sign in to jfrog via SSO. No explicit error messages were provided; the request encompassed both SSO app assignment and environment-specific role provisioning.

Solution

Support assigned the Okta SSO applications for jfrog to the user, which resolved the jfrog SSO access. It was confirmed that the user already had Okta permission for AWS DEV/Sandbox; the outstanding requests for AWS preprod and prod were routed to the platform/team that manages AWS environment role assignments for further provisioning.

Source Tickets (1)
274. Missing Case access in Salesforce despite shown group membership
95% confidence
Problem Pattern

User could not view or work on Salesforce Cases and related list views while covering a colleague. The user reported being assigned to the expected groups in their account settings but could not access the Case records or list views; no explicit error messages were shown. Affected system: Salesforce Cases and user-group/permission mappings.

Solution

Support reviewed the user’s Salesforce account, compared the user’s group/role/profile mappings to the reference colleague, and corrected the missing Case-specific permissions and list-view assignments. After the required Case permission and group assignments were applied to the user (mirroring the reference colleague), the user verified she could access and work on the Cases and the ticket was closed.

Source Tickets (1)
275. Blank/white page after SAML login due to vendor-side redirect issue
95% confidence
Problem Pattern

Users completed SAML/IdP authentication or entered Okta credentials but the target application did not load. Symptoms included a blank/white page, browser redirect-loop errors (e.g., “The page redirected the request so many times…”), “Bad Request — The requested URL is invalid…” messages, or an IdP/Okta sign-in that accepted credentials then returned to the IdP/Okta landing page when launching an SSO app (no explicit error). Affected targets included vendor-hosted applications, OpenAthens-protected resources, and Okta SSO apps; SAML/IdP logs sometimes showed successful authentication while the in-app redirect failed, and behavior could be browser-specific.

Solution

Support investigated and resolved failures originating from intermediary launch points, browser state, vendor misconfiguration, and IdP/App assignment issues. Vendor-hosted application failures were resolved after vendors corrected incorrect or missing post-authentication redirect URLs so that launches from intermediary pages (for example, SharePoint) completed and the application loaded. OpenAthens incidents were resolved in two ways: some resources avoided redirect loops or browser errors when users launched them via the resource’s dedicated OpenAthens redirector URL (for example, go.openathens.net/redirector), and other cases were traced to browser state where clearing Chrome’s cache and cookies restored access (affected resources sometimes loaded normally in other browsers such as Safari). When clearing cache/cookies did not resolve OpenAthens “Bad Request” errors, support escalated to OpenAthens or the organisation’s administrators for further investigation; IP address restrictions were not relevant in the documented OpenAthens case. Directly accessing the application’s URL bypassed intermediary redirectors and allowed normal sign-in in several incidents while vendor or redirector fixes were applied. In Okta-specific incidents, initial account recovery steps (for example, a password reset) restored general Okta access, but launching an SSO app (for example AWS via Okta) still looped back to the Okta landing page in some cases; clearing browser history/cookies did not always fix this. In at least one Okta case the user’s access was restored after support added/assigned the user to the Okta MFA group, which resolved the SSO launch loop. Cookies being disabled or rejected was noted as a contributing symptom in multiple incidents. Support worked with vendors, OpenAthens, or the organisation’s administrators when fixes required changes beyond browser-state remedies.

276. Corporate ChatGPT account forced daily password resets resolved by platform update
90% confidence
Problem Pattern

A corporate ChatGPT user was forced to reset their password daily and could not maintain an active login session; the user reported repeated/forced password resets and attached an error message. The issue affected usability across sessions for the affected account.

Solution

The platform vendor deployed an application update that removed the condition causing repeated forced-password resets. Following the update rollout, the affected user confirmed the daily password‑reset requirement stopped and normal login sessions were restored.

Source Tickets (1)
277. Subscription/procurement stalled by incorrect cost center and missing approvers
85% confidence
Problem Pattern

Software or paid SaaS access requests remained unprovisioned because procurement metadata in the request/workflow—such as cost center or required approver/manager—was missing or incorrect. Symptoms were no technical error messages, requests stuck in pending/awaiting-approval states, and licenses/subscriptions not being issued (examples: NordLayer VPN, Jina.ai).

Solution

Access was restored after the required procurement metadata and approver information were provided or corrected. When the request record could be edited (for example in Automation-for-Jira), the cost center was changed to the correct organizational unit and the approver list was set to the cost-center manager and designated approvers; after these corrections the subscription request completed and the requester received paid access. In cases where the original ticket or workflow could not be modified, IT instructed the user to submit a new software request containing the cost center and manager approval (a link to the 'Request new Software' form was provided) and then proceeded with provisioning once the new request included the required procurement details.

Source Tickets (2)
278. Request for Atlassian Jira admin rights granted for board and team management
90% confidence
Problem Pattern

Requesters sought global Jira admin rights to create or manage Jira Software and Jira Service Management projects, boards, portals, and team membership. They reported being unable to create cross-project boards or Service Management projects and raised questions about Service Management licensing (agents vs customers), allowing external (non-organization) customer accounts, and Okta/SSO provisioning; no explicit error messages were present. Affected systems included Jira company-managed projects, Jira Service Management portals, Kanban boards, Advanced Roadmaps, and Okta.

Solution

Global Jira admin requests were handled per policy; when global admin privileges were granted, assignments were recorded. When global admin privileges were declined, support provisioned company-managed Jira Software or Jira Service Management projects and created the requested boards/portals, then added the requester as Project Admin (support collected project name, key, and preferred template). For Jira Service Management requests, support clarified licensing and account scope: agents were counted as licensed users, while customers (request reporters) did not require a paid agent license but had to be invited or permitted by the portal settings; support confirmed and configured whether external (non-organization) customer accounts were allowed for the instance. Okta/SSO questions were resolved by either provisioning internal accounts through Okta or confirming existing SSO mappings for the requester. When requesters wanted to isolate long-running work that affected sprint velocity, separate projects/boards (portals) were created to keep that work out of teammates' sprints. Jira Premium Advanced Roadmaps was recommended and enabled when cross-project planning or consolidated views were required. When Automation for Jira was relevant, support documented the automation scope and either implemented the required rules or recorded the automation requirements alongside the project provisioning. All actions and license/SSO clarifications were documented in the ticket.

279. Missing 1Password invitation prevented account setup
95% confidence
Problem Pattern

A new employee had no access to 1Password and reported not receiving an invitation to join the organization's 1Password account. The user could not complete account setup because the onboarding invitation was not delivered to their mailbox.

Solution

An administrator sent a 1Password invitation to the user's corporate email address. After the invitation email was issued, the user received it and was able to complete the 1Password account setup; the ticket was closed.

Source Tickets (1)
280. CMS domain/team permissions blocked content creation in Storyblok
95% confidence
Problem Pattern

A requester could not create landing pages for specified domains because they lacked access/permissions for those domain entries in the Storyblok CMS. No error messages were recorded; content creation actions were blocked by missing domain-level permissions.

Solution

The Storyblok domain/team permissions for the two domains were updated to include the requester. After the domain-entry access was granted, the requester could create the required landing pages and the ticket was closed.

Source Tickets (1)
281. Missing Okta dashboard tile due to absent application assignment (user could not SSO)
90% confidence
Problem Pattern

Users reported target SaaS applications were missing from their Okta dashboard or could not be launched via Okta. Affected users experienced failed or hung SSO launches, or support could not locate the application assignment in Okta; no vendor-side error codes were produced. In some incidents users also reported the app existed but their account lacked required product entitlements or licenses, preventing access.

Solution

Support resolved incidents by addressing account-level access in Okta and the SaaS product. In cases where the Enterprise SSO (Okta) application was not assigned, support assigned or reassigned the missing application to the affected accounts; the Okta dashboard tile appeared and SSO launches succeeded. In cases where the application record existed but the user still lacked access, an administrator granted the required product license/entitlement (for example, a Pro License) to the user; access was then available and confirmed by the requester. Tickets were closed after requesters verified entitlements and successful sign-on.

282. Access pending approver/specialist invite for vendor-hosted cloud apps (invite required outside Okta)
90% confidence
Problem Pattern

Users requested access to vendor-hosted cloud services (n8n Cloud, dbt Cloud) but were prevented from entering the environment because provisioning was pending approval or required a vendor invitation. No application-side error codes were reported; tickets showed an approval/invite workflow state and no in-product account present for the user.

Solution

The approver or specialist processed the outstanding approvals and issued vendor-side invitations. For n8n the approver confirmed the invite was sent; for dbt Cloud the specialist team invited the user and assigned the requested developer/admin role. Access was confirmed after the invite-based provisioning completed and tickets were closed.

Source Tickets (2)
283. Vendor account not recognized by organization due to username/email mismatch (Figma, 1Password)
40% confidence
Problem Pattern

Users were unable to use vendor applications because the account identity in the vendor system did not match the organization's corporate identity. Symptoms included in-product errors such as “username was not part of the organization,” inability to open documents or sign in, or access existing under a personal/non-compliant email that was not recognized by the enterprise systems (Figma, 1Password). Problems were often reported after owner-side invites or team additions that did not result in a usable vendor account tied to the corporate email.

Solution

When vendor accounts were not recognized by the organization, the underlying cause was a mismatch between the account identity in the vendor system and the organization’s corporate email. Resolution outcomes recorded included provisioning vendor access to the user’s corporate IU email through the Application Self Service workflow; the application was processed and access was provisioned to the corporate account, which restored org-linked access. In other instances, remediation required ensuring the vendor-side username/email matched the organization identity (for example by re-provisioning or reissuing an invite so the account was bound to the corporate email). One prior ticket contained no recorded resolution steps.

Source Tickets (2)
284. Datadog access blocked by missing Okta app assignment or pending approver workflow
90% confidence
Problem Pattern

Users could not open Datadog from Okta. Symptoms included the Datadog app missing from the Okta dashboard, SSO failures returning 'app not assigned to the user', Okta showing an error page when launching the app, or access remaining unavailable despite the user having an assignment notification or an Automation-for-Jira approver pending. Affected systems were Okta (app assignment/provisioning/SSO) and Datadog.

Solution

Access was restored by assigning or re‑provisioning the Datadog Enterprise application to the affected users in Okta and completing any pending Automation‑for‑Jira approvals. When users had already received an assignment but still saw an Okta error page or could not reach Datadog, the Datadog assignment was removed and re‑provisioned in Okta and technicians allowed ~5–10 minutes for Okta-to‑Datadog provisioning/synchronization to complete. After the Okta app assignment/provisioning and approval finished, users launched Datadog from the Okta UserHome and confirmed access.

285. OpenAI / ChatGPT access issues caused by invitation flow and SSO confusion
80% confidence
Problem Pattern

User did not receive or could not use the OpenAI invitation link and was unable to sign in; attempts to 'Continue with Microsoft' or to enter Microsoft credentials into the OpenAI password field failed and password‑reset produced errors (possible expired invite link).

Solution

Support resent the OpenAI invitation to the user's IU email and clarified that the account had been provisioned via an OpenAI invitation (native OpenAI sign‑in) rather than Microsoft SSO. After the resend and guidance not to use the 'Continue with Microsoft' path for that invitation type, the user was able to proceed with account setup.

Source Tickets (1)
286. SaaS workspace ownership transfer when owner is a service mailbox or departed user
75% confidence
Problem Pattern

Users reported lacking admin or edit rights because a SaaS workspace or specific content (e.g., workspace or board) was owned by an inaccessible account — either a service mailbox (for example martech-service@...) or an account tied to a departed employee. Affected users could not create teams, add members, organize workspace resources, or share/copy items and sometimes saw only 'comment-only' permissions. The inaccessible ownership prevented collaboration and risked loss of content or administrative control.

Solution

Ownership issues were resolved by two patterns depending on the ownership type and app. When the owner account was a service mailbox, support escalated to the named internal contact who managed that mailbox; that contact reassigned workspace ownership or granted admin rights to the appropriate team members (no billing transfer was performed), which restored ability to create teams, add members, and organize the workspace. When a specific item (for example a Miro board) was owned by a departed user and in-situ permission changes were not possible, support and the requester duplicated the board so the requester became the owner; the duplicated board restored sharing and edit capabilities. Both approaches removed the collaboration block and returned administrative control of the affected resources.

287. Metabase account provisioning handled by DevOps Service Desk
90% confidence
Problem Pattern

Users were unable to access Metabase because their user account or license was missing. Requests opened in the general IT queue produced no explicit error, were not provisioned, and ticket records were often marked Done and auto-closed (typically after ~14 days) without account or license creation.

Solution

Access requests submitted in the general IT queue were not provisioned; DevOps handled all Metabase account and license provisioning through its Jira Service Management/Service Desk. Support directed requesters to create access requests via the DevOps Service Desk portal (example: https://careerpartner.atlassian.net/servicedesk/customer/portal/31) or to contact the DevOps team by email (one documented contact: John Rottmair). When requests were submitted through the DevOps Service Desk portal, DevOps created the Metabase account/license and closed the access request. Tickets left in the general IT queue were often marked “Done” and auto-closed after approximately 14 days of no reply; support responses sometimes informed users that replying within 7 days would reopen the ticket, otherwise they were asked to open a new access request and reference the original.

288. Cloudinary access limited by account identity (IU vs external partner)
80% confidence
Problem Pattern

User reported shared Cloudinary access stopped and requested a personal Cloudinary account to host PDFs. The request involved two identities (corporate IU account and a Careerpartner account), and the user expected support to provision access for the non‑IU Careerpartner identity. No explicit error codes were provided and ticket activity ceased.

Solution

Support confirmed Cloudinary access could be granted through Okta for the user's IU corporate account but could not be provisioned for the external Careerpartner account from the same support channel. The support response offered Okta-based access for the IU identity; no additional provisioning was completed in this ticket and it was closed after no further reply from the requester.

Source Tickets (1)
289. Access controlled by application/product owners or vendor teams (owner‑managed access)
90% confidence
Problem Pattern

Users reported they could not access or edit resources inside specific applications because access and in‑app permissions were controlled by application/product owner teams rather than central IT. Symptoms included lacking edit permissions or in‑app rights (for example inability to edit a Salesforce dashboard), missing application accounts, inability to modify records, or authorization failures such as “Your account does not have the necessary privileges to access this endpoint” when authorizing through third‑party flows. Affected systems included owner‑managed platforms like SalesTech/Salesforce, SiteFusion/Teaq, Flywire, and Supabase; requests routed to central IT did not directly grant the required rights.

Solution

Support did not provision in‑app permissions and instead routed each request to the owning application or product team and their service portals. Salesforce dashboard/edit requests were forwarded to the SalesTech Service Desk (SalesTech - Service - Jira Service Management / SalesTech Service Portal). SiteFusion/Teaq access was routed to the SiteFusion/Teaq access team via cfe-teaq@iu.org. Flywire access issues were handled by the Flywire account owner (thomas.heinz@iu.org). Supabase MCP authorization failures (reported when authorizing via Claude Code with an error about insufficient privileges and organization‑level access controls) were forwarded to the specialist/product team per the support comment. Tickets were closed after advising requesters to engage the product owners or portals; some tickets were auto‑closed for inactivity but could be reopened within the configured timeframe.

290. Access requests auto-declined by Automation for Jira due to missing/incorrect approver
95% confidence
Problem Pattern

Access requests routed into Automation for Jira approval workflows were automatically recorded as 'Declined' because the required approver was missing, misassigned (for example placed in a CC field or routed to the wrong person), or failed to respond within the 14‑day approval timeout. Symptoms included an automated 'Declined' resolution and a closed request with no permission change; affected systems included Application Self Service, Automation for Jira, Confluence, Miro, and the LCC Marketplace.

Solution

Automation for Jira approval workflows auto‑declined requests when the workflow's approver routing was incorrect or when the approver did not act before the 14‑day timeout. In the incidents reviewed the approver field had been misassigned (an approval notification was routed to a CC recipient instead of the requester's manager) or the required manager/CostCenter approver never approved; in one case the approver field was corrected after the automation had already recorded 'Declined' and the request remained closed. No additional permissions were granted as a result of the automated declines. The affected systems included Application Self Service, Automation for Jira, Confluence, Miro, and the LCC Marketplace; the matched ticket did not document further remediation or configuration changes.

291. OpenAI/ChatGPT account limited‑access flag removed by admin
90% confidence
Problem Pattern

Users reported in-product access restrictions in ChatGPT: either an account-level 'Limited access' indicator that blocked full ChatGPT functionality, or a team/workspace showing 'This workspace has been disabled' (e.g., 'Dieser Arbeitsbereich wurde deaktiviert.') that prevented selecting or accessing the organizational ChatGPT Team and left only a personal account available. No additional error codes were reported.

Solution

Support removed account-level 'limited access' flags when present; after the flag was cleared the in-product 'Limited access' indicator disappeared and full ChatGPT access was restored. For team/workspace issues, support re-enabled the disabled ChatGPT Team workspace, ensured the user had a valid team invite (sent or re-sent invites as needed), and performed a final workspace reactivation/cleanup. After workspace reactivation and confirming the invite, the team workspace became selectable and organizational ChatGPT access was restored.

Source Tickets (2)
292. Broad Azure/Intune access requests required scope clarification and constrained approval
80% confidence
Problem Pattern

A requester asked for broad/global viewer‑style access to Azure and Intune (including a new Sentinel Space) to evaluate group software management. Reviewers flagged the requested scope as too broad and raised governance and employee‑representation concerns; this was an access/role scope discussion rather than a technical error.

Solution

Approvers discussed narrowing the requested scope and the request was completed with constraints. The recommended outcome was to grant global viewer on the normal subscription but not on the new Sentinel Space and to use an administrative account managed via Azure AD Privileged Identity Management (PIM) for sensitive areas. The request was closed after scope clarification and applying constrained privileges.

Source Tickets (1)
293. Application and software access requests pending Automation-for-Jira approval
90% confidence
Problem Pattern

Users requested access/licenses for SaaS or desktop tools (example: GitLab, PDF24, Miro board) via the Automation-for-Jira application request flow. Requests stalled while awaiting approver action or specialist approval; some requests referenced ambiguous product names or included share links but reported no concrete error messages.

Solution

Requests were resolved after the Automation-for-Jira approval workflow completed or the correct approver was assigned. For the PDF24 request the exact product was clarified as PDF24 Creator and the corporate software-portal link was provided; an approver change was applied and the software request was approved so the user could download the installer. The GitLab request was approved and a GitLab license/entitlement was granted. A Miro board write/edit request was closed after the board owner granted the requester edit rights (support had instructed the user to contact the board owner).

Source Tickets (3)
294. Miro access lost after corporate email change or account-email mismatch
90% confidence
Problem Pattern

User lost access to their Miro workspace after their corporate email address changed (old external-format address → new corporate domain) and expected their existing license to be transferred. The user could not access Miro and did not report specific error codes; the issue appeared tied to the account/email identity change or license assignment.

Solution

An administrator re-enabled and unlocked the user's Miro account and restored access under the updated corporate email address. Access was explicitly enabled by the Miro administrator so the user's license and workspace access continued under the new email identity.

Source Tickets (1)
295. Application-specific SSO/login failure reported as 'user not found' with vendor-side bug
95% confidence
Problem Pattern

A user could sign in to other Okta-integrated services but received 'Benutzer nicht gefunden' ('user not found') in Chrome and 'Anmelden nicht möglich' on the Okta login screen in Firefox when accessing a specific PMS application. Okta credentials worked elsewhere, indicating the failure was isolated to the PMS application.

Solution

IT confirmed the user's Okta account showed no issues and escalated the incident to the PMS application team. The PMS team identified the behaviour as a broader application bug; no further local remediation was performed and the ticket was closed after escalation to the PMS vendor/system owners.

Source Tickets (1)
296. Okta tile visible but in‑app access blocked by application owner / license or account provisioning
90% confidence
Problem Pattern

Users saw an application tile in Okta or completed SSO but then hit application-specific errors or reduced functionality (for example: “Zugang deaktiviert” / “access disabled”, “You cannot edit your user profile”, or reporting/dashboard errors) and could not reach required features. The Okta sign-in or tile presence succeeded, but access depended on an application-level account state, license, or external provisioning/invite rather than Okta. Affected systems included Qualtrics Customer Experience and internal exam-correction tooling.

Solution

Support verified that the Okta tile or SSO integration was present but that application-level access was controlled outside central IT. For the FS‑Klausurkorrektursystem support confirmed the tool was managed exclusively by the Prüfungsamt and referred the user to akad-pruefungsamt@iu.org. For Qualtrics Customer Experience support confirmed the SSO integration and that central IT handled license assignment/configuration, but the user's in‑app account had been disabled or lacked the required in‑app license; these incidents were resolved when the application owner/team reactivated the account or assigned the correct in‑app license. Support advised users to contact the application owner teams (people-products@iu.org or the Qualtrics research owners) for reactivation, provisioning, or license issues. Some tickets recorded no further details about who performed the reactivation.

297. CARE (academy5) SSO login failures due to account state or Okta-side configuration
95% confidence
Problem Pattern

Users could not sign into CARE/academy5 (AcademyFIVE) via Okta SSO; SSO attempts failed with messages such as "you do not have access to AcademyFIVE", "access denied", or "you have no access". In some cases users subsequently reported "my credentials are wrong" or "invalid credentials" after an attempted fix. Other Okta-authenticated services (for example Salesforce) often remained accessible; affected users typically had an Okta identity but lacked the CARE/academy5 app entitlement, had a deactivated CARE/provisioned account, or experienced Okta-side SSO/mapping issues.

Solution

Support restored CARE/academy5 (AcademyFIVE) access by investigating both the Okta and CARE account states and correcting whatever prevented the SSO assertion from mapping to an active CARE account. Resolutions included reinstating/reactivating the CARE account in the provisioning system, assigning or entitling the user's Okta account to the CARE/academy5 application, and applying fixes to Okta-side SSO configuration or attribute mappings that prevented successful authentication. In several cases administrators re-enabled or restored the user account and then confirmed that the user signed in via Okta SSO; where users reported "invalid credentials" after remediation, the issue was attributable to credential/flow confusion (SSO versus local credentials) and was resolved once the account state and Okta app assignment were corrected and users signed in through Okta. In each case the user confirmed that SSO sign-in to CARE/academy5 was successfully restored.

298. Internal invoicing app access blocked by missing user-profile permission
90% confidence
Problem Pattern

Users were unable to open or use the Freelancer Invoicing App in Power Apps: the app either did not appear in the user's Power Apps list, showed a "Freigabe erfragen" (request access) dialog, or failed on load with an immediate access/error dialog. Symptoms occurred in web browsers (regular and incognito) and involved Power Apps and the Freelancer Invoicing/Billing App; no application error codes beyond the access dialog were consistently present.

Solution

Support restored access by granting app-level sharing/permissions or accepting the pending access request so the Freelancer Invoicing App became visible. Where the app was role- or group-gated, support assigned the required application role or added the user to the access/provisioning group and reprovisioned the account when group membership issues were found. In cases that surfaced an access/error dialog on app load, support performed backend adjustments (reprovisioning/permission updates) and recommended clearing browser state; after the permission/group changes and browser-state refresh the user could open the app. Support confirmed access after changes. Support did not provide a direct download link and directed users to the Dozierendenguides/manager for installation or procedural details.

299. Application approval workflow auto-declined AI license requests when approver was missing
90% confidence
Problem Pattern

Requests for corporate ChatGPT/OpenAI (ChatGPT Business / GPT‑4) seats or team invitations remained unapproved and were automatically declined/closed by the Automation-for-Jira approval workflow due to no valid approver. Symptoms included requests stuck in pending approval, approvers replying that they were not the correct contact or were unavailable, and automated messages such as 'missing the approver' or '14 not approved or approver no longer available'. No license provisioning or invitation activity was recorded.

Solution

Automation-for-Jira approval automation auto-declined and closed corporate ChatGPT/OpenAI license and team-invitation requests whenever the approval step lacked a valid approver. This occurred both when the approver field was empty and when a named approver indicated they were not the correct contact or was otherwise unavailable. The workflow produced automated decline/closure messages (examples observed: 'missing the approver' and '14 not approved or approver no longer available') and left the tickets closed, preventing any ChatGPT Business / GPT‑4 licenses or team invitations from being provisioned; no further provisioning activity was recorded.

300. ChatGPT SSO sign-in loop with Microsoft/Okta resolved by direct company‑email sign-in
90% confidence
Problem Pattern

User could not complete ChatGPT corporate sign‑in: the site repeatedly prompted for Microsoft sign‑in despite the user already being signed into Microsoft via Okta SSO, resulting in a login loop and inability to access the corporate ChatGPT account.

Solution

Support instructed the user to sign in to ChatGPT on the provider's sign‑in page using their company email address. The user followed that method and access to the corporate ChatGPT account was restored.

Source Tickets (1)
301. External contractor onboarding with staged/activation-timed Atlassian account and unclear downstream access
80% confidence
Problem Pattern

Onboarding request for an external contractor listed multiple system accesses (GitHub, GitLab, Azure, AWS VPN, 1Password, custom apps) but lacked clear details for some systems (notably Azure). Requesters asked whether a single ticket covered all accesses or if separate tickets were required.

Solution

An Atlassian user account for the contractor was created and configured so that a password‑reset link would be sent to the contractor's private email on the employee start date. Azure and other system accesses were left unspecified in the record pending clarification; no further cross‑platform provisioning was recorded in the ticket.

Source Tickets (1)
302. Ambiguous Claude (Anthropic) access requests lacking chat vs API scope and distribution-rights clarity
60% confidence
Problem Pattern

Request for access to Claude.ai did not specify whether chat UI access or API (key) access was required, and there was uncertainty about whether the organisation/team pro account could distribute seats to the requester. The lack of scope and distribution‑rights detail blocked provisioning.

Solution

The ticket recorded the need to add the user to the Syntea/IU team pro account but also noted uncertainty about distribution rights and whether chat or API access was required. No definitive provisioning action was recorded; the request required product‑owner clarification before access could be granted.

Source Tickets (1)
303. Provisioning social‑media editor access via third‑party management (Agorapulse)
90% confidence
Problem Pattern

Staff were unable to obtain editor/manager access to institutional social‑media channels (YouTube, Facebook, Instagram, LinkedIn). Users reported they could not post or manage content and raised access requests, but native platform login credentials were not available to IT and no centralised third‑party management or credential store was consistently in place.

Solution

Access was restored by coordinating ownership with the communications team and onboarding requested users into the organisation's Agorapulse workspace. Specific users and roles (examples: Gianna Barabasch, Nida Ahmad, Samuel Willson, and an Online Reputation Manager) were added to the Agorapulse account and assigned to the INT unit resources, which provided the required editor‑level access to the social channels (YouTube, Facebook, Instagram, LinkedIn). Tickets showed that native platform credentials were not held by IT; a 1Password vault was suggested to centralise those credentials going forward. Some tickets were nevertheless closed with a 'Won't Do' resolution despite access being provisioned, indicating occasional resolution‑status misclassification in the ticketing process.

Source Tickets (2)
304. Salesforce queue visibility blocked by preset list-view filters
90% confidence
Problem Pattern

After a team change the user could not see incoming Cases from several 'PA ...' Salesforce queues; queues were visible but used restrictive preset list-view filters (example: Kopie_von_PA_Thesis) that filtered out incoming records and prevented the user from seeing new Cases.

Solution

The issue was resolved by identifying and contacting the queue owners/administrators who adjusted or removed the restrictive preset list-view filters and updated the user's queue access. After the owners changed the filters and/or access, the incoming Cases in the 'PA ...' queues became visible to the user.

Source Tickets (1)
305. CampusManagement Service Portal access missing due to absent role assignment
95% confidence
Problem Pattern

A Team QA member lacked access to the CampusManagement Service Portal and related functions after a role change; the user's account was missing required portal permissions/roles which prevented access to portal features.

Solution

Permissions were reviewed and the user's account was updated. The role 'IU-ZZ-OK-ASS-IT' was assigned to the user in the CampusManagement Service Portal, which restored the required access and allowed the subtask to be closed.

Source Tickets (1)
306. Confluence access denied due to identity-provider / account mismatch
90% confidence
Problem Pattern

A user was unable to open Confluence space links despite being added to the space; investigation showed the Confluence group membership was assigned to an EntraID (Azure AD) guest identity rather than the user's Okta (LIBF) account, and the user had never signed in via the correct IdP.

Solution

The investigation confirmed the group membership targeted an EntraID guest account instead of the user's LIBF Okta account. It was determined that Okta-based LIBF accounts would become available on the scheduled date, and access required reassignment of the Confluence group membership to the user's Okta identity once the Okta accounts were enabled.

Source Tickets (1)
307. Salesforce mobile app sign‑in failed when Okta SSO did not complete and no native password was available
65% confidence
Problem Pattern

User could sign into Salesforce via Okta SSO on desktop but the Salesforce mobile app failed to complete the Okta SSO flow. The user selected the custom 'Okta' domain in the mobile app and the Okta Salesforce option but observed no login progression. The user also had no native Salesforce password (desktop relied on SSO) and an expired password‑reset link; MFA via Salesforce/Google Authenticator was referenced.

Solution

No final remediation was documented in the ticket. The record noted that the mobile app did not complete the Okta SSO flow and that the user lacked native Salesforce credentials; a previously requested password‑reset link had expired. IT Operations did not perform any backend changes or complete a password reissue in the ticket notes, and no confirmed fix/outcome was recorded.

Source Tickets (2)
308. Internalized vs external account mapping causing permission denial in IT Service Portal
80% confidence
Problem Pattern

An internalized (corporate) user account could not create tickets in the IT Service Portal while the user's external account still worked. Symptoms included permission denial using the internal email, the internal address appearing disabled in Jira/Admin consoles while Okta showed a different state, and reproducible access failure suspected to be caused by stale group assignments or account-mapping mismatches between Okta/Entra ID and Atlassian.

Solution

The internal user mapping was corrected so the portal and Jira referenced the same internal identity. The agent updated the account mapping for the internal email/profile in the Atlassian/Jira user records and aligned the group/membership state with the Okta/Entra ID source-of-truth; after the mapping change the internal account regained the ability to create tickets in the IT Service Portal. The ticket noted stale automatic group rules and Okta cache as the likely root cause but the remediating action was the account-mapping update and membership synchronization.

Source Tickets (1)
309. No Okta and MyCampus access resolved by account resets
90% confidence
Problem Pattern

A user reported no access to Okta and to MyCampus with no error messages or additional symptoms. Both services were unreachable for the user and the problem report did not include specific error codes or visible failures beyond lack of access.

Solution

An administrator performed an Okta account reset and a myCampus account reset on 2024-07-29. After those resets the user's Okta and myCampus access was restored and the issue was closed.

Source Tickets (1)
310. SAML response status 'not Success' (Responder/Unauthorized) blocking LinkedIn Learning SSO
70% confidence
Problem Pattern

LinkedIn Learning sign-in attempts failed with a SAML response status that was not urn:oasis:names:tc:SAML:2.0:status:Success (reported as Responder/Unauthorized). Symptoms included failed SAML verification from the IdP and inability to link or use the LinkedIn Learning account via SAML SSO in Teams and related portals.

Solution

The user was advised to access LinkedIn Learning via the Okta portal as a workaround. LinkedIn Support reported that the SAML response status was not Success and indicated the tenant Learning administrator would need to escalate to LinkedIn if the SAML error persisted. The ticket recorded guidance to sign in via Okta and vendor escalation instructions; no tenant-side configuration change was recorded in the ticket.

Source Tickets (1)
311. Third‑party SharePoint destination requiring tenant‑level app grant and security approval (Hightouch)
80% confidence
Problem Pattern

A SaaS integration (Hightouch) needed elevated SharePoint permissions so it could write to multiple site collections, but the requested scope would allow broad edit/delete across site collections. The request was security‑sensitive because Hightouch users were enabled via Okta and tenant‑wide app consent could expose more content than intended. The ticket described inability to configure Hightouch as a destination and raised data‑protection concerns.

Solution

No final technical change was applied in the ticket. The investigation recorded a planned approach: obtain explicit approval in the referenced Teams chat and then have the SharePoint administration team perform the Hightouch application grant so it could write to the required site collections. The ticket noted the permission grant would be performed by SharePoint admins after the documented approval to limit scope and address the security concerns.

Source Tickets (1)
312. n8n webhook creation prevented by insufficient permissions in connected Jira instance
90% confidence
Problem Pattern

n8n Cloud reported the user was "not eligible to create webhooks" when attempting to create webhook triggers. The user believed they had a role allowed to create webhooks and full permissions, but webhook creation was blocked and workflows could not be completed. The error appeared to involve n8n’s ability to register webhooks against the connected Jira system.

Solution

Investigation concluded the denial was most likely caused by insufficient permissions in the connected Jira project/instance rather than an n8n product bug. The incident was escalated to the Jira specialist/approver for the required permission changes; no webhook creation fix was applied in n8n during the ticket and the request was ultimately closed as "Won't Do."

Source Tickets (1)
313. Jira Advanced Roadmaps/plan access still denied unless the plan/page owner granted explicit permission
95% confidence
Problem Pattern

A user with general Jira access could not open a specific Advanced Roadmaps plan URL and received access denied or insufficient permissions. Granting generic Jira product access did not allow viewing the plan; the plan or page maintained owner‑controlled access restrictions. No explicit error code was supplied.

Solution

Support granted the user general Jira access and verified product‑level entitlement, then advised that access to the specific plan remained controlled by the plan/page owner. The ticket noted the creator/owner must explicitly grant the user permission to the plan; no further changes were applied and the ticket was auto‑closed after inactivity.

Source Tickets (1)
314. Application Self Service: vendor‑specific pre‑request required before Okta assignment (Salesforce Marketing Cloud)
90% confidence
Problem Pattern

Users attempting to access Salesforce Marketing Cloud via the Okta Marketing Cloud link were unable to sign in and saw non‑specific login failures. Okta Application Self Service requests for Marketing Cloud remained pending or unassignable and approvers could not add the application until a vendor‑side Marketing Cloud user existed. Automation/Jira notifications often showed approvals pending (for example, 'waiting for an approval') but no explicit error codes; requests were sometimes ambiguous between Marketing Cloud and Sales Cloud.

Solution

Incidents were resolved by completing the vendor‑specific provisioning workflow for Salesforce Marketing Cloud. A Marketing Cloud user account request was created and processed through SalesTech; those SalesTech requests required details such as planned Marketing Cloud usage, communications to be sent, and a provided reference user before the vendor account was created. After the SalesTech request was processed and the Marketing Cloud user existed, the approver released/approved the Application Self Service request in Okta and assigned the Marketing Cloud application to the user. Access provisioned only after both the vendor account and the Okta assignment were present; simply adding the Marketing Cloud link on the Okta dashboard without a processed SalesTech account did not enable sign‑in. Tickets commonly showed Automation for Jira approver notifications indicating pending approval but did not include explicit system error codes.

315. Oasis / Special Considerations: screen‑level permissions and targeted access controls
90% confidence
Problem Pattern

A user lacked access to Reasonable Adjustments (Oasis) and to the Special Considerations system; after an initial permission change Reasonable Adjustments worked but Special Considerations remained inaccessible. Symptoms included access granted for one function while another related application/screen (Contact Search / Special Considerations) still blocked the user, with no error codes reported.

Solution

Access was restored by granting the user the required permission to amend Reasonable Adjustments in Oasis and by correcting the Special Considerations permission target (the Contact Search screen) before granting the appropriate permission there. The change was confirmed to take effect once the Contact Search screen permission was applied.

Source Tickets (1)
316. VPN access request via Microsoft My Access Access Package and Company Portal installation
80% confidence
Problem Pattern

User on Windows 11 requested VPN access to reach a remote printbox from home but did not have the VPN entitlement. This was an access/approval request rather than a connectivity error; the user lacked the required Microsoft My Access package approval and had not installed the VPN client from Company Portal.

Solution

The support guidance directed the user to request the VPN entitlement by applying for the appropriate Microsoft My Access Access Package (including justification and optional time period). After the Access Package approval the user received the approval email and then installed the VPN client via the Company Portal and connected using the installed VPN. The ticket noted the Access Package was time‑limited and may require reapplication.

Source Tickets (1)
317. Application Self‑Service and Automation-for-Jira approval/routing delays
91% confidence
Problem Pattern

Application Self‑Service access requests failed to progress to provisioning when Automation-for-Jira approval workflows did not complete or when requests were created under an incorrect Jira portal category. Symptoms included Automation-for-Jira notifications showing approvers "waiting for approval" or workflows stuck "In Progress", tickets opened in the wrong portal so provisioning automations never triggered, and Atlassian API logs showing application assignment messages even while approvals remained pending. Affected systems: Application Self Service, Automation for Jira, Jira, and the Atlassian API.

Solution

Issues were resolved by ensuring requests completed in the portal and approval workflow expected by Automation-for-Jira so the provisioning automation could route and finish. Where approvers asked for more justification, requesters supplied additional context (for example: study-support justification) and approvers then approved; where tickets had been opened under the wrong Jira portal category, tickets were reopened in the correct Software-Request portal, the required approver and reference user were confirmed, and the request was resubmitted. In all cases Automation-for-Jira recorded the application assignment and the Atlassian API applied the assignment; in several incidents the Atlassian API recorded/applied the assignment even while approvals remained pending or after the requester later indicated they no longer needed access. Tickets were then marked Done and access was recorded as granted.

318. SSO access blocked by missing Okta dynamic/group membership for account type
90% confidence
Problem Pattern

Users were unable to access an SSO‑protected application because their Okta account did not belong to the product-specific Okta group (dynamic or assignment group) required for that tenant/environment. Symptoms included successful Okta sign-in but no application tile/SSO access or an explicit "application not assigned" style symptom tied to mismatched IU vs WB account group membership.

Solution

The support team identified the product-specific Okta groups used for the application (separate dynamic group for WB employees and a distinct IU group for IU accounts) and manually assigned the user to the appropriate Okta group/application for Cascade. After the manual group/app assignment the user regained SSO access to the Cascade application.

Source Tickets (2)
319. Vendor app login failure resolved by applying application update
80% confidence
Problem Pattern

A user could not sign into a vendor-hosted invoicing application and was unable to use the password-reset flow; no explicit error codes were provided and the user requested an access/reset link be resent.

Solution

The application was updated to the latest build on the user's environment. After the app update completed the user was able to access the Freelancer invoicing tool again and the previous inability to reset the password was resolved without further administrative password resets.

Source Tickets (1)
320. Zoom–HubSpot integration blocked by requiring Zoom admin install/organization-wide consent
80% confidence
Problem Pattern

Attempt to connect Zoom to HubSpot failed because the HubSpot app requested access to all users and could not be installed by a regular user. Company Portal client-install guidance did not apply because this was an OAuth/integration approval flow inside the Zoom admin console. The integration presented an integration/authorization error and explicitly required a Zoom administrator to approve or install the app for the organization.

Solution

IT/specialists reviewed the integration and confirmed the HubSpot app requested organization‑wide scopes and therefore required a Zoom administrator to install or approve it in the Zoom tenant. The requester was advised that installing via the Company Portal client was not applicable for this OAuth integration and that a Zoom admin (tenant owner) must perform the install/consent in the Zoom admin console. No tenant‑level install was performed by IT in the ticket; the request was documented and routed accordingly.

Source Tickets (1)
321. CharlyApp showing empty student lists resolved by application-team fix
90% confidence
Problem Pattern

Users opened a CharlyApp course (DS - Mündliche Prüfungsleistungen) and saw empty student lists where students (e.g., Lisa Schenk, Lisa Rohrbacher) should have appeared. The symptom was inability to view any students in the app UI across the affected course instance.

Solution

IT support escalated the visibility problem to the CharlyApp development team. The application developer applied a code/configuration fix to restore student data visibility in the affected course. The developer confirmed that data would now be visible and the requester verified that all students were displayed again.

Source Tickets (1)
322. Metabase inaccessible when Okta app and AWS ClientVPN group membership or VPN config were missing
70% confidence
Problem Pattern

Metabase web UI failed to load for users who authenticate via Okta-only SSO. Affected users initially lacked Okta group membership for the Metabase application and for AWS ClientVPN, and were unable to connect to the required AWS VPN because they did not have the correct client configuration or profile details.

Solution

Support identified missing Okta application/group assignments for both Metabase and the AWS ClientVPN and attempted to provide the AWS VPN client. The case was escalated to DevOps when Metabase access still failed after the user obtained the client, because VPN configuration details and backend access checks required platform‑owner investigation. The ticket recorded group/membership gaps and an escalation to DevOps for final connectivity and application‑side troubleshooting.

Source Tickets (1)
323. Storyblok access required Okta authentication and explicit space assignment
80% confidence
Problem Pattern

Requester could not access the Storyblok instance to review content because their account had not been provisioned: they had not authenticated via Okta and they had not specified which Storyblok spaces/environments were required. The symptom was lack of access despite an outstanding request, with no explicit error codes.

Solution

Support added the user to the Storyblok Okta group and asked the requester to perform an initial Okta sign‑in so the Storyblok user account would be created. Support also requested that the user specify the exact Storyblok spaces/environments needed so the product owners could assign the appropriate space access. The ticket remained awaiting the user's response and was auto‑closed after inactivity.

Source Tickets (1)
324. External vendor (Simovative) CARE database read access requiring specialist provisioning
80% confidence
Problem Pattern

External vendor team members lacked read access to the CARE database needed to investigate and fix student exam grade data. The symptom was inability of the vendor implementation team to open or query the CARE database, which blocked a critical data issue affecting grades.

Solution

The access request was forwarded to the specialist/DevOps team responsible for CARE database provisioning. Support documented the external requester and the reference user and routed the escalation so the specialist team could apply the appropriate external‑vendor read permissions or onboarding process for CARE.

Source Tickets (1)
325. Deskbird provisioning failed with SCIM error in Okta; reactivating SCIM fixed assignment
90% confidence
Problem Pattern

Users could not obtain or had incorrect Deskbird access because identity provisioning did not deliver required account attributes or assignments. Symptoms included Okta SCIM provisioning errors that blocked application assignment and missing company affiliation/group membership in Deskbird (no explicit error shown) so office access controls failed. Affected systems included Deskbird, Okta, Entra/Azure AD and Workday, with failures occurring in SCIM/group-sync and attribute propagation paths.

Solution

Two provisioning failure patterns were addressed. In cases where Okta reported SCIM errors and the Deskbird assignment failed, the Deskbird–Okta SCIM provisioning integration was reactivated and the application assignment was reapplied; this cleared the SCIM error and restored the booking-program assignment. The change was tested by the designated owner via the Okta dashboard and the requester was asked to confirm access. Separately, where users’ company affiliation or group membership from Workday was not reaching Deskbird (preventing office-level access), the identity provisioning pipeline (Workday → Okta/Entra → Deskbird) was corrected so the company attribute/group sync propagated over SCIM and Deskbird received the correct company membership. The ticket for the company-affiliation case recorded the issue as resolved but did not include a detailed change log of the exact mapping adjustments.

Source Tickets (2)
326. EPOS 'Buchung beenden' (End booking) permission missing for IT Student Support and then granted
95% confidence
Problem Pattern

IT Student Support lacked the EPOS permission 'Buchung beenden' (End booking), preventing staff from deactivating expired Exma bookings. The symptom was expired bookings remaining active in EPOS and inaccurate display in MyCampus.

Solution

Support requested the 'Buchung beenden' permission for the named IT Student Support users. The permission was granted for the specified users (Aysu Hancer, Birte Gundel, Michael Weier, Axel Posselt) and the ability to end bookings was confirmed; the expired Exma bookings could then be deactivated and the issue was resolved.

Source Tickets (1)
327. Jira permission requests stalled by insufficient requester detail and approval timeout
90% confidence
Problem Pattern

User requested new Jira Software permissions but did not specify which project or exact permission changes. The request entered an Automation-for-Jira approval workflow and remained pending; no actionable details or approver response were provided and the request stalled or was closed without changes.

Solution

Support did not apply any permission changes because the request lacked project and permission details and the requester did not respond to follow-up. The ticket was closed as no‑response; support advised that project owners are the authority for project-level access and that a new request specifying the exact Jira project and required permission/role would be needed to proceed.

Source Tickets (1)
328. OpenAI / Corporate ChatGPT onboarding: approval and invite inconsistencies
75% confidence
Problem Pattern

Users experienced blocked or inconsistent access to the corporate ChatGPT/Team workspace: pending approval states in the provisioning workflow, UI differences compared to colleagues, or invite acceptance errors such as 'Oops! This invite was already accepted.' Attempts to accept invites or complete onboarding failed or reported mismatched states.

Solution

Provisioning actions were tracked in the approval workflow and manual invitations were issued by the platform owner. In one case an approval notification was routed to the configured approver and a direct invitation/link was sent by the platform admin; no subsequent user confirmation was recorded and the ticket was auto‑closed. In a separate case the user reported the 'invite already accepted' error after an invitation had been processed; support logged suggested troubleshooting steps but no confirmed follow‑up or final remediation was recorded in the ticket.

Source Tickets (2)
329. Site‑managed digital‑signage (Vineow/ViewNeo) account access held by local site owner
90% confidence
Problem Pattern

A user responsible for publishing schedules to on‑site TVs lost the ability to publish/display content via the Vineow/ViewNeo account for a specific location (Berlin). The inability to publish affected only that site and no platform error codes were reported.

Solution

Support verified the affected location and directed the user to the local account holder; the site owner provided the credentials. After the user contacted the local owner (Marco Tenuta) and regained the account credentials, the displays were confirmed working and the ticket was closed as resolved.

Source Tickets (1)
330. HQ intranet (SharePoint) access requests for Walbrook/LIBF area
90% confidence
Problem Pattern

A user lacked permissions to access links on the corporate HQ intranet (SharePoint) for Walbrook/LIBF and could not reach intranet content. No specific error codes were reported; the request sought site-level read/navigation access.

Solution

SharePoint site access was granted to the requesting user for the HQ intranet area (Walbrook/LIBF). The ticket was completed after the permissions were applied and the requester was to be notified that access had been granted.

Source Tickets (1)
331. myLIBF login failure via OASIS showing 'Missing Data' for student accounts
85% confidence
Problem Pattern

A student attempting to access their myLIBF account through the OASIS portal encountered a login failure and the web UI reported 'Missing Data', preventing access to myLIBF learning resources.

Solution

Support restored the learner's myLIBF account access and confirmed that both the requester and the learner were then able to access the myLIBF account. The ticket notes a successful restoration by support (Sean Parker) but contains no recorded technical changes or steps.

Source Tickets (1)
332. MyCampus course participant list mismatch blocking grade publication
55% confidence
Problem Pattern

MyCampus displayed an incorrect participant roster for a seminar course, preventing the instructor from entering or publishing grades. The issue appeared as wrong students shown on the course page; instructor could not proceed with grading. Related accesses (Charly App / Okta) were also reported unavailable for the same instructor in the same incident.

Solution

Ticket investigation recorded two co-occurring problems but no confirmed remediation. The MyCampus participant-list mismatch remained unresolved in the ticket and required escalation to the MyCampus/course-management owners. The account-access symptom (instructor unable to reach Charly and Okta while Microsoft Office still worked) also remained open with no documented fix in the record; the incident was left for product-owner/identity-team follow-up.

Source Tickets (1)
333. OpenAI / ChatGPT account showing 'Limited Access' and missing Playground after invite
70% confidence
Problem Pattern

Users experienced ChatGPT/OpenAI access failures: invited accounts showed an OpenAI admin console 'Limited Access' state with the Playground UI absent and API overview indicating restricted access; separately, ChatGPT/ChatGPT+ group workspaces were reported as deactivated or unavailable for multiple users with no specific error codes. Affected systems included the OpenAI admin console, ChatGPT web UI (Playground), ChatGPT+ group accounts and workspaces.

Solution

Support sent vendor invitations and advised a short propagation wait for role/invite propagation; in those cases the OpenAI console 'Limited Access' state and missing Playground UI cleared after invitation/role propagation. Separate incidents where group ChatGPT/ChatGPT+ workspaces were deactivated were resolved by the vendor's internal ChatGPT support/engineering team, after which support asked users to retry access and confirmed workspace reactivation. Requests for Microsoft Copilot were routed to the organisation's Copilot/M365 provisioning workflow when raised in the same tickets. Some tickets were closed after confirmation from users; a small number were auto-closed without recorded confirmation of the UI/state change.

Source Tickets (2)
334. Anthropic / Claude invite failed with 'email is already in use' due to duplicate/deleted account
70% confidence
Problem Pattern

Anthropic (Claude) invitation links failed with the error 'email is already in use' when the user attempted to accept an invite. The user reported a previously deleted account and suspected a duplicate account or email conflict blocked re‑invitation.

Solution

The ticket captured the invite/acceptance failure and the vendor-side error message but did not record an in-ticket remediation. The incident indicated an account/email conflict on the Anthropic side and required Anthropic account-recovery or vendor support intervention; no fix was recorded in the support ticket.

Source Tickets (1)
335. Okta dynamic group created from Workday roles (Spendmanager_DYN_Group)
90% confidence
Problem Pattern

Request to create an Okta dynamic group that automatically included employees who held specific Workday roles (Cost Center Manager, Cost Center Approver, Project Manager). Membership depended on Workday roles being synced into Okta.

Solution

A dynamic Okta group named 'Spendmanager' (Spendmanager_DYN_Group) was created and configured so membership included users with Workday role 'Cost Center Manager' OR 'Cost Center Approver' OR 'Project Manager'. The change required coordination with the WCC Team to ensure Workday roles were exposed to Okta for the dynamic membership rules to function.

Source Tickets (1)
336. Adobe Lightroom mobile/browser SSO failure for single user despite desktop working
65% confidence
Problem Pattern

User could open Lightroom desktop but the mobile app and browser SSO login failed: after selecting 'Continue with Adobe' the flow redirected to Okta/Workday, accepted credentials and MFA, then returned an error. The SSO flow worked for other testers and the user's PC, indicating a user- or client-specific Adobe↔Okta SSO failure.

Solution

The ticket documented that desktop Lightroom installs and launches successfully while mobile/browser SSO produced an error after successful Okta authentication. No corrective action was recorded; the case was noted as likely requiring Adobe↔Okta integration investigation or per-client troubleshooting and was left for escalation to Adobe or identity/integration owners.

Source Tickets (1)
337. Company portal missing student record due to Salesforce non-assignment
80% confidence
Problem Pattern

A company account in the applicant/company portal could view all students except one specific student; that student was not linked/assigned in Salesforce and therefore did not appear in the portal. The company also could not access study plans in the portal.

Solution

Support recommended browser cache clearing and, when that did not resolve the missing student mapping, escalated the issue to the Applicant/Company‑Portal support team because the agent lacked access to portal settings and student-assignment controls. The ticket supplied the applicant-portal support contact for Salesforce-side assignment; no in-ticket data correction was applied.

Source Tickets (1)
338. Personal vendor subscription inaccessible when signing in via corporate SSO (identity mapping mismatch)
80% confidence
Problem Pattern

User had a personal/subscribed Adobe Sign entitlement but signing in via corporate SSO (Microsoft account) denied access to Adobe Sign signature features. SSO launch succeeded but the in‑app action (request/collect signature) returned an access denial with no explicit error code. Affected systems: Adobe Sign, Adobe identity, Microsoft SSO.

Solution

Support adjusted the user’s Adobe/SSO account mapping and internal access settings for the Microsoft‑linked identity. After the administrator change the user re‑tried and confirmed Adobe Sign was accessible and signature requests completed successfully.

Source Tickets (1)
339. Temporary external contractors needing multi-system developer access and secrets for data migration
70% confidence
Problem Pattern

External contractors required simultaneous access to multiple developer platforms (EPOS Dev, GitLab, Logz/logz.io, JFrog, AWS secrets and job queues) to run data‑migration work. They lacked necessary permissions and secrets, preventing development and testing; there were no vendor error codes, the blocker was missing cross‑platform entitlements and secret access.

Solution

The request was routed to the respective platform and product owners rather than being granted by IT Ops. Owners/teams were identified as responsible for provisioning GitLab, Logz, JFrog, EPOS development permissions and for providing secure access to the AWS secret and job‑queue credentials. Guidance and the required action items were recorded and escalated to those owning each service.

Source Tickets (1)
340. SSO login broken after account rename/surname change (identity mapping correction fixed access)
95% confidence
Problem Pattern

After a surname/account rename the user could not authenticate to a SaaS app (Miro) via Okta SSO; the Okta SSO launch returned an unspecified error and the user was unable to log in. Symptom appeared tied to an identity/account rename or mapping mismatch.

Solution

The identity/specialist team corrected the backend account/identity mapping related to the surname change. After the rename correction the user retried Okta SSO and confirmed successful login to Miro.

Source Tickets (1)
341. Manual provisioning and shared‑group/vault assignment requests for small SaaS tools and demo/test accounts
90% confidence
Problem Pattern

Users reported lack of access to small or standalone SaaS tools and shared/demo/test accounts (examples: 1Password shared vaults, Calendly, Actionbound, myCampus/IU Learn demo accounts). Symptoms included expected 1Password vault entries or shared vaults not appearing, pending 1Password invitations awaiting acceptance, inability to discover who manages or shares a vault via the self‑service portal, missing accounts, or requests for tools that were not listed in the internal software catalog. Users generally reported no error codes.

Solution

Support processed access requests for small or standalone SaaS tools and shared or demo/test accounts by creating accounts or directly assigning access when an owner or administrator was identified. For 1Password shared vaults, administrators created invitations when required, awaited user acceptance, verified users’ 1Password accounts and current permissions, and added users to the requested vaults or groups once access was accepted. When a vault owner could be determined, admins granted requested access; when the self‑service portal did not surface the owner, support performed troubleshooting and advised how to identify or escalate to the owner or IT. If a requested SaaS tool was not known or not listed in the internal software catalog, IT could not provision access and notified requesters that the tool was not in the catalog. Calendly accounts were created on request. Actionbound requests were handled by sharing the campus onboarding reference and directing requesters to Portal Service On Campus for provisioning. Requests for shared IU Learn/myCampus demo accounts were routed to Immatriculation/Enrollment and learn-app@iu.org to obtain appropriately formatted student test accounts. Tickets were closed after the account was created, access was assigned, guidance was provided, or when resolution was not possible due to missing owner/administrative information or because the tool was not in the software catalog.

342. Salesforce user provisioning, profile changes and permission-set assignment gaps
90% confidence
Problem Pattern

Users requested new or elevated Salesforce accounts, in‑app profiles, or permission sets (including Marketing Cloud/Sales Cloud). Reported symptoms included inability to sign in to specific Salesforce products, missing or incorrect profiles or permission sets after role changes, and account-alignment requests referencing other users. Provisioning delays also occurred when a formal manager approval or permission-specifying request was not submitted. Affected systems: Salesforce core (profiles), Marketing Cloud, Sales Cloud, and related SaaS integrations.

Solution

Provisioning and profile-change actions resolved the access incidents. New Salesforce user accounts were created where requested and affected product sign-in (Marketing Cloud / Sales Cloud) was restored after the Salesforce team applied the correct entitlements. A user’s profile was changed to the required “INT Management” profile to enable management-level access. Several permission-set assignment tasks required involvement of the Salesforce specialist team because administrators lacked the necessary overview to map and apply permission sets from reference users. In some cases provisioning was delayed until a formal manager request or approval that specified required permissions and access areas was received; once that approval was submitted, IT provisioned the account accordingly.

343. Service‑Portal and provisioning workflow gaps for SaaS access (Google Analytics, Miro)
85% confidence
Problem Pattern

Users encountered blocked SaaS account creation or unclear onboarding steps due to outdated Service Portal guidance and approval/ cost-center processes. Symptoms included account sign-up being held for approval, uncertainty whether external users were allowed, and confusion about when to request analytics (GA) access during onboarding.

Solution

The service‑portal content and access workflow were reviewed and updated. For Google Analytics, the Service Portal article was revised and the onboarding point at which GA access can be requested was clarified. For Miro, users were instructed to decide whether a free plan sufficed or licensed access was needed and to complete the provisioning form including cost center and written approval (screenshot accepted); the ticket guidance closed after providing the corrected process and required approval documentation details.

Source Tickets (2)
344. Team-admin role missing prevented 1Password team invitations
95% confidence
Problem Pattern

Users were unable to manage team membership or vault access in 1Password because they lacked required team- or vault-level admin permissions. Symptoms included missing invite/manage controls in the 1Password team context or inability to assign/read/write access to a specific vault (no error codes were reported); requests commonly remained pending until an existing administrator performed the change.

Solution

Access issues were resolved by granting the appropriate 1Password roles or vault-level permissions. Where requesters lacked the team-admin role they were given the same team roles and rights as their peer managers; where they lacked vault-level admin or read/write rights (for example, in a DevOps Vault) an existing 1Password administrator granted the specified permissions. Requests were forwarded to technical/IT operations and an administrator completed the role or vault-permission changes, after which users regained the ability to invite team members or manage vault access.

Source Tickets (2)
345. Missing vendor Org‑Admin identity blocked Adobe Support ticket access
70% confidence
Problem Pattern

In-house administrators could not access Adobe Support’s ticket tracker or apply vendor-side changes because the Adobe account listed as the vendor's Org‑Admin was no longer available (previous Org‑Admin had departed). Symptoms included inability to view/close Adobe-side support tickets and to retrieve vendor-provided solutions.

Solution

Support confirmed that Adobe’s ticket tracker and certain vendor-side actions required the specific Adobe Org‑Admin identity that was registered in Adobe’s system. The ticket documented that a named Org‑Admin had left and that normal in‑house admin accounts lacked the vendor-side Org‑Admin association; this clarification established why existing local admin privileges were insufficient and identified the Org‑Admin identity as the required account to regain vendor-support access.

Source Tickets (1)
346. Miro board sharing blocked by instructor account permission state
90% confidence
Problem Pattern

An instructor attempted to share Miro boards with students but sharing failed and students could not access the boards. The user reported permission/sharing errors and questioned whether the institutional instructor account needed to be whitelisted or had an account-state restriction. Affected systems: Miro board sharing, institutional Miro account and permission settings.

Solution

Support staff scheduled a live session with the instructor, inspected the affected Miro board sharing settings and the instructor's institutional account/permission state together, applied targeted permission/configuration adjustments in the instructor's account and board sharing settings, and confirmed with the instructor that board sharing to students now worked.

Source Tickets (1)
347. Cross-department collaboration blocked by missing Confluence licenses and cost‑centre charge approval request
75% confidence
Problem Pattern

A team wanted to collaborate with colleagues from another internal department in Confluence and to use a shared Jira board, but the collaborating persons did not have Confluence licenses. The requester reported that a private Teams channel was used as a workaround but lacked needed board/calendar functionality. The requester sought licensing cost information to obtain cost‑center approval for granting Confluence/Jira access to the other department.

Solution

An exchange meeting was scheduled and held with the requester and representatives of the Regional Coaches to discuss the collaboration requirements and the available licensing/guest-access options. The session clarified the collaboration goals and the licensing gap to be addressed (Confluence/Jira access for the coaches) and documented the next steps for procuring or approving licenses and charging the appropriate cost centre.

Source Tickets (1)
348. Content and accounts bound to a personal Adobe ID preventing Enterprise migration
90% confidence
Problem Pattern

Website/Portfolio content was stored under a personal Adobe ID (IU-ARCH-HH@iu.org) and could not be published or transferred into the organisation's Enterprise Adobe account. Attempts to create Enterprise-managed accounts or to transfer Portfolio content to other Enterprise/federated accounts failed; the original personal Adobe ID remained active and an Okta/federated login for that identity was missing.

Solution

Adobe Support and IT confirmed that migrations from a personal Adobe ID to an Enterprise (federated) Adobe ID were not permitted. Attempts to assign the content to newly created Enterprise-managed or alternate personal accounts did not move the Portfolio content, and IT lacked the ability to delete or convert the original IU-ARCH-HH personal Adobe account. No automated migration was achieved and the ticket recorded the failed transfer attempts and the vendor's migration policy as the blocking factor.

Source Tickets (1)
349. Workspace or content access blocked by single-owner/service-account model despite license allocation
80% confidence
Problem Pattern

Users could not update or access team-managed content/spaces because access and ownership were tied to a single account or workspace owner rather than being granted automatically by product license/Okta assignment. Symptoms included inability to upload/replace Cloudinary-hosted videos after the owner login stopped working, inability to be added to a Miro data-platform space despite a license being allocated, and standard Metabase account provisioning requests that required direct owner intervention.

Solution

Outcomes varied by system: Metabase access was granted after direct contact with the responsible product owner (the owner provisioned the account via chat). For Cloudinary no access change was implemented during the ticket; a service-account approach (employerbranding@iu.org) and SSO-enabled account creation were documented as the proposed remedy but not executed. For Miro a license was allocated to the user by the platform admin, but workspace membership in the 'data platform' space remained owner-controlled and the manager could not add the user; the ticket was closed with the allocation recorded and the remaining workspace membership issue left for the product owner to resolve if refiled.

350. Limited-test-seat SaaS access for data‑platform tools (DBT Cloud)
86% confidence
Problem Pattern

Requesters lacked access to DBT Cloud and found no internal documentation or user mappings in Entra/Okta. Attempts to provision access failed because available test accounts were not discoverable or were already assigned, leaving teams unable to trial the service.

Solution

Investigators checked the platform account inventory and confirmed that only five DBT Cloud test accounts had been issued and all were already assigned. No internal onboarding or provisioning path existed to grant additional seats, so no account changes were made; the requester was informed that no extra test accounts were available and the ticket was closed as not actionable.

Source Tickets (1)
351. 1Password vault ownership model prevents removing built-in owners group
92% confidence
Problem Pattern

A request sought a highly sensitive 1Password vault restricted to five named users only, but a mandatory 'owners' group was automatically included on vault creation and could not be removed. A user reported unexpected loss of permissions and inability to eliminate broader owner access.

Solution

Support examined the 1Password tenant configuration and confirmed that the platform enforces a non‑removable 'owners' group that retains access to created vaults. The current membership of that owners group was identified (including a named owner). Because this behaviour was a product design limitation, no vault configuration change was possible and the request was closed after documenting the restriction.

Source Tickets (1)
352. Okta-managed dynamic groups lacked assignable Owner attribute, breaking PowerApp owner-dependent access
91% confidence
Problem Pattern

A service account could not see or be set as Owner for several LMS dynamic groups; the groups were missing from the PowerApp view used for license provisioning and onboarding. PowerApp automation expected an Owner property but the groups were not available to be assigned or managed.

Solution

Troubleshooting confirmed the four LMS groups were Okta-managed dynamic groups which do not support the assignable 'Owner' attribute required by the PowerApp. The cause was documented as an identity-source compatibility issue and the support record recommended using Entra/Azure AD groups or another identity source that exposes group ownership so the PowerApp and service account could access and manage those groups. The investigation was closed after documenting the root cause and recommendation.

Source Tickets (1)
353. Access to apps via a company‑managed/shared account (company-managed assignment)
90% confidence
Problem Pattern

User requested access to an internally managed application account (company/shared account) to create or test content but could not sign in or access the app. The request showed no in‑app error messages and was awaiting internal provisioning/approval. The user expected assignment to an existing company-managed account rather than a new per‑user provisioning flow.

Solution

The request was forwarded to the owning specialist team and the specialist added the user to the organisation‑managed Lovable account. Access became available after the specialist completed the account assignment and the ticket was closed as Done.

Source Tickets (1)
354. Programmatic SharePoint access blocked for Azure AD client_id (service principal permissions and broken approver workflow)
92% confidence
Problem Pattern

A service principal / Azure AD client_id could view a SharePoint file in a browser but programmatic access using the client_id failed. The programmatic (API) URL differed from the browser view link and the client_id lacked the required SharePoint API permissions. The access request approval workflow had an unknown/unavailable approver, blocking formal approval.

Solution

No technical access change was applied; the service request was declined and closed automatically after the approval window elapsed because manager/CostCenter approval and a valid approver were not provided. The ticket record noted that the client_id did not possess the necessary API permissions and that the programmatic endpoint differed from the browser view link, so programmatic access remained ungranted when the approval workflow timed out.

Source Tickets (1)
355. Okta provisioning conflict when user already has vendor account in another instance (SSO account collision)
90% confidence
Problem Pattern

User had a valid product license but could not access vendor documents because Okta provisioning failed with a conflict. Okta reported that it could not create a new account when the user already had an existing account in a different vendor instance, causing SSO/provisioning to fail and the document owner invite to remain unprocessed.

Solution

Support verified that a Lucid license had been assigned but confirmed the Okta provisioning flow failed due to an existing Lucid account in another instance ('Okta can't create an account if the user already has one in another instance'). The conflict prevented Okta from creating or linking the SSO account and the request remained unresolved in the ticket (user-side invite/owner action was required); no automated provisioning fix was recorded in the ticket.

Source Tickets (1)
356. SaaS provisioning blocked by missing workspace or group (Juro onboarding)
85% confidence
Problem Pattern

Request to provision a SaaS user account failed because the target workspace/group did not exist in the vendor tenant. The requester could not proceed with onboarding because the service requires assignment to an existing workspace or group and the listed contact/owner was unavailable. Provisioning stalled with no vendor-side workspace to attach the new account.

Solution

Support verified the Juro instance and confirmed no matching workspace/group existed for the requested onboarding. Support offered to create the email user (e.g., CanadaPOD@iu.org) but did not complete provisioning because the account had to be assigned to an existing Juro workspace; the requester was asked to provide the target workspace or a workspace owner to proceed. No workspace/owner was supplied and the request was closed without completing the account creation.

Source Tickets (1)
357. Marketing Cloud Child Business Unit changes require SalesTech/SalesOps team action
88% confidence
Problem Pattern

Users were unable to move Marketing Cloud (Twilio) Journeys into a CHILD Business Unit and reported missing authorizations in Marketing Cloud/Salesforce. The symptoms were lack of the required account-level permissions to change Business Unit assignments or to alter connected Salesforce/Marketing Cloud settings.

Solution

Support confirmed the requested Business Unit change required SalesTech/SalesOps team privileges and could not be performed by the central IT support team. The requester was redirected to the SalesTech service portal for the specialized change; the SalesTech team handled the access/Business Unit move and the request was closed after that handover.

Source Tickets (1)
358. EPOS exam-area UI visibility vs assigned roles (exam centers, slots, student data)
85% confidence
Problem Pattern

Users reported missing EPOS UI sections (exam centers/location management, exam-slot creation, associated student data) or immediate error messages when opening EPOS links. Affected users had apparent role/permission parity with reference users but experienced different UI visibility or access failures across browsers and launch contexts (Salesforce, Care). No explicit error codes were consistently present.

Solution

Support compared the affected accounts to working reference users and in cases where role/permission mismatches were found they synchronized the affected user's role assignments to match the reference user; access was restored after the change and a browser relog or cache/cookie refresh. In other cases where accounts showed identical rights but the UI still differed, the issue was escalated to the EPOS application/product team for deeper investigation (developer-level entitlement/feature-visibility inconsistency).

Source Tickets (2)
359. Metabase access requests owned by DevOps (ticket handoff and routing)
90% confidence
Problem Pattern

Users could authenticate to Metabase but were unable to execute queries or access specific databases or datasets (for example, the 'Care' database); Metabase provided no clear in‑product error codes or descriptive permission messages. Affected systems included Metabase and its connected data sources (e.g., Care database). Incidents were often reported as general access or onboarding requests and lacked technical diagnostics about the user's Metabase roles or dataset permissions.

Solution

Support determined that Metabase user provisioning and dataset/query-level permission management were owned by the DevOps/Platform team and that support did not have authority to grant those permissions. Support routed requests to the DevOps/Platform team and instructed users to submit permission requests via the DevOps Service Portal (or the DevOps intake channel). In resolved cases DevOps updated the user's Metabase permissions to include query rights for the specified database (for example, granting query access to the Care database) and the user regained query capability; support tickets were marked Done after the requester acknowledged the guidance. Some handoffs were not acted on and were auto-closed when requesters became inactive.

360. Salesforce product-permission requests owned by SalesTech and approval workflow auto-decline
90% confidence
Problem Pattern

A user with an existing Salesforce account requested additional product-specific access (dashboard/view) such as CAMA Anerkennung or ABN-Labeling. The requests produced no system error codes but required SalesTech-owned permission changes and entered the SalesTech approval workflow (Automation-for-Jira). Tickets commonly awaited external approver/cost‑center approval and were sometimes automatically declined by the workflow when not approved within its time window.

Solution

Support determined that the requested Salesforce dashboard/view permissions were owned and managed by the SalesTech team and could not be applied by central support. Users were directed to submit access requests through the SalesTech Service Portal; the requests entered the SalesTech approval workflow (Automation-for-Jira) and were logged as awaiting approval. In cases where approvers did not respond within the workflow's configured time window, Automation-for-Jira automatically declined and closed the request. No central-support permission changes were applied during these tickets.

Source Tickets (2)
361. Microsoft Clarity / cloud-analytics provisioning requiring security/privacy review and packaging
80% confidence
Problem Pattern

A team requested access to Microsoft Clarity to obtain heatmaps and qualitative analytics; request lacked technical errors and instead required product onboarding and approval checks (privacy, security, deployment packaging).

Solution

The request was routed through the standard supplier/security review chain: Data Protection and IT‑Security reviews were completed without objections, the internal checklist was updated (a Client Management component was removed because Clarity is cloud‑hosted), and the request was forwarded to BOPS and Endpoint Management for further review and packaging work. The ticket progressed through automation routing rather than being provisioned immediately by central support.

Source Tickets (1)
362. LCC‑managed Power BI Deputatsplaner access issues
85% confidence
Problem Pattern

Users were unable to open or view the Deputatsplaner application (Power BI report/workspace or the Deputatsplaner PowerApp) when opening the usual link; an error screen was shown without specific error codes or messages. Built-in access‑request links did not grant access. Affected systems included the Deputatsplaner Power BI workspace/report and the Deputatsplaner PowerApp; users repeatedly reported the same access failure and inability to use Deputatsplaner functionality.

Solution

Support confirmed that Deputatsplaner resources were owned and managed by local teams rather than central IT (examples included the LCC team and Academic Coordination). Responders did not directly grant access but informed users which team owned the resource and instructed them to submit an access request to that team via the organisation’s service portal or Jira Service Management, providing username, requested role/permissions and a business justification. Support noted that the built‑in access‑request links did not grant access and some portal requests were handled as 'Won't Do' by the owning team; at least one user later reported access became available after following the portal request process. In addition, support suggested checking whether the Deputatsplaner access link had changed and whether an extended Power BI license was required. No central technical remediation was performed in the reported cases; one ticket was closed after no response from the user. As a temporary alternative for viewing deputat/Überdeputat information, the internal app 'Einsatzplanung Profs' was suggested.

363. Mentimeter access blocked by SSO/whitelisting restrictions
90% confidence
Problem Pattern

User was unable to sign in to Mentimeter for teaching sessions and received a generic "Login failed" message when attempting authentication via the corporate SSO. Symptoms included immediate login failure with no vendor error code recorded and inability to run live polls in class.

Solution

Support enabled/whitelisted the user's Mentimeter access on the corporate side so that the SSO/login succeeded. The user was notified to retry and later confirmed the issue was resolved after whitelisting was applied.

Source Tickets (1)
364. GitHub Enterprise access requiring group membership and approval
95% confidence
Problem Pattern

User requested access to GitHub Enterprise but was not a member of the required GitHub user group, and the provisioning was pending approval. The symptom was lack of access to the enterprise GitHub instance until group membership and approval were granted.

Solution

The pending approval was completed and the user was added to the required GitHub Enterprise user group by the approver/admin (Stephen Odoardi), which granted the requested GitHub access. The ticket was closed after group membership was applied.

Source Tickets (1)
365. Vonage telephony account provisioning and Salesforce record entry
90% confidence
Problem Pattern

Users requested telephony access or credentials (Vonage or Twilio) and/or an outbound phone number and asked for the access to be recorded in Salesforce. Reported symptoms included a missing telephony access entry in Salesforce, lack of usable app credentials, or no assigned outbound number; no authentication error codes were provided. Affected systems: Vonage, Twilio, Salesforce, intranet.

Solution

Cases were handled in one of two ways depending on the request: when a new telephony account was required, a Vonage account was provisioned for the named user and the new account details were entered into Salesforce so the CRM record existed. In other cases the requested accounts or application assignments already existed: support verified Salesforce access via the intranet and that the Twilio application was assigned to the user, did not create separate credentials or allocate an outbound number, and closed the request with guidance to open a new ticket if the user later experienced login issues. The outcomes recorded reflected either account creation plus CRM entry or access verification with no change.

Source Tickets (2)
366. ChatGPT / OpenAI: corporate group account not visible after SSO sign‑in
90% confidence
Problem Pattern

User signed in to chat.openai.com with corporate SSO but only their personal GPT account appeared; the expected corporate/group account option (e.g. "IU Group ChatGPT Access") was missing from the account selector. There were no explicit error codes; admin confirmed the group account was active. Affected systems: OpenAI/ChatGPT web UI and corporate SSO.

Solution

Support confirmed the IU Group ChatGPT account remained active and the missing option was a UI/account‑selection issue rather than a disabled group. The user was advised to sign in via the institution's specific login method/URL and select the "IU Group ChatGPT Access" option in the account selector; after using the provided corporate sign‑in flow the group access option became available and the ticket was closed.

Source Tickets (1)
367. SaaS admin role assignment: Monday.com admin privileges granted to requester
95% confidence
Problem Pattern

A user lacked administrative privileges in a SaaS application (examples: Monday.com, Twilio) and requested admin-level access because they could not perform administrative tasks. No platform error messages were reported. Tickets sometimes referenced a pending approval in the ticketing/automation system.

Solution

Administrative privileges were created or granted for the requester in the affected SaaS tenant and the user's admin status was confirmed in that tenant. In the Twilio case the ticketing automation showed the request awaiting approval, but an agent confirmed the Twilio admin access had already been provisioned before the approval step completed.

Source Tickets (2)
368. Access request approvals stuck in Automation for Jira (CC‑Approver) workflow
76% confidence
Problem Pattern

User application access requests remained in a pending-approval state because they awaited an Automation for Jira 'CC‑Approver' approval, with users reporting lack of access and no application error. Comments or request history showed approvers were notified but the approval step was not completed. Affected systems included the Automation for Jira approval workflow, the Atlassian API / Application Self Service assignment flow, and the target application (for example, Charly or JFrog Artifactory).

Solution

Support tracked the Automation for Jira approval workflow and confirmed the request was awaiting action in the CC‑Approver step. The responsible product team or listed CC‑approvers completed the CC‑Approver approval; once the approval finished, the Automation for Jira workflow (via the Atlassian API/Application Self Service integration) applied the entitlement and assigned the application to the user. After the assignment completed and access was granted, the ticket was closed.

369. Access requests closed when requester failed to provide required details or respond
90% confidence
Problem Pattern

Users submitted access or account‑creation requests but omitted required details (for example target site/SSP link, workspace identifier, reference user, required access level, username, purpose, or timeline). Support staff or Automation-for-Jira requested clarification and awaited the requester’s reply; when no response was received the request remained unfulfilled and the ticket was closed or auto‑closed (commonly after 14 days). Requests were left without provisioning or confirmation.

Solution

Support staff and Automation-for-Jira placed incomplete access and account‑creation requests on hold and recorded the specific missing information (for example target site/SSP link, workspace identifier, reference user, required access level, username, purpose, or timeline). Agents posted repeated clarification requests in ticket comments (for example asking for a reference user to determine the correct permission package); automation sent reminders and auto‑closed tickets after 14 days of no response. No account creation or provisioning was performed when requesters did not reply. Ticket records preserved the requested details and the closure reason so requesters could reopen or resubmit. Requesters were directed to submit a new access request through the IT Service Portal (Jira Service Management) via “I need something” → “Software” and to follow the documented manager‑approval/approval reference process. In some instances incomplete requests were closed with resolution “Won’t Do” and likewise had no provisioning or follow‑up steps recorded.

370. HTTP 400 when opening internal IT Service Portal from intranet after Okta/portal launch
75% confidence
Problem Pattern

User launched the IT Service Portal link from the intranet and received an "HTTP Status 400 – Bad Request" response while other intranet pages (Service Center) remained accessible. The symptom occurred during a role/identity transition (Backswitcher) and was observed when launching the portal directly rather than from the Okta application dashboard. Group/membership state and Okta-launch path were implicated.

Solution

Support added the user to the IT Service Portal access group and advised the user to sign in to Okta and launch the IT Service Portal from the Okta dashboard ("Meine Anwendungen"). Those changes were applied and documented in the ticket. After group membership was added and Okta launch instructions were provided, the user still reported the HTTP 400 error; the ticket was marked Done but no final confirmation of successful access was recorded in the ticket notes.

Source Tickets (1)
371. Access requests must be submitted via product‑specific self‑service portals
90% confidence
Problem Pattern

Access requests and portal access attempts remained pending or unprovisioned because users submitted them via general IT tickets, support mailboxes, or student tech support instead of the application's or organisation's staff self‑service portal. Requests often showed no in‑app errors but provisioning did not occur until the correct portal submission or approver workflow was used. Affected systems included BIC Cloud, Microsoft Copilot, DS Kompetenzcenter, 1Password and the IU employee/myCampus portal. Some users lacked the correct portal link or portal access, causing routing confusion and delays.

Solution

Requests were completed only after they were submitted and approved through the vendor- or product-specific self-service portals rather than via general IT tickets or student-support mailboxes. BIC licences were fulfilled after submission through the Atlassian Service Desk self‑service form. Microsoft Copilot access was processed after the named approver granted approval and a support agent executed the Copilot request through Application Self Service (Jira Service Management). DS Kompetenzcenter and 1Password access were enabled after submission and approval via the LCC portal and the product Self Service Portal respectively. For IU employee/myCampus access, users were routed to the Serviceportal (link provided); where users had no portal access they were directed to email atlassian@iu.org, and lecturers were directed to dozierendenguides@iu.org. It was clarified that student tech support could not process staff-account or employee-data requests.

372. Access requests stalled by missing/incorrect approver, cost‑center or wrong ticket type
85% confidence
Problem Pattern

Access requests were held in pending approval because the approval workflow or ticket metadata was incorrect: wrong approver or cost‑center assignment, or the ticket used an incorrect request type that bypassed required cost‑center approval. Affected apps included Miro, Mouseflow and Salesforce account provisioning.

Solution

Support identified and corrected the routing/approval gaps or recreated the request with the correct metadata. For the Miro board request the approver and cost center were corrected (likely approver Karl Schoß and cost center CC15500) and a new Application Request was created; the new request completed. For Miro and Mouseflow the original ticket used the wrong request type, a new ticket was created and approval was awaited from the cost‑center owner (Daniel Riemer); Mouseflow was forwarded to the Applications & Requirements team for provisioning. For Salesforce account requests the requester was informed that manager approval (Alice) and a reference user with equivalent rights were required; no approval/response was received and the ticket was closed.

Source Tickets (3)
373. Requested Okta dashboard tile missing because sandbox has no Okta integration
95% confidence
Problem Pattern

User requested an Okta dashboard tile to launch a Salesforce Sandbox login but no Okta tile was available for the Sandbox environment. Symptom: user could not add an Okta tile or single‑sign‑on launch for the Salesforce Sandbox.

Solution

Support confirmed that no Okta application tile existed for the Salesforce Sandbox environment and informed the requester that Okta could not provide the requested dashboard tile. The user was advised to contact the Salesforce department / sandbox owner for sandbox‑specific access and the request was closed.

Source Tickets (1)
374. Jira/Atlassian project links redirected to IT Service Portal due to missing project membership or approver workflow
86% confidence
Problem Pattern

Users clicked Okta dashboard tiles, direct links or invitation URLs expecting to open a specific Jira/Atlassian project but were redirected to the IT Service Portal or Jira Service Desk landing page instead. Affected users appeared in corporate Okta groups or had an Okta Jira entitlement but did not receive project-level access or membership; some affected accounts were external users or required manager/cost‑centre approval. No in‑app error codes were shown — symptoms were silent redirection and inability to open the target project.

Solution

Access failures were resolved by granting the missing project‑level permissions or completing the approver workflow. For the EPOS/Jira project the support team assigned the required project rights/membership (per the project owner) which restored direct access. For external users and other cases where Automation-for‑Jira required an approver, access was completed after a Self‑Service 'Request Jira (for External)' submission with the manager/cost‑center approver or after the requester provided written manager approval and an admin applied the project membership.

Source Tickets (2)
375. SSO launches the main SaaS site but embedded/linkable subcomponents require separate authentication or different owner
82% confidence
Problem Pattern

Users could launch a SaaS storefront (IU Shop) via Okta SSO, but specific content linked from another system (SharePoint Factsheets) prompted for credentials again and could not be accessed via the Shop SSO. Symptoms included successful Okta launch of the primary application while embedded or linked subcomponents remained inaccessible and requested separate authentication.

Solution

The primary Shop SSO entitlement was enabled and the user could open the IU Shop from their Okta dashboard. The remaining access issue was due to the Factsheets being a separately managed SharePoint component outside the Shop's SSO scope; support confirmed they could not enable SSO for that component and advised contacting the Brand team (brand-platforms@iu.org) who owned the Factsheets/SharePoint integration.

Source Tickets (1)
376. SonarCloud access blocked by portal/approval workflow (DevOps Portal) rather than immediate entitlement
84% confidence
Problem Pattern

Users reported inability to access SonarCloud (SonarQube Cloud) with requests appearing pending due to an approval workflow. The symptom was a provisioning/request state shown in Jira automation messages rather than an in‑app login failure; the requester’s access was awaiting approval from an identified approver.

Solution

Access was provisioned after the request was submitted through the organisation's DevOps Portal as documented in the internal wiki. The request followed the DevOps Portal approval flow (the Jira automation indicated the CC‑Approver) and once the approver completed the approval the SonarCloud access was granted.

Source Tickets (1)
377. Metabase: Okta SSO sign-in failures and missing in‑app export permissions after migration
85% confidence
Problem Pattern

Users reported inability to sign in to Metabase via Okta (password resets and prefilled credentials not working, no 'forgot password' email received) and separately were unable to export query results after migration to the new Metabase instance. Symptoms affected both production and non‑production environments and indicated a difference between Okta authentication/provisioning and Metabase's internal role/permission settings.

Solution

Support confirmed Metabase was provisioned via Okta and advised sign‑in through okta.iu.org when credentials were missing. For capability gaps introduced by the migration (exports), requests were routed to the DevOps/Metabase application owner via the DevOps service desk. DevOps processed the ticket and granted the required export permission to the user in both the production and non‑production Metabase instances. In the login case the user opened a follow‑up ticket with DevOps when Okta sign‑in continued to fail.

Source Tickets (2)
378. Provisioning SaaS licenses for shared-mailbox addresses (Mentimeter shared accounts)
60% confidence
Problem Pattern

Requesters asked for Mentimeter accounts/licenses to be provisioned for shared email addresses (shared mailboxes) rather than individual user accounts. Approver assignment/approval was required and the request scope changed during the workflow. The request stalled when the approver did not respond and automation-left the request pending or declined.

Solution

No Mentimeter provisioning was performed by IT during the ticket. Automation-for-Jira notified the nominated approver but no approval was received. The requester was advised to reduce the scope to a single shared address (events-akademie@iu.org) and resubmit the request; the workflow then awaited the approver's decision. The ticket remained dependent on approver action after the requester adjusted the submission.

Source Tickets (1)
379. Automated approval failures and missing SaaS ownership/inventory blocking requests
85% confidence
Problem Pattern

Automation-for-Jira approval workflows auto-closed or marked requests as declined when the expected approver was missing, misrouted (wrong cost center) or could not see the approval. Symptoms included tickets timing out after 14 days, CC approvers unable to interact with the approval, and purchased/requested SaaS lacking a recorded Inventory owner, preventing a clear provisioning path.

Solution

Automation-for-Jira auto-declined or auto-closed the requests when no valid approver action was recorded; in one case the notified approver confirmed they were not the correct approver and the workflow timed out, and in another the CC approver could not see or interact with the approval so no approval was captured. The Visualping request additionally lacked an Inventory entry and an identified product owner, which left the purchase/assignment unresolved. These tickets were closed without license/app provisioning recorded in the ticket history.

380. Access provisioning requests submitted with wrong ticket type for new-hire onboarding
90% confidence
Problem Pattern

A request to provision multiple product licenses for a new employee was submitted using a generic access/license ticket instead of the required new-hire/onboarding ticket. The submission included approval automation comments and an Okta link but no onboarding provisioning occurred and the requested products were not provisioned.

Solution

Support identified the submission as the incorrect ticket type for new-employee provisioning, informed the requester of the mistake, and asked for the correct 'new employee' onboarding ticket to be raised. No licenses or accounts were provisioned from the original ticket and the existing approval-automation entries remained in the ticket comments without applied access changes.

Source Tickets (1)
381. Expiring SCIM access token for AWS IAM Identity Center interrupted provisioning
95% confidence
Problem Pattern

The SCIM access token used to provision users/groups from the corporate IdP to AWS IAM Identity Center (SSO) was nearing expiration (explicit Token Id and expiry date reported). Risk described: automated provisioning would stop when the token expired, causing sync interruptions between the IdP and AWS account.

Solution

The expiring SCIM access token (Token Id 4292fd4c-7287-49fe-a7ee-d3bc61293c0d) for the AWS account was rotated and a new token was generated in the AWS account. The new token was placed into use by the corporate IdP/SCIM configuration and the change was logged, restoring the SCIM provisioning connection and preventing interruption of user/group sync.

Source Tickets (1)
382. Twilio ↔ Salesforce call-integration failing with Twilio API 400 'pending Conference Instruction'
70% confidence
Problem Pattern

During voice calls the Twilio integration stopped showing Salesforce accounts and opportunities; the Twilio logs recorded WorkerActions.SetActivity failures and an HTTP 400 error stating a reservation could not be rejected due to a 'pending Conference Instruction'. The Twilio UI also showed visual changes. Affected systems were Twilio (voice/workers) and Salesforce (CRM context not populated).

Solution

The incident was escalated to the Twilio/Salesforce integration specialists. The specialists identified the root 400 response originating from Twilio WorkerActions when rejecting a call reservation caused by a pending conference instruction and took ownership of the vendor-level investigation and remediation work with Twilio/DevOps to restore normal reservation handling and CRM context propagation.

Source Tickets (1)
383. Travel bookings lost after user name-change in Egencia (account recreation vs. merge)
90% confidence
Problem Pattern

After a legal name change the user's Egencia account appeared to have been recreated instead of updated; prior bookings were not visible in the new account and the user could not access the old account. Affected system: Egencia travel bookings and account mapping.

Solution

IT confirmed the new name was recorded in Egencia but had no access to booking content because account-level booking data was controlled by Procurement/vendor processes. The case was handed off to Procurement (Einkauf) and the user was directed to contact Einkauf@iu.org for account‑merge, booking transfer, or vendor-side restoration of the missing booking (booking UMWDX2).

Source Tickets (1)
384. Specialist tool (Guided Conversation Designer) access requires service-portal request
90% confidence
Problem Pattern

A user needed access to the Guided Conversation Designer (GCD) for chatbot work but could not access the tool. No in-application error codes were reported; the request concerned specialist tooling and account access provisioning.

Solution

The user was directed to submit the access/account request through the Guided Conversation Designer specialist service portal so the GCD team could process it. The requester followed that route and the specialist GCD team completed the account provisioning, restoring access.

Source Tickets (2)
385. Exam / e-assessment platform access lost after platform update (owner-managed by Prüfungsamt)
80% confidence
Problem Pattern

After a platform update an examiner lost the ability to open and correct assigned exams on the university exam/e-assessment platform; symptoms were inability to view or edit exam items with an approaching grading deadline and no explicit error codes. The exam platform and examiner permissions were implicated.

Solution

IT validated that the exam platform is managed by the Prüfungsamt (e-assessment Fachteam) and forwarded the user to the responsible specialist team. The user was instructed to contact e-assessment@iu.org with examiner identity, affected modules/exams and details so the Prüfungsamt team could restore examiner access and handle any platform-update related permission regression.

Source Tickets (1)
386. Account provisioning / SSO propagation delays: target-app account creation required
95% confidence
Problem Pattern

Users reported lack of access to applications (Jira, Datadog, Confluence) despite requesting access via the service portal or Okta; symptoms included missing application accounts or the system not yet recognising the account. No explicit application errors were present other than inability to reach target app content until provisioning propagated.

Solution

For each case the missing target‑application accounts were provisioned or enabled (Jira account was created and enabled via Okta portal; Datadog access was provisioned; Confluence access was enabled in Atlassian). Users were advised that account provisioning changes required short propagation time and access was confirmed working after the target application processed the provisioning.

387. Access blocked by missing 2FA (TOTP) on long‑dormant account preventing password reset and app transactions
90% confidence
Problem Pattern

User reported a corporate application (Freelancer Invoicing App) rendering partially and transactions failing; password-reset attempts were blocked because the account had no configured second factor (TOTP/MFA). The account had been unused for an extended period and attempts to sign in or reset credentials failed due to required 2FA not being present. Affected systems: Okta MFA, Microsoft Authenticator (TOTP), and the invoicing web app.

Solution

Support resolved the case by providing step‑by‑step guidance for re‑enrolling a second factor and linked the product onboarding/documentation for adding a TOTP authenticator (Microsoft Authenticator) to the account. After the user completed MFA enrollment using the provided instructions and QR-code guidance, the account could be recovered and normal app operations resumed.

Source Tickets (1)
388. SSO access lost after corporate email change when target SaaS account is managed by HR
90% confidence
Problem Pattern

A user changed their corporate email address and subsequently could not sign in to a vendor SaaS (Qualtrics) via Okta SSO; the existing Qualtrics account was not accessible despite SSO launches. Symptoms: SSO did not map to the existing Qualtrics account and standard Okta sign‑on did not restore access. Affected systems: Qualtrics, Okta, corporate identity/email.

Solution

Support identified that Qualtrics account administration and email-to-account mappings were handled by the HR/People‑Projects team rather than central IT. The user was directed to contact the People‑Projects (HR) mailbox to have the Qualtrics account identity reconciled/restored to the new corporate email; IT did not perform the mapping change itself.

Source Tickets (1)
389. Shibboleth/SAML school‑login failures with academic vendors (ProQuest / PebblePad)
70% confidence
Problem Pattern

Users attempted Shibboleth/SAML school logins to academic vendor sites (ProQuest, PebblePad) and received generic SSO failures such as "We couldn't log you in" or vendor-side "no user" for both current and legacy institutional emails. Password/username resets on vendor portals failed or returned guidance to contact the organisation's IT or librarian. Multiple vendor endpoints exhibited the same SSO account‑mapping symptoms.

Solution

Support reviewed the vendor responses and confirmed the vendors did not have a matching provisioned account for the user’s current or legacy email. The issue was caused by vendor-side account provisioning or identity mapping for the institution’s Shibboleth assertions rather than a desktop/browser problem. Support advised the user to contact the school librarian/vendor administrator or the vendor support team so the vendor could: verify the institution (Shibboleth) configuration, map the correct email/identifier to the user record or provision a vendor account. No changes were made by the local support team because the resolution required vendor or institutional‑identity‑provider action.

Source Tickets (1)
390. IU Learning Hub (LMS) course resources failing to open due to browser caching or SharePoint permissions
65% confidence
Problem Pattern

Users could not open course videos and files hosted via the IU Learning Hub (de-lms.365.systems / SharePoint) — resources failed to load without explicit error codes and users were blocked from progressing through lessons. Problems appeared in web browsers and affected access to course-hosted media and documents.

Solution

Support reproduced the symptom and recommended standard client-side troubleshooting: clearing the browser cache and retrying or using a private/incognito browser window. When those steps did not restore access, the issue was escalated or redirected to the course/product owner (people-projects) because the root cause was missing SharePoint/course permissions. In tickets where product‑owner intervention occurred, granting the missing course/SharePoint permissions restored access to videos and files.

Source Tickets (1)
391. Viva Goals (goals.cloud.microsoft.com) access entitlement missing
90% confidence
Problem Pattern

Users were unable to access or sign in to Microsoft Viva Goals (goals.cloud.microsoft.com). Symptoms ranged from the web app being inaccessible with no error displayed to explicit authentication/sign‑in failures that returned an error code. The issue typically affected individual accounts and was observed when the user's Viva Goals application entitlement or license was not present in the tenant. Affected system: Microsoft Viva Goals web app (goals.cloud.microsoft.com).

Solution

Support verified the user's Viva Goals application entitlement and provisioned Viva Goals access in the tenant when the entitlement was missing. After the entitlement was granted the affected account regained access to goals.cloud.microsoft.com and the user confirmed functionality was restored. Some incidents presented as sign‑in failures with an authentication/error code and were escalated to Procurement/licensing for a licensing decision; those tickets recorded no additional technical remediation.

Source Tickets (2)
392. Owner‑ or creator‑managed SaaS resources where IT cannot reassign access
90% confidence
Problem Pattern

Users could not access content or administrative functions in owner‑managed SaaS objects (Power Automate flows, Microsoft Forms responses, 1Password vaults) despite being listed as editors/members. Symptoms included lack of flow owner rights, inability to view form responses while listed as an editor, and inability to identify or gain access to shared 1Password vaults. Affected systems: Power Automate, Microsoft Forms, 1Password.

Solution

Support confirmed these resources were controlled by the object owner (or vault owners) rather than central IT. For the Power Automate flow, support noted that the existing flow owner needed to add the requested users or grant them owner permissions and provided the requester with the owner‑management guidance page. For the Microsoft Forms case, administrators were unable to change form ownership or grant response access themselves; the ticket recorded that only the form owner could transfer ownership or add response access and advised contacting the owner or creating a new owner‑controlled form. For 1Password, IT had no central overview of vault ownership and therefore did not grant access or list vault owners; the requester was advised to ask teammates, the team lead or the vault owner to share the vault. No centralized admin changes were performed by IT in these cases.

Source Tickets (3)
393. Automated provisioning or SSO failures resolved by manual vendor/admin actions or vendor support
85% confidence
Problem Pattern

Automated provisioning, invitation or SSO workflows for third‑party SaaS failed and users could not complete account setup or log in. Symptoms included missing invitations, failed provisioning workflows, or inability to access vendor account‑management areas. Affected systems included OpenAI corporate provisioning, Miro login, Twilio Caller ID provisioning and external PMS/WorkFlex vendor portals.

Solution

When the automated/request workflow failed, manual intervention by an administrator or the vendor resolved or clarified access. For OpenAI, an administrator sent a manual corporate‑account invitation email and the user completed account creation. Miro access was restored after a backend account fix performed by support; the user confirmed login succeeded. Twilio access and the requested Caller ID were configured by a technician during a Teams session with the requester. For vendor‑hosted portals (PMS, WorkFlex) the team confirmed those systems were vendor‑owned or unsupported by central IT and redirected the requester to the vendor support/contact forms or the owning support team rather than performing internal provisioning. Tickets were closed after manual invite/backend fix or after redirecting to vendor support where appropriate.

394. PMS account and permission requests require vendor/product account‑management forms
90% confidence
Problem Pattern

Users reported inability to authenticate to PMS, to change PMS production-status for video elements, or to obtain database access after PMS access/configuration changes. Tickets showed login errors or missing edit rights and indicated internal IT could not manage PMS accounts or apply application-specific permissions. Requests referenced approver settings or admin-level controls inside the PMS product but lacked actionable access from IT.

Solution

Support confirmed IT did not have access to the PMS account-management console and could not directly provision or change in‑app permissions. Users were directed to submit access or permission-change requests through the official PMS account-management/support forms; in one case an approver setting was adjusted before handing the remainder of the request back to PMS account management. The issue was closed after the user was advised to contact PMS via their vendor forms.

Source Tickets (3)
395. Salesforce account provisioning by copying a reference user and related SSO permission verification
90% confidence
Problem Pattern

A user required a Salesforce account and confirmation of SSO access for Twilio. Symptoms were lack of a Salesforce account and uncertainty whether related SSO permissions (Twilio) were present; no explicit error codes were provided.

Solution

A Salesforce account was provisioned by copying a reference user's account and adapting the copied settings for the target user. After the copy operation, the Twilio SSO permission was verified and found to be assigned as part of the replicated configuration. The requester was informed that the account and SSO access were in place.

Source Tickets (1)
396. SharePoint file access missing when opening links from a student Salesforce account
85% confidence
Problem Pattern

User reported 'no access to SharePoint' when clicking a SharePoint link from a student record in Salesforce; the action produced an unspecified error and prevented access to the expected files. The symptom was restricted file/site permissions tied to the SharePoint resource when launched via a Salesforce-student context.

Solution

Support verified the user's SharePoint permissions for the referenced files and granted the required access on the SharePoint side. After the permissions were applied, the user was informed that access should now succeed when opening the SharePoint link from Salesforce.

Source Tickets (1)
397. GitLab access provisioned by account creation and Okta group assignment
90% confidence
Problem Pattern

Users lacked access to GitLab either because no account existed for the requested email or because they were not a member of the correct Okta/group entitlement. Symptoms were missing GitLab accounts or absence of repository/team access, with no vendor error codes recorded.

Solution

Access was provided by creating a GitLab account for the requested corporate email and/or assigning the user to the appropriate Okta group (team-specific membership such as 'Prometheus'). After account creation and group assignment the user was notified that GitLab access was available.

Source Tickets (2)
398. Legacy ticketing system account absent (OTRS migration)
90% confidence
Problem Pattern

Requester asked support to verify whether OTRS accounts still existed for a team member. Search for the referenced user account returned no results in OTRS, and the team's workflows suggested they had migrated to a different ticketing system. Users reported no active OTRS access for the group.

Solution

Support searched the OTRS user database for the referenced account and confirmed no OTRS account existed for the named user. Based on the absence of any matching account and the team's apparent migration, no new OTRS account was created and the request was closed as Done.

Source Tickets (1)
399. SaaS activation expired verification email with vendor/admin-managed account creation (Salesforce Marketing Cloud)
85% confidence
Problem Pattern

User could not complete Salesforce Marketing Cloud sign-up via Okta because the verification/activation email link had expired. The Okta application tile was available but the actual account creation and verification were managed outside Okta by a named product owner or vendor contact. The user reported inability to finish setup due to the expired email.

Solution

Support assigned the Salesforce Marketing Cloud application to the user's Okta dashboard so the app was visible in Okta. The user was informed that Salesforce Marketing Cloud account creation and verification were handled by the product owner (jimmy.murphy@iu.org) and was directed to contact that owner to complete account activation and any required verification steps.

Source Tickets (1)
400. PowerApps invoicing app allowed invoice creation but not viewing previously submitted invoices
80% confidence
Problem Pattern

User could open the Freelancer Invoicing App in PowerApps and access the "create new invoice" form but could not find any way to view previously submitted or requested invoices. No error messages were produced; the user reported UI/navigation or permission-limited access within the app. Systems involved: PowerApps, Freelancer Invoicing App, Abrechnung add-on.

Solution

Support confirmed the user had been granted the PowerApps assignment for the Freelancer Invoicing App and the user was able to upload an invoice through the exposed "create new invoice" form. Support provided the standard informational material about the app and clarified that telephone support was not available; the ticket was closed after the user confirmed they could upload. The ticket did not record any in-app navigation changes or additional role/permission changes to enable a separate "view submitted invoices" interface.

Source Tickets (1)
401. Service Portal access failed in a single preferred browser after Fastlane setup
70% confidence
Problem Pattern

After completing Fastlane setup, the user reported the corporate Service Portal would not open in their preferred browser while it remained accessible in other browsers and via the Okta dashboard. No explicit error messages were captured and the portal later became reachable again in the preferred browser. Systems involved: Service Portal, Fastlane, Okta, and web browsers.

Solution

Fastlane setup was completed and the user temporarily accessed the Service Portal via alternative browsers and the Okta dashboard as a workaround. No further corrective actions were recorded; access through the user's preferred browser returned to normal subsequently and the ticket was closed.

Source Tickets (1)
402. Automation-for-Jira approval workflows completed by Atlassian Api User assignment
90% confidence
Problem Pattern

Application Self Service access requests remained in a pending-approval state with Automation for Jira notifications showing an approver or CC-approver waiting to act. Users could not access the target application (no in-app error messages), while the Jira/Automation-for-Jira workflow indicated 'awaiting approval' and no further progress.

Solution

The outstanding requests were completed when the Automation-for-Jira process (recorded as an 'Atlassian Api User' action) performed the application assignment to the user's account. The automated assignment entry showed the application had been granted to the user's email, which closed the approval workflow and restored access.

403. Requests routed to IT Service Portal Self‑Service and auto-closed after no requester follow-up
80% confidence
Problem Pattern

Users requested access to applications (e.g., Storyblok, EPOS) that remained awaiting approval or additional requester action. Support responses directed requesters to the IT Service Portal Self Service path, and tickets showed a pending/unconfirmed state before automated closure due to lack of requester reply.

Solution

Support responded with the IT Service Portal Self Service link and instructions to submit the application request there. In one case hardware was ordered and credentials were queued for automatic delivery; in another case the user was given the portal link but did not follow up and the ticket was auto-closed after 14 days with status 'Done'.

Source Tickets (2)
404. Invitation-based SaaS provisioning completed by admin invite and user acceptance
95% confidence
Problem Pattern

Users reported missing access to vendor-hosted ChatGPT services (including ChatGPT Teams / ChatGPT‑4) because no active account or no accepted vendor invitation existed. Symptoms were inability to sign in or access the SaaS from the user’s work email, with no in‑app error messages or configuration failures; tickets were submitted as account‑provisioning or invitation requests.

Solution

An administrator sent the vendor invitation email to the user’s work address. After the user accepted the vendor invitation, the vendor-hosted account (including ChatGPT Teams / ChatGPT‑4) was provisioned and access was confirmed. These requests typically contained no application error messages and were resolved solely by issuing the vendor invite and confirming the user’s acceptance.

Source Tickets (2)
405. Vendor workspace-membership conflict preventing SCIM/Okta provisioning (Mentimeter)
60% confidence
Problem Pattern

Automated SCIM/Okta provisioning to Mentimeter failed with a 400 Bad Request returning a vendor error about mutability and existing workspace membership. The Okta Application Self Service assignment did not produce an Okta tile or account in the target app; the remote server reported the target was not mutable and that the user was already member of another workspace.

Solution

The provisioning attempt failed and the remote Mentimeter API returned a Bad Request with the message: “Mutability: The target location for the operation is not mutable. The user is already member of another workspace.” The failure and API error were recorded in the ticket; no automated re-provisioning was recorded in the ticket notes.

Source Tickets (1)
406. Cost‑centre approval workflow routing only to single approver
80% confidence
Problem Pattern

Cost‑centre approval notifications and requests were routed only to a single configured approver despite three approvers being configured. Approvals failed to reach alternate approvers or the requester while the primary approver was on leave, leaving outstanding approval requests that could not be actioned.

Solution

The specialist team reviewed and revised the cost‑centre approval process and approver routing. After the approval‑process revision by the specialist team the ticket was closed (the change to the approval workflow was recorded in the ticket).

Source Tickets (1)
407. Application Self Service: automated assignment completed via Atlassian API after pending approval
91% confidence
Problem Pattern

Application Self Service requests for various applications remained stuck in a pending-approval state while Automation for Jira showed approval/notification activity. Users reported inability to access or sign in (SSO/login failures) or requested access refresh; Automation for Jira logs showed approver or CC lists and occasional messages such as 'C-level approval - first reminder is suspended' but no error codes. Affected systems included Automation for Jira and the Atlassian API/Atlassian Api User and applications such as Jira Software, EPOS, Care, LangSmith, Metabase, Salesforce Marketing Cloud and AWS ClientVPN.

Solution

Pending Application Self Service requests that appeared stalled in the approval/notification stage were completed by the Atlassian Api User via Automation for Jira. The automation recorded assignment actions (logs sometimes contained localized messages such as "Dem Benutzer wurde die Anwendung zugewiesen") and listed approvers/CCs or reminder-state messages (for example 'C-level approval - first reminder is suspended') but did not report error codes. After the Atlassian Api User performed the recorded assignment, users regained the requested application access or were able to sign in (SSO/login failures and expired access were resolved or refreshed). Tickets were closed after assignment confirmation was visible in Automation for Jira logs. Observed applications included Jira Software, EPOS, Care, LangSmith, Metabase, Salesforce Marketing Cloud and AWS ClientVPN; systems involved included Automation for Jira and the Atlassian API/Atlassian Api User.

408. CARE application: site-restricted access and missing 'All sites' flag after assignment
60% confidence
Problem Pattern

CARE users reported that access was limited to specific campuses/sites rather than showing an 'All campuses'/'All sites' option, preventing viewing or editing of student or staff data (for example timetables in CARE/EPOS). Some users lost all visible schedule/data after an update or migration. Okta/Atlassian API and automation logs showed application assignments recorded, yet the cross-site 'All campuses' flag or site‑wide edit permission was absent.

Solution

Investigations showed affected CARE accounts had been provisioned via the Atlassian API and approvals were executed through Automation for Jira; automation logs recorded the application-assignment entries and tickets were closed following those recorded assignments. Multiple tickets lacked any explicit recorded change to an 'All campuses'/'All sites' permission or a documented site‑wide student-edit right, and several users reported the cross-site flag remained missing despite the recorded assignment. In at least one incident the loss of CARE/EPOS timetable visibility coincided with an update/migration; common client-side troubleshooting (browser refresh, clearing cache/cookies, incognito mode, trying other browsers) did not restore access and no successful remediation was achieved for that case.

409. Azure access granted by replicating another user's subscription roles
95% confidence
Problem Pattern

A request asked to grant a user the same Azure resource access (Logic Apps and related resources) as an existing user across Production and Non‑Production subscriptions. No error codes were reported; the request required role/permission mapping across subscriptions.

Solution

Role and permission assignments were applied to the requested user for both Production and Non‑Production Azure subscriptions so that the user received access to the required Logic Apps and associated resources. The ticket was closed after confirming the role assignments were applied.

Source Tickets (1)
410. Application Self‑Service requests stuck in approval or prerequisite workflows
90% confidence
Problem Pattern

Users submitted Application Self‑Service access requests that remained in a persistent 'approval pending' state with no error codes. The portal and Automation‑for‑Jira showed approver names or CCs and requests sometimes awaited approver justification or were gated by prerequisites (for example required learning‑course completion). Affected systems included third‑party SaaS and internal apps (examples: Cursor, EPOS, Lucid Suite, Copilot) and IdP‑integrated services (Okta SSO); users sometimes reported inability to sign in with email/password and used self‑service to request access. Provisioning for these requests was driven by Atlassian/Jira automation.

Solution

Pending Application Self‑Service requests were resolved either by advancing the Automation‑for‑Jira approval workflow or by assigning the application through the Atlassian provisioning/API (including Okta‑backed provisioning). In multiple cases Automation‑for‑Jira notifications named approvers and the provisioning system recorded assignment to the requester, which cleared the 'approval pending' state and restored access. Some requests required approver justification before the approval step completed and assignment occurred. A subset of requests were gated by prerequisites (for example Copilot for M365 was tied to an IU Learning Hub course); enrollment and a recorded course status of 'completed' triggered auto‑assignment (features could take up to 72 hours to appear).

411. Discrepancy between Care/myCampus reporting and Azure AD provisioning preventing AAD group membership
78% confidence
Problem Pattern

Users appeared in Care/myCampus reports but could not be found or added in the Azure AD portal or the AAD group used to share a PowerApp. Symptoms included missing/selectable users in Azure AD, mismatched email addresses shown in source reports (personal/non-corporate emails), or accounts not appearing because the user’s official start/contract date was in the future.

Solution

Investigation identified source-identity mismatches and timing as the root causes: some Care/myCampus entries used personal or non‑IU email addresses and therefore no corresponding Azure AD account existed, and some users were not yet provisioned in Azure because their account activation date was in the future. The ticket documented these findings and recommended aligning the source-system email with the corporate identity and waiting for scheduled provisioning; no automated AAD-group addition was possible until a corporate Azure AD account existed.

Source Tickets (1)
412. Confluence licensing requests cannot be bulk-issued via distribution lists
83% confidence
Problem Pattern

Requesters asked to grant Confluence licenses and space access to large user cohorts (professors / Academic Lecturers) using distribution lists. The symptom was a desire for centralized bulk license assignment rather than individual portal requests; there were no error codes, only a policy/process constraint preventing bulk issuance.

Solution

The investigation confirmed that Confluence licenses at the institution required individual license requests via the IT Portal before users could be added to spaces. No bulk/distribution-list license-issuance mechanism was implemented as part of this request and the ticket recorded that no operational change was applied.

Source Tickets (1)
413. Project/component admin and edit permissions missing in Jira/onCampus resolved by direct grants
95% confidence
Problem Pattern

Users reported inability to access or administer Jira projects, Jira components or service portals (missing project in UI, 'project not found', or lacking edit rights for a Jira app component). Symptoms included inability to find projects, edit canned responses, or absence of required admin rights in a service portal.

Solution

Administrators reviewed the relevant project/component membership and permission schemes and granted the required admin/edit rights. For the Canned Response Pro app affected users were granted edit permission and regained functionality after re-login. For the 'Real Estate Services' project the requester was granted project admin access, and the onCampus Service‑Portal admin-rights request was implemented. Tickets were closed after permissions were applied and user access was confirmed.

414. Confluence sharing blocked for Walbrook/UFred users due to tenant-specific Atlassian group mappings
90% confidence
Problem Pattern

New Walbrook/UFred colleagues did not appear in the Confluence 'share' picker and non-public page links reported access restrictions despite the users being present in an Okta Confluence group. Symptoms indicated that IU Atlassian groups did not grant access for Walbrook/UFred identities.

Solution

Administration confirmed that IU-wide Atlassian groups did not provision access to Walbrook/UFred users. The resolution was to use the Walbrook-specific Atlassian group (WB-OK-ASS-Atlassian-Confluence) for space permissions. Once the correct tenant-specific Atlassian group was applied the Walbrook/UFred users became selectable and could access non-public pages as intended.

Source Tickets (1)
415. Salesforce profile change required corresponding Okta/Group update
88% confidence
Problem Pattern

A Salesforce user profile was changed (new role/profile) and requesters expected corresponding updates to Okta group assignments or provisioning. Symptoms were a profile change in Salesforce with no visible Okta-side adjustment reflected to the requester.

Solution

The Salesforce group mapping was adjusted to reflect the user's updated profile; the ticket noted 'SalesForce Gruppe angepasst' by the specialist. The change closed the request without further documented Okta-side steps in the ticket.

Source Tickets (1)
416. Atlassian/Confluence external user blocked from password reset due to missing 2FA and provisioning group
85% confidence
Problem Pattern

External user could not sign into Atlassian/Confluence with their IU email and myCampus password. Attempts to reset the password were blocked by an Okta message stating a second factor was not registered. The user reported that access still failed after initial provisioning and no clear in‑app error codes were available. A missing Okta provisioning group or 2FA registration appeared to be linked to the inability to authenticate.

Solution

Support provisioned the user by adding them to the IU-ZZ-OK-ASS-Atlassian-Confluence-Extern Okta group to create the Atlassian entitlement and then sent a support-initiated password reset email. It was recorded that self-service password resets were prevented because the account had no registered second factor (2FA), and the combined group assignment plus the support password-reset action restored access for the user.

Source Tickets (1)
417. Application Self‑Service requests resolved by explicit app entitlement or role assignment
85% confidence
Problem Pattern

Users reported missing application UI elements or inability to sign in after requesting access via Application Self‑Service. Symptoms included absent tabs in an app UI, a login window showing only a splash image, or requests stuck in an approval workflow. Affected systems were vendor SaaS apps delivered via the Atlassian/Automation-for-Jira self‑service flow and SSO‑backed applications.

Solution

Access problems were resolved by granting the missing application entitlement or in‑app role through the organisation’s provisioning system. The Confluence/Deskbird/EPOS/NordLayer accounts were explicitly assigned via the Atlassian API and the required application role/permission that exposed the missing UI element was applied; approval notifications from Automation for Jira were used where the request had been pending. After those assignments the users regained the missing tab or normal login behaviour and access was confirmed.

418. Third‑party AI services (OpenAI/ChatGPT/CoPilot) account ownership and IU‑Playground invitations
90% confidence
Problem Pattern

Users requested setup or access to ChatGPT and CoPilot but were uncertain which accounts IU managed versus vendor‑managed. Symptoms were account‑ownership confusion and questions about how IU invitations relate to vendor OpenAI accounts; no specific error codes were reported.

Solution

Support clarified that OpenAI accounts are not centrally managed by the organisation and that internal access is provided by inviting users to the IU‑Playground. The user had already been invited and their account was registered in the IU‑Playground; they were advised to contact OpenAI support directly for discrepancies on the vendor side. The ticket was closed after no further user response.

Source Tickets (1)
419. Incorrect product selection in self‑service requests (Marketing Cloud vs Sales Cloud) and integration requests declined
95% confidence
Problem Pattern

A user requested Salesforce Marketing Cloud access but described needs that matched Salesforce Sales Cloud; the request also included an ad‑hoc request to link Vonage to Salesforce. Symptoms were a pending or mismatched product request with no error codes.

Solution

The provisioning request was declined because the requested product did not match the user’s described need. Support informed the requester that Sales Cloud was the likely correct product and asked them to submit a new request for Sales Cloud; no Vonage integration work was performed as part of the declined Marketing Cloud request.

Source Tickets (1)
420. Application Self‑Service role approval routing gaps (Ardoq reader/writer vs contributor)
90% confidence
Problem Pattern

Users requested Ardoq roles via the Application Request Self Service; the default contributor role used cost‑center approver routing while reader/writer roles required different approvers. Tickets arrived at support and stakeholders could not see or act on approval notifications; the approval recipients and routing for non‑contributor roles were unclear.

Solution

The contributor role was enabled for request via the Self Service flow so users could be provisioned after cost‑center approval. It was recorded that reader/writer role requests were not yet routed to the product‑specific approvers and would require adding role‑specific routing rules to the approval workflow.

Source Tickets (1)
421. Figma license/seat loss resolved by SSO-triggered SCIM provisioning then admin seat allocation
95% confidence
Problem Pattern

A user reported losing paid/full Figma seats and saw only viewer seats (Design, Dev Mode, FigJam) after signing in; they could not access team portals, files, or perform expected design work. Symptoms indicated missing/incorrect license entitlements tied to SCIM/SSO provisioning.

Solution

The user authenticated once via the corporate SSO so the vendor SCIM provisioning could add them to the managed group; after the SCIM sync completed an administrator allocated the requested paid seats (Full Design, Full Dev Mode and Full FigJam seats). This restored full access to the MarTech/DS portals and the team files.

Source Tickets (1)
422. RDP/desktop shortcut for on‑prem server appears only when connected to corporate network or VPN (SFIRM server)
90% confidence
Problem Pattern

A user requested access to SFIRM but it was unclear whether they needed the SFIRM application or direct SFIRM server access. The user reported no RDP shortcut/icon on their desktop and could not reach the server from their current location.

Solution

Server access was provisioned on the back end. After provisioning the RDP connection icon was expected to appear on the user's desktop when they were logged in from inside the cpg‑corp network or connected via the corporate VPN; the ticket noted the separate contact for the SFIRM application when the request concerned the app rather than server access.

Source Tickets (1)
423. Granting ChatGPT via Okta group assignment when regular approver unavailable; documentation mismatch
80% confidence
Problem Pattern

An email request sought ChatGPT access while the usual approver was out‑of‑office; internal how‑to pages (SWM) contained outdated UI screenshots that did not match the current Okta flow. The requester lacked the ChatGPT entitlement and needed an approver or reference to complete provisioning.

Solution

Access was granted by using an existing reference Okta account to identify the correct Okta group and then assigning that group to the requesting user; the user thereby received ChatGPT access. The ticket recorded that the SWM documentation screenshots were outdated but no documentation update was captured in this record.

Source Tickets (1)
424. Application Self Service requests stalled awaiting approver action then completed via Atlassian API assignment
91% confidence
Problem Pattern

Application Self Service access requests for corporate SaaS remained in a pending-approval state with no visible technical error codes reported to requesters; Jira/Automation-for-Jira notifications showed statuses such as “awaiting approver”, “CC action”, or “requesting business justification.” In some cases the assigned approver (and their manager) could not see the approval ticket in Jira even though the workflow appeared to progress. Affected components included Application Self Service, Automation for Jira/Atlassian Jira and the Atlassian API provisioning path, impacting multiple target SaaS (for example Lucid Suite, EPOS, Qualtrics, CANDI, Statistics & Reports, GitHub, BIC Process Design, Deskbird); Okta SSO-related loss of admin rights was observed in some incidents.

Solution

Requests ultimately completed when the approval workflow progressed and the Atlassian API recorded the provisioning assignment. Automation-for-Jira triggered approval notifications to approvers/CCs; once an approver granted access (or requested and received business justification) the Automation-for-Jira logs contained assignment messages such as “The user has been assigned to the application” (localized variants observed). The automated provisioning action was executed by the Atlassian Api User and was sometimes logged and completed even when the assigned approver (and their manager) could not see the approval ticket in Jira. Multiple corporate SaaS targets were affected, including Lucid Suite, GitHub, EPOS, Qualtrics, CANDI, Statistics & Reports, BIC Process Design, and Deskbird. For multi-environment requests the API recorded assignments though environment-specific confirmations were not consistently documented. In some incidents resolution also included restoring admin access that had been lost after Okta SSO.

425. SSO tenant/account mismatch caused JotForm sign-in to use wrong Microsoft identity
85% confidence
Problem Pattern

JotForm SSO sign-in attempts for Walbrook users failed because the authentication flow kept using an @iu account (incorrect tenant). Manually entering the Walbrook email address did not allow successful SSO. Failures were observed when launching SSO from Outlook for Mac and no vendor error codes were reported.

Solution

Support resent JotForm invites to the users' Walbrook email addresses to surface the correct account and instructed the users to sign into Microsoft with their Walbrook account before attempting the JotForm SSO. After the invites were re-sent and the correct Microsoft account was used for the sign-in attempt, the SSO flow worked as expected.

Source Tickets (1)
426. Application assignment plus user cost‑centre attribute update via Application Self Service
90% confidence
Problem Pattern

A user requested assignment of an internal application (Atlassian Api User) through Application Self Service and separately requested their identity attribute (cost centre) to be set or changed. The request did not present error messages but required both application entitlement and an authoritative cost‑centre value in the identity record. A two‑part change (application assignment + identity attribute update) was expected as part of the provisioning outcome.

Solution

The Atlassian Api User application was assigned to the requester via the Application Self Service provisioning flow. The user's cost‑centre attribute in the identity directory was updated to the requested value "CC24010 CSE Berlin Academic" and the change was confirmed with the user.

Source Tickets (1)
427. Bot/service account Confluence space membership provisioning
95% confidence
Problem Pattern

A service/bot account (Markdown-to-Confluence / GitLab Bot) required access to an additional Confluence space; the request was an access‑provisioning change rather than a functional error. No error codes were reported and the bot already had access to other spaces.

Solution

The GitLab/Markdown bot account was added as a member of the requested Confluence space. The change was applied at the space level (space membership) and the ticket was closed after confirming the bot had the additional space access.

Source Tickets (1)
428. Assigned Jira issues inaccessible due to missing project membership/role
95% confidence
Problem Pattern

Users reported assigned Jira issues could not be opened and notifications were not delivered. Re-applying generic permissions did not help; investigation showed the affected account lacked project-level assignment or membership (project role) in the PMOC project, so project-scoped permissions and issue visibility were absent.

Solution

Project-level access was granted by assigning the user to the appropriate PMOC project role/membership. After the project role assignment the user regained visibility of assigned issues and began receiving notifications as expected.

Source Tickets (1)
429. Bulk Okta group membership changes to enable M365 Copilot access
95% confidence
Problem Pattern

A group of users needed access to Microsoft 365 Copilot that was controlled by membership of an Okta group (IU-ZZ-OK-ASS-M365 Copilot). The request involved adding multiple users to the Okta group so they could receive the downstream Copilot entitlement; no error messages were reported.

Solution

All 19 specified users were added to the Okta group "IU-ZZ-OK-ASS-M365 Copilot". The group‑membership change was recorded and the users were subsequently able to access M365 Copilot via the group entitlement.

Source Tickets (1)
430. Vendor‑managed SaaS SSO failure due to missing vendor account (Egencia)
78% confidence
Problem Pattern

Users attempting SSO to the vendor-hosted travel platform (Egencia) via the corporate IdP (Okta) received a login rejection stating no active Egencia travel account exists for their Single Sign‑on ID (e.g. 'no active Egencia travel account with a Single Sign‑on ID ... was found') and could not access Egencia from the corporate SSO portal. The SSO integration appeared active but affected users lacked a corresponding vendor-managed Egencia account, and corporate IT did not have administrative access to the vendor tenant to provision or reactivate accounts.

Solution

IT confirmed the Okta↔Egencia SSO integration was present but that the affected users did not have active accounts in the vendor tenant. Support clarified they only managed the SSO connection and had no administrative rights in Egencia to create or reactivate vendor-side accounts. Cases were escalated back to the internal account owner (procurement/HR) or to Egencia support for account restoration or creation (procurement@iu.org was used as the internal escalation address in one incident). No internal configuration changes were performed; tickets were closed after handing the incident to the vendor/internal owner or after inactivity when users did not respond.

Source Tickets (2)
431. Application Self‑Service approvals processed by Automation‑for‑Jira and Atlassian API assignment
92% confidence
Problem Pattern

Users requested application access via Jira Service Management or Okta Application Self‑Service. Requests generated approver notifications but remained in a pending approval state, or requesters reported missing Atlassian accounts (not listed in Jira and Confluence), preventing access to SaaS applications and internal entitlements. Affected systems included Okta, Jira, Confluence and Atlassian-managed app assignment workflows.

Solution

Automation‑for‑Jira produced approver notifications and 'waiting for approval' messages. After approval events the Atlassian API service account executed the requested application and entitlement assignments and the assignment actions were recorded under that Atlassian API user. Affected targets included SaaS apps and internal entitlements (examples: Canva, AWS ClientVPN, Application Self Service, CARE). In each resolved case the Atlassian API assignment completed and the ticket was marked Done; when users returning from leave reported missing Atlassian accounts, the automated assignment restored the requested application access and closed the request.

432. Service/bot account access requiring role mapping in production and staging (EPOS automation bot)
90% confidence
Problem Pattern

A service/bot account (automation) lacked required EPOS permissions to perform API calls for student enrolment and study‑context operations. Symptoms were lack of in‑app permissions in both production and stage environments; no explicit error codes were provided. Request included a follow‑up question about API authentication using an access token.

Solution

The EPOS domain specialists verified the request with the product owner and assigned the relevant role/permission set to the service account in both EPOS production and EPOS stage to match a reference bot profile. A reference user (Kleo Bot) URL and a responsible contact (Gina Wagner) were provided to support role mapping. The ticket recorded the permission assignments and environment parity; the separate question about API token/authentication remained outstanding in the record.

Source Tickets (1)
433. Application Self‑Service: Atlassian API assignment restored missing app access after Okta changeover or pending approval
90% confidence
Problem Pattern

Users reported that a Self‑Service application (Care or other Atlassian‑integrated apps) was inaccessible after an Okta changeover or showed as 'not working' with an approval pending from Automation‑for‑Jira. Symptoms included inability to open the app from the Okta/dashboard and a pending approval state in the Self‑Service workflow.

Solution

Access was restored by assigning the requested application to the users via the Atlassian API as part of the Application Self‑Service/Automation‑for‑Jira workflow. The API assignment removed the pending approval state and the users regained SSO‑backed access to the application.

Source Tickets (2)
434. Vendor account provisioning for JotForm SSO: vendor-side user creation fulfilled SSO request
90% confidence
Problem Pattern

Request to enable SSO access for two named users to a JotForm workspace where no vendor-side user accounts existed. No error messages were reported — this was a provisioning request to enable SSO logins for specific users.

Solution

Both users were created/added in the JotForm tenant so that their SSO identities were recognisable by the vendor. Adding the accounts in JotForm fulfilled the SSO access request and the users were able to sign in via SSO.

Source Tickets (1)
435. Access request stalled by missing/changed approver and auto‑decline of approval workflow
75% confidence
Problem Pattern

A user requested urgent access to an application (D.velop) but the designated approver was changed or unavailable. The request remained without approval and the ticket showed no account provisioning; the approval workflow closed automatically after the system timeout.

Solution

The approver was changed in the workflow record, but no approval action was recorded before the platform's automatic timeout. The request was auto‑declined/closed after the 14‑day approval window and no access was provisioned prior to closure.

Source Tickets (1)
436. Local client hardware/permission issue (webcam privacy slider) coincident with SSO/login and meeting host errors
60% confidence
Problem Pattern

User reported multiple unrelated symptoms: inability to log into Atlassian/Jira Service Portal, Zoom showing 'The host has ended this meeting' despite user being host, and a webcam that stopped working. No consistent error codes were captured across systems.

Solution

IT support advised the user to check the local webcam privacy/enable slider; the user later confirmed the camera and other reported issues were resolved. No additional vendor/system configuration changes for Jira or Zoom were recorded in the ticket.

Source Tickets (1)
437. Onboarding: mixed application entitlement confusion and Salesforce password activation
90% confidence
Problem Pattern

New-starter requested identical application permissions as a reference user across multiple systems (Salesforce, Cloudya/Nfon, Care, myCampus/Epos) but reported inability to access one or more apps. No explicit error messages were shown; user expected same entitlements as the reference user and was unsure which accesses were already provisioned or required additional activation.

Solution

Support verified that Care, Epos, myCampus and Cloudya/Nfon entitlements were already provisioned (as documented in the welcome-email PDF) and communicated those confirmations to the requester. For Salesforce the issue was resolved by sending an admin-triggered password-reset email to the user; after the user followed the reset link, the account accepted the IU-mail sign-in and Salesforce access succeeded. The ticket was then closed after user confirmation.

Source Tickets (1)
438. Application integration action blocked by missing role (Oasis 'Push to Workday')
90% confidence
Problem Pattern

A finance user could not perform the application-level action 'Push to Workday' from Oasis (used to push invoices/PO changes), preventing batch submission and customer validation. There were no application error codes reported; the symptom was inability to complete the push operation for many purchase orders.

Solution

The missing application permission was granted to the affected user, restoring the Oasis 'Push to Workday' capability. The permission change was applied on 2025-10-16 by the named administrator (Sean Parker) and access was verified by the requester, who confirmed the ability to push changes.

Source Tickets (1)
439. Provisioning error created missing project permissions for Jira/Confluence access
88% confidence
Problem Pattern

A newly provisioned external user account reported an unspecified 'error when the user was created' and could not authenticate to Jira despite being added to a project; Confluence and GitLab access were also requested. Symptoms included login failure and lack of expected product access after initial provisioning.

Solution

Support investigated the account provisioning and corrected permission settings that had been misconfigured during creation. The user was re-added to the appropriate Jira project and Confluence access was granted; the requester confirmed that Jira and Confluence access worked after the permission correction.

Source Tickets (1)
440. Procurement‑owned SaaS access requests (Viva Goals) routed outside IT
90% confidence
Problem Pattern

A user queried who should approve Viva Goals access; Automation-for-Jira notes showed a CC approver and a pending approver but no technical error. The requester was unclear whether IT, procurement, or a named approver was responsible for granting access.

Solution

Support determined that procurement/purchasing owned Viva Goals access decisions and advised the requester to submit the access request to procurement@iu.org. The ticket recorded the Automation-for-Jira approval metadata (CC approver and named waiting approver) but the access decision was routed to procurement for final approval.

Source Tickets (1)
441. Okta app assignment or app-state (locked) blocking SSO launch to a known account
90% confidence
Problem Pattern

Users with existing application accounts were blocked from launching the app via SSO or were prompted to sign in with Okta despite having an account in the target application. Symptoms included an Okta SSO sign-in prompt instead of direct app access, or the app being locked on the user's Okta account with no vendor error codes.

Solution

Access was restored by addressing the Okta-side entitlement or app state. In one case the target application (CARE) was administratively assigned to the user's Okta identity which linked the existing account and removed the SSO prompt. In another case the Lucidchart Enterprise application was unlocked on the user's Okta profile; the unlock plus short Okta-propagation time (~5–10 minutes) allowed successful SSO launches.

Source Tickets (2)
442. Application feature access denied until role/permission mapping matched a reference user
85% confidence
Problem Pattern

Users could not view or interact with specific application features (finance refund transactions, Kafka topics via Conduktor) because their account lacked the required in-app permissions or role mappings; no authentication errors were reported, only missing functionality or screens.

Solution

The missing in-application permissions were granted by updating the user's roles to match the requested/reference user or by assigning the specific transaction/view permissions. For Conduktor the user's permissions were configured to mirror the referenced user and access was confirmed. For the finance refunds module the user received the required application permissions to view/process the listed refund transactions and confirmed successful access.

Source Tickets (3)
443. On-site Viewneo digital‑signage access blocked by missing site‑specific credentials and documentation
60% confidence
Problem Pattern

User requested access and usage documentation for a site‑specific Viewneo installation but no Viewneo credentials for the requested Dresden location were available. Support initially replied with incorrect Deskbird/Okta instructions, the user clarified they needed Viewneo access, and the ticket contained no location credentials or usage docs. Symptom: inability to access or operate the onsite Viewneo box due to missing per‑site credentials.

Solution

Support acknowledged the incorrect Deskbird guidance, asked the requester to confirm whether a Viewneo box existed at the Dresden site, and explained that each site used its own Viewneo credentials. The ticket did not contain Dresden credentials or the requested usage documentation, so no credential handover or final provisioning occurred within the ticket and the request required the local site owner or Viewneo administrator to supply the site‑specific credentials and documentation.

Source Tickets (1)
444. Billing application access lost and escalated to Local Contact Center without technical troubleshooting
45% confidence
Problem Pattern

User reported loss of access to the billing/Abrechnungstool and mentioned receiving an error but did not include the error text. Symptom: inability to open or use the billing application; no error codes or diagnostic details were captured in the ticket.

Solution

Support escalated the issue by emailing the user and advising them to contact the Local Contact Center (LCC). No technical troubleshooting steps, diagnostics, or remediation were recorded in the ticket and the case was closed after the escalation instruction was issued.

Source Tickets (1)
445. Browser Google account sign‑in prompt blocked Salesforce click‑to‑dial setup
70% confidence
Problem Pattern

User could sign into Salesforce but could not complete click‑to‑dial setup because Chrome displayed a Google account sign‑in dialog and the browser would not allow the user to sign into that Google account. Symptom: CTD configuration blocked by a browser-level Google sign‑in flow interfering with Salesforce/SSO setup.

Solution

Support reviewed the screenshot, identified the dialog as a Google account sign‑in prompt, and advised launching Salesforce in Chrome via the Okta SSO (sign into okta.iu.org first) so the Salesforce session would be provisioned through Okta. The agent asked the user for the specific CTD setup instructions they were following; no further user response or confirmed fix was recorded and the ticket was closed by inactivity.

Source Tickets (1)
446. Care provisioning: 'Community' access not selectable for external worker accounts
85% confidence
Problem Pattern

During onboarding of external workers the Care UI did not allow selecting or assigning the 'Community' access option. Accounts were created via the Atlassian API and had password‑reset emails scheduled for the external users' private addresses, but the provisioning UI prevented assigning the Community role.

Solution

For at least one case the support agent directly enabled and assigned Community access in the Care system and completed the provisioning workflow; a password‑reset email was configured to be sent to the external user's private address on the start date. A related ticket was marked Done without recorded steps, indicating the underlying UI selection issue was handled by an agent manually setting the Community flag in the Care backend rather than a documented UI change.

Source Tickets (2)
447. OpenAI Playground access request forwarded to specialist team with no immediate feedback
70% confidence
Problem Pattern

User submitted an access request for the OpenAI Playground but received no response and remained without access. Symptom: lack of feedback or outcome after submitting the access request form.

Solution

Support forwarded the user's access request to the specialist team and informed the requester that the form had been passed on for handling. The ticket was closed and contained no further resolution details or confirmation of provisioning from the specialist team in the ticket record.

Source Tickets (1)
448. Trello board invite / membership not granting access (invite link or vendor-side board permission issue)
60% confidence
Problem Pattern

User reported being added to a Trello board or given an invite link but could not open or access the board. Board membership count was below the workspace/member limit and no explicit error message was returned. Invite-link expiry or a Trello-side/board-permission problem was suspected.

Solution

Support validated that an invite/link had been generated and then escalated the case to the Trello specialist/product team (Fachabteilung) for deeper investigation. The ticket recorded the escalation and context for the specialist but contained no further remediation detail or final resolution.

Source Tickets (1)
449. Case-management (FS English Thesis) limited-record view due to approver/visibility role mapping
70% confidence
Problem Pattern

Users (including an admin) saw a restricted/limited view of 'FS English Thesis' application records and could not edit or process applications. The symptom suggested approver or record-visibility role mapping prevented full record access for multiple accounts.

Solution

An approver role change was applied (noted in the ticket as 'Approver angepasst' by a specialist) and the incident was forwarded to the application specialist team for in-depth investigation. An admin reproduced the same limited view and requested a reference user to map permissions; the ticket documents role adjustment and escalation but does not record a final remediation step.

Source Tickets (1)
450. GrowthBook access provisioning for service account and requester resolved by product owner
90% confidence
Problem Pattern

Requester and a service account lacked GrowthBook access or license assignment for Synthetic Teaching testing. No errors were shown — the issue was missing seat/license ownership or contact for provisioning.

Solution

Support identified the GrowthBook license/contact owner and contacted the requester via Teams. Ownership was assigned to a named owner (David Meyer) who provisioned the requested GrowthBook access for the service account and the human requester; access was confirmed and the ticket was closed.

Source Tickets (1)
451. Twilio access via Salesforce SSO failed despite password reset and SSO group membership
70% confidence
Problem Pattern

User could not access Twilio through the Salesforce integration even after successfully resetting their Salesforce password; the user was a member of the Twilio SSO group but received an unspecified login/error when attempting Twilio access.

Solution

Support triggered a system reset email and the user completed a Salesforce password reset. The case was then escalated to the internal/integration team for further investigation; the ticket notes the password reset and escalation and was later marked resolved by the handling team without granular troubleshooting steps recorded in the support ticket.

Source Tickets (1)
452. Project-board read-only access: write/visibility controlled by Project Admins (support cannot assign)
90% confidence
Problem Pattern

User could open a project/DevOps dashboard board but could not create tickets or see existing tickets; symptoms indicated missing write/visibility rights that are governed at the project level rather than by central support.

Solution

Support advised that project-specific permissions were controlled by the project's Project Admins and could not be granted by service desk staff. The user was instructed to contact one of the Project Admins; the ticket was closed after providing this guidance and contains no confirmation that the Project Admins subsequently changed permissions.

Source Tickets (1)
453. Access requests stalled when manual provisioning relied on a named product specialist/owner
78% confidence
Problem Pattern

Users requested access to internal or vendor-hosted apps but provisioning required a specific product specialist or approver; requests were forwarded to that named person or team and either provisioning was completed by the specialist or the ticket remained unacted and auto-closed. Affected systems included Datadog, Metabase, Cenva/Canva and other platform accounts where a single admin/owner handled account creation.

Solution

Tickets were handled by contacting or forwarding the request to the product specialist or approver named in the workflow. In one case (Canva) the specialist team provisioned a Canva Pro account for the requester and the ticket was closed as done. For other requests (Datadog, Metabase, Cenva) the ticket notes recorded that the request and required approval were routed to the named owner (Kevin Fischer / Eva Friedrich or the specialist team) but no provisioning confirmation was recorded; one ticket was auto-closed by the Automation-for-Jira workflow after no reply. The documented actions were therefore either a successful specialist provisioning (Canva) or escalation/forwarding to the responsible owner with no recorded completion.

454. Service mailbox cannot authenticate to vendor app because mailbox is not an Okta user
90% confidence
Problem Pattern

A service/shared mailbox account attempted to sign in to a third‑party service (JungleMail) that used Okta/Microsoft 365 SSO; the mailbox address was not represented as an Okta user so the Okta-based login flow redirected and could not complete.

Solution

Investigation confirmed the vendor integration (JungleMail) was configured to authenticate via the organisation's Okta/Microsoft 365 SSO. The service mailbox (evaluationen@iu.org) was not present as an Okta user, so the SSO flow redirected to Okta and could not proceed to authenticate the mailbox. The ticket documented the root cause (Okta-based auth + mailbox not an Okta user) but no corrective action was recorded in the ticket.

Source Tickets (1)
455. Power Apps blocked when user lacks HR/role attributes (professor) required by the app
86% confidence
Problem Pattern

A user could not access Power Apps features because the app treated them as not belonging to the required role (e.g., 'not recognized as a professor'); app UI only offered an owner-request workflow and the user lacked the HR/appointment attribute expected by the Power App.

Solution

The investigation noted the Power Apps (WIKO ProfessorInnen and WIKO Präferenzabfrage) evaluated the user's employment/role attributes and presented only an access-request flow because the user was not recognised as a professor. The ticket recorded that the requester recently started employment and suspected the missing appointment certificate or HR-recorded appointment might be the cause. No app-owner change or role-attribute update was performed in the ticket; the actions recorded were diagnosis of the likely cause (missing professor/appointment attribute) and direction that the app owner or HR-sourced attribute needed to be resolved outside the ticket.

Source Tickets (1)
456. License‑assignment blocked by UI warning about additional fees when changing agent/dashboard licenses
70% confidence
Problem Pattern

An admin attempt to change agent/dashboard licenses for new employees was blocked by a UI warning indicating additional license fees would apply; the change did not complete and permission/Wallboard access remained unset.

Solution

The ticket recorded that when the requester tried to change licenses for three new employees the system displayed a warning that additional licensing fees would be incurred; no license changes were completed. The request was escalated to the specialist team for clarification of licensing/fee handling, and no further permission changes were recorded before the ticket was closed. The documented outcome was escalation with no in-ticket resolution of the fee-warning or successful license assignment.

Source Tickets (1)
457. Requests for personal Jira instances or service/API accounts stalled by missing context and approval
75% confidence
Problem Pattern

Requesters asked for a personal Jira instance and a service-level account with API access (for integrations/QA) but provided insufficient context. Requests stalled while awaiting specialist approval, scope details or an approver; no immediate provisioning occurred. Symptoms included long ticket lifecycles, follow-up questions from specialists, and automatic ticket closure after requester inactivity.

Solution

The ticket was triaged and forwarded to the specialist team which requested additional context from the requester. The specialist provided informal guidance that the requester could independently create a personal Jira instance if IU-managed provisioning was not required. The specialist also noted that an MCP-related global IU solution for service/API access was in prioritization and expected imminently. No service-account or instance was provisioned before the ticket auto-closed due to no further requester response.

Source Tickets (1)
458. Viva Goals access lost when dynamic Azure AD license group was missing due to empty Workday-derived attribute
90% confidence
Problem Pattern

Users experienced sudden loss of access to Viva Goals with errors such as "Viva Goals is not enabled for your account". Investigation showed an Okta → AD sync error and that the Azure (EntraID) dynamic group IUG-AAD-ASS-License-IT-VivaGoals was missing. The dynamic group's membership relied on extensionAttribute15 (CustomAttribute15) populated from Workday, but affected accounts were not sourced from Workday so the attribute was empty and those users were excluded from the license-assignment group.

Solution

Investigation identified an Okta→AD sync failure and confirmed the Viva Goals license group IUG-AAD-ASS-License-IT-VivaGoals was absent for the affected users because extensionAttribute15 (CustomAttribute15) was not populated for non-Workday accounts, preventing them from being included in the dynamic EntraID group and receiving the Viva Goals license. The ticket recorded this root-cause diagnosis; no remediation actions or account-level fixes were documented in the ticket.

Source Tickets (1)
459. Okta admin role lacked permission to edit group memberships
95% confidence
Problem Pattern

An Okta administrator account for the BOPS team could not edit group memberships and therefore was unable to manage application entitlements. The problem affected group-management tasks in the Okta admin console and prevented the named admin from performing membership changes.

Solution

The Okta admin role for the BOPS account was updated to include the permission to edit group memberships. The change was implemented in Okta by Markus Müller and the account regained the ability to manage group membership; the ticket was marked Done.

Source Tickets (1)
460. Workday Sandbox login fails despite production credentials
90% confidence
Problem Pattern

User could not sign into the Workday Sandbox using their normal Workday credentials; login attempts failed with no specific error message. The issue affected Workday Sandbox access separate from the production tenant and involved Okta/Workday identity contexts. Requester needed urgent E2E test access but sandbox account was not present or not permitted.

Solution

Support confirmed that production Workday accounts and SSO are managed via Okta but that sandbox‑environment access was controlled separately by the Workday/tenant administrators. The request was forwarded to the Workday support contact (wd-support@careerpartner.eu) and the user was advised to request sandbox access directly from Workday Support. No additional Okta configuration changes were recorded in the ticket.

Source Tickets (1)
461. Viva Engage moderator assignment blocked by role/licensing or community membership
60% confidence
Problem Pattern

A Viva Engage community manager could not add staff members as moderators; they were able to add users only as Corporate Communicators and only if the users were already community members. No explicit error messages were reported and the operations appeared to be constrained by tenant/role or licensing state.

Solution

The case was closed as resolved by an internal administrator, but the ticket lacked a step‑by‑step remediation record. The support thread recorded recommended checks and actions: verify the requestor's Viva/tenant permission schema and whether the requestor held moderator/administrator rights; confirm that target staff were licensed/registered for Viva Engage and members of the community; and adjust roles or community membership where appropriate. No further automation or platform configuration change was documented in the ticket.

Source Tickets (1)
462. SSO works for some vendor shops but a specific shop fails due to vendor-side account state
80% confidence
Problem Pattern

After enabling SSO, a user could sign into two vendor shop sites but received an unspecified error when accessing a third shop via SSO. The failure was isolated to a single shop while other SSO logins succeeded; no explicit error codes were captured.

Solution

IT confirmed that SSO had been enabled and that the user could sign into the other shops. The unresolved shop appeared to be controlled by the vendor/platform team, so IT advised the requester to have the brand‑platforms team (brand-platforms@iu.org) inspect the failing shop account and user mapping. No further action by IT was documented and the ticket was closed pending vendor-side investigation.

Source Tickets (1)
463. Vendor-side SSO/license visibility mismatch causing lost admin privileges
86% confidence
Problem Pattern

User reported loss of admin/full permissions in a vendor SaaS account while still seeing an Okta SSO tile and license in their session; support tools could not see the same SSO/license entry and the user’s account appeared read-only in the vendor UI. There were no error codes; symptom was a conflicting view between the user’s SSO session and the support/backend visibility of the account and entitlements.

Solution

Support investigated but could not view the vendor-side SSO/license metadata from their admin consoles, so no direct remediation was applied in the ticket. The user was instructed to submit a Self‑Service access modification request to the product provisioning workflow; the user then closed the support ticket and opened a new Self‑Service request to request reinstatement of admin privileges. The ticket was closed without an in-ticket fix because the vendor-side account state and the Okta-visible session were inconsistent and required product-owner/self-service re-provisioning.

Source Tickets (1)
464. Vendor account provisioning stalled due to missing reference-user information
82% confidence
Problem Pattern

Requesters attempted to provision or create vendor-hosted content/asset accounts (Cloudinary) but the vendor or provisioning workflow required a 'reference user' or reference-account details to create a proper corporate account. The requester did not supply the required reference information, so the provisioning request remained open with no account created.

Solution

The support agent recorded that Cloudinary account creation required a named reference user to map account settings and permissions; because the requester did not provide the reference-user details, no Cloudinary account was provisioned and the request was left unresolved. The ticket documented the requirement for a reference user but closed without creating an account until the requester supplied the requested reference information.

Source Tickets (1)
465. Access requests for non‑IT‑supported apps or missing approver/cost‑center auto‑closed by automation
90% confidence
Problem Pattern

Users requested access or licenses for applications that were either not supported by central IT or required manager/cost-center approval; requests sat waiting for approver action and Automation-for-Jira auto-closed them after the configured approval timeout. Symptoms included access-denied for training content and automated 'not approved within 14 days' closure messages.

Solution

Support determined the applications were owned outside central IT and routed requesters to the product owners or specialist teams (for TEAQ support the contact support-teaq@iu.org; for training/Learning Hub access the People Projects team at people-products@iu.org). Where the approval workflow timed out with no approver action, Automation-for-Jira recorded an automatic closure and the ticket state was declined. No in-ticket entitlement changes were applied because the apps required owner-managed provisioning or approver action outside the IT team.

Source Tickets (2)
466. Service accounts, app registrations and tenant‑level governance blocking automation integrations
88% confidence
Problem Pattern

Requests to provision service/machine accounts and to install or register third‑party apps for automation (n8n flows, Incident.io evaluation in Teams, Copilot-built agents for a service account) stalled because of uncertainty about authentication models, missing Azure AD app registration approvals, required Microsoft Graph permissions, and organizational/policy constraints (e.g., Works Council restrictions). Symptoms included inability to complete automation authentication, blocked Teams integrations, and policy‑gated denial of AI/Copilot features for service accounts.

Solution

Support captured guidance and routed the requests to the appropriate specialist and identity teams: SalesTech/Salesforce specialists were notified for Salesforce-integrated flows, requesters were pointed to Microsoft Graph APIs and permission models for Teams chat/message operations, and Identity/Azure AD approval was identified as required for tenant App Registration (Incident.io Teams install guidance and an Identity-owner approval step were recorded). For Copilot built‑in agents, the request was escalated to policy owners because Works Council data/security tolerance needed to be established before enabling service-account access (no Copilot access was granted in the ticket). The tickets remained pending or were closed due to inactivity or awaiting external approvals; no final multi-system service-account provisioning was completed within these tickets.

467. Missing dynamic Azure/AD group membership after account-internalization blocked Service Portal and intranet access
75% confidence
Problem Pattern

User account was converted from external to internal but the user could sign into some services (Teams) and was denied access to the Service Center/Service Portal and large parts of the intranet. Symptoms were general access‑denied or login failures for internal systems; affected systems included the Service Portal and internal intranet pages. The underlying symptom was absent dynamic group membership that normally grants Service Portal rights.

Solution

Support investigated the account state and identified a missing dynamic group assignment as the root cause of the Service Portal and intranet access-denials. The investigation notes recorded the root cause (absent dynamic group membership tied to the internal account state), but no remediation steps or confirmation of a fix were documented in the ticket before it was closed.

Source Tickets (1)
468. Okta-backed shared/service mailbox requested for vendor SSO but self-service and policy prevented immediate provisioning
70% confidence
Problem Pattern

Team requested an Okta-enabled shared account/service-mailbox (team-service-on-campus@iu.org) so a Project Management team could access a vendor app (Cloudinary) and upload assets. The Cloudinary application self-service form did not show the shared account and the user lacked Okta credentials and membership in the Cloudinary SSO group. Ticket raised policy/security concerns about provisioning shared accounts in Okta.

Solution

IT created the requested shared mailbox (team-service-on-campus@iu.org) and investigated Okta provisioning for SSO access. The ticket documented that the Cloudinary self-service form did not list the mailbox as an assignable Okta user and that the request raised security/policy concerns about using shared Okta accounts. No final Okta SSO provisioning or documented policy approval was recorded in the ticket.

Source Tickets (1)
469. Okta tile visible but launching Jira/Confluence redirected to service portal or denied due to missing product permissions
90% confidence
Problem Pattern

Users saw Jira and/or Confluence tiles in the Okta dashboard but could not open the product. Launch attempts either redirected to the IT service portal or returned a generic denial; users reported 'lost access' without in‑app error codes. Affected systems were Jira and Confluence (Okta SSO tile present, but product-level permissions or in‑app account mapping were missing).

Solution

Support restored the users' Jira/Confluence product permissions at the application level (re-granted the missing product entitlements/permissions). After the permission assignment was re-applied, the users tested and confirmed they could open Jira and Confluence from the Okta dashboard and access was verified as restored.

Source Tickets (2)
470. HTTP 404 when launching GitLab via Okta/Jira — workspace or instance-level access routed to DevOps
60% confidence
Problem Pattern

Users received an HTTP 404 (page not found) when attempting to open GitLab from the Okta dashboard or via Jira links. The Okta tile launch completed but resulted in a vendor 404 rather than an authentication error. The symptom indicated a workspace/project or instance mapping issue rather than a simple credential failure.

Solution

Support routed the user to the DevOps team via the DevOps Service Desk for investigation of GitLab workspace/project-level access and instance mapping. The ticket was closed after referral to DevOps for the platform-owner investigation and remediation.

Source Tickets (1)
471. Miro account exists but password‑reset emails not received; Okta Dashboard SSO used as fallback
50% confidence
Problem Pattern

A user could not sign in to Miro and did not receive vendor password‑reset emails despite the platform confirming an account exists for the corporate email. Symptoms included missing recovery emails and inability to use the vendor's local password-recovery flow. Okta SSO integration was available as an alternate launch path.

Solution

Support advised the user to sign in to Miro via the Okta Dashboard SSO (provided the authenticated Okta launch URL) as a fallback to the vendor password reset. No further troubleshooting or email-delivery remediation was recorded in the ticket.

Source Tickets (1)
472. Manual product-owner provisioning for Lucid and Atlassian access
90% confidence
Problem Pattern

Users reported inability to access Lucid or Atlassian with no specific error codes; the symptom was simply lack of access or missing product entitlement. Requests arrived as standard access requests rather than vendor-invite failures or SSO errors.

Solution

Access was restored by the product teams via manual provisioning: application entitlements/permissions were granted to the affected user accounts and a notification was sent to try access. Tickets were closed after the app-owner confirmed the required permission/assignment had been applied.

Source Tickets (3)
473. GitLab access requests routed to DevOps Service Portal for specialist provisioning
80% confidence
Problem Pattern

User lacked access to GitLab and could not authenticate or access repositories; no in‑ticket error details were provided. First-line support identified GitLab access as managed by DevOps and could not complete provisioning from the IT helpdesk channel.

Solution

Support instructed the requester to open a provisioning request in the DevOPS Service Portal because GitLab permissions and account creation were handled by the DevOps team. The DevOps provisioning workflow then processed the request and the issue was closed by the owning team after granting the required GitLab access.

Source Tickets (1)
474. Vendor invitation/credential email not received for Twilio access
60% confidence
Problem Pattern

User could not access Twilio because they did not receive the vendor-sent access/activation email and were unable to log in with their corporate email or local PC password. No specific error codes were reported and the user indicated an urgent need for access.

Solution

The case was escalated to the specialist/owner team for Twilio; the agent noted that accounts are typically pre-created and that the missing step was the vendor invitation or credentials delivery. A callback request was logged and the specialist team was expected to verify account existence and resend the activation/invite email or otherwise complete the vendor-side provisioning; the ticket was subsequently closed without a detailed final confirmation recorded in the ticket.

Source Tickets (1)
475. Corporate webshop product missing or broken ordering link (IU Shop business cards)
60% confidence
Problem Pattern

User attempted to order corporate business cards via the IU Shop web shop (Okta tile) but encountered permission-denied errors or a broken ordering link. The IU Shop tile was reachable via Okta but the business‑cards product or ordering workflow was not displayed; previous direct ordering links returned errors. Screenshots showed generic permission denial; affected systems were Okta (okta.iu.org), the IU‑Shop webshop and the corporate brand ordering platform/contact.

Solution

Support confirmed the IU Shop Okta tile launched but the business‑card product or ordering URL was unavailable. Troubleshooting notes and screenshots were collected and the user was directed to contact the brand‑platforms team (brand-platforms@iu.org) for product listing or ordering‑link restoration. No final fix was recorded in the ticket — the change/restoration of the shop product or replacement ordering link was left to the brand team.

Source Tickets (1)
Back to Summaries
An unhandled error has occurred. Reload X