General Identity

Identity

12 sections
68 source tickets

Last synthesized: 2026-02-13 02:45 | Model: gpt-5-mini
Table of Contents

1. Display names and academic/professional titles sourced from Workday were incorrect or missing in Microsoft services

22 tickets

2. Immediate corrections performed in Okta/other authoritative systems for exceptions and external accounts

17 tickets

3. Perceived mismatches caused by synchronization delays and local client caches

13 tickets

4. Identity lifecycle changes required approval workflows and automation to apply updates

3 tickets

5. Authentication service outage caused by misconfigured rate limiting and retry amplification

1 tickets

6. Incorrect or personal admin entries in Okta Security Contacts causing unclear notification routing

1 tickets

7. Unsolicited Okta email-address-change notifications traced to background sync changes

3 tickets

8. Managed Apple device account mismatches and temporary Apple ID prompts causing sign-in failures or frozen Settings

3 tickets

9. Jamf Connect startup error dialogs on macOS cleared by re-authenticating via the menu-bar Connect item

1 tickets

10. Page-level wiki edit permission denied for specific article

1 tickets

11. Sudden desktop sign-out from Microsoft Teams and Outlook resolved by re-authentication and use of web clients

1 tickets

12. Third-party application login failures escalated to owning support teams

2 tickets

1. Display names and academic/professional titles sourced from Workday were incorrect or missing in Microsoft services
95% confidence
Problem Pattern

Display names or academic/professional titles in Microsoft services (Microsoft 365, Teams, Outlook) appeared missing, incorrect, truncated, or differently formatted and could not be persistently edited in Microsoft apps. Affected accounts often showed inconsistencies between teams or tenant contexts (e.g., title visible for one campus/team but not another). The discrepancies were observed where authoritative attributes originated from Workday (often provisioned via Okta), where titles were stored in non-name fields or the preferred-name was locked, and changes sometimes took hours to up to ~2 weeks to appear downstream.

Solution

All investigated incidents traced to authoritative identity data and how Workday attributes were provisioned into downstream systems. Resolutions involved correcting the user’s Workday record and completing any required HR/manager approval workflows; where Okta was in use the provisioning chain was Workday → Okta → Microsoft and Okta delivered the updated profile attributes into Microsoft 365, Teams and Outlook. Specific observations that resolved tickets included: • Preferred-name edits were prevented when Workday’s preferred-name field was locked by a checkbox; unlocking and updating that field (plus approvals) allowed the change to propagate. • Academic/professional titles stored in Workday’s job/position or other non-name fields produced unexpected or missing display values; moving or entering the title into the appropriate name/preferred-name field produced the expected display. • In at least one case a title existed for one campus/team but not another because the user had multiple account contexts/Teams app instances or team-specific provisioning; that scenario required coordination with local team/IT colleagues to reconcile or insert the title in the affected team context. • Direct edits made inside Microsoft or Teams were not authoritative and were reverted by the provisioned sync, so fixes were applied in Workday/HR. • Observed propagation windows varied: many updates appeared within 1–3 days while some systems took up to about two weeks to reflect the corrected display name/title. These combined factual findings resolved the matched tickets.

2. Immediate corrections performed in Okta/other authoritative systems for exceptions and external accounts
91% confidence
Problem Pattern

Authoritative identity/profile records were inconsistent or held conflicting values, causing incorrect display names, sign-in addresses, or unexpected profile data across systems. Symptoms included embedded or missing academic titles; incorrect surnames, lost diacritics or failed special-character normalization (for example an initial dotted capital 'İ'); legacy or incorrect sign-in addresses (including legacy '.ext' emails); private/personal email addresses appearing in application profiles; duplicate, blocked, or external-contact records that prevented propagation; third-party account linkages where external Microsoft/LinkedIn ownership obscured control; and login failures when a service required an email-based username but a UID was used. Affected systems included Okta, Workday, EPOS/Care/myCampus, Atlassian/Jira, Windows, Salesforce, LinkedIn Learning, and external Google accounts.

Solution

Authoritative identity and profile inconsistencies were corrected in Okta, Workday, and downstream systems; automation and manual edits were used depending on urgency and available tooling. Unwanted embedded titles and extraneous text were removed from Okta profiles; where a dedicated title attribute was unavailable salutation fields or EPOS surname fields were used to disambiguate external displays. Requested academic titles were added to canonical records and confirmed after normal directory propagation. Workday-driven canonical name changes were applied in Workday and Okta Workflows/automation then updated sign-in/UPN values; downstream systems adopted new values on their regular sync schedules. Administrators performed manual edits in Care/myCampus and similar systems when immediate corrections were required while waiting for upstream syncs. Conflicting, blocked, or duplicate emails that prevented self-service updates or propagation to Atlassian/Jira were cleared by removing or merging holding accounts so Okta could push the revised email; duplicate Care or external-contact records were merged into the intended profile when appropriate. External lecturer accounts were verified for active/inactive status; where accounts were active a password-reset link was sent to the provided private contact email when requested. Instances where private/personal email addresses were present in authoritative profiles were remediated by removing the private address from the central profile and applying fixes to myCampus and related services to stop notifications to personal addresses. Authentication problems specific to Atlassian were diagnosed and resolved in cases where users succeeded by using email instead of UID once email attributes were corrected. Approved automation and scripts (Atlassian API, Okta automation, Okta Workflows) performed edits and notifications where applicable; all changes propagated according to normal sync windows and were confirmed after propagation. Name-normalization rules in Okta Workflows were updated to include missing Unicode characters (for example the initial dotted capital 'İ') so names with those characters normalized correctly. For investigations involving third-party services, support checked license pools and ownership: an attempted unlink of a LinkedIn Learning/LinkedIn profile showed a private Microsoft–LinkedIn association owned outside IU control and no IU-managed license assignment was present, so IU support could not perform an unlink; users were informed of the external ownership and license-state findings. Inquiries about externally hosted Google accounts noted that Google accounts were not managed by central IT and membership could not be directly verified by IT; support confirmed this limitation and directed users to confirm ownership with the resource owner or follow service-specific access request paths (for example data-access forms) as appropriate.

3. Perceived mismatches caused by synchronization delays and local client caches
90% confidence
Problem Pattern

Users reported that profile data (display names, academic/professional titles, and photos) shown in external applications or services did not match authoritative central profile systems. Symptoms included outdated or misspelled display names and incorrect academic titles appearing in Microsoft clients (Teams, Outlook, other Office apps) and wrong photos appearing in public search results; updates were not editable in Office and no error codes were returned. Discrepancies persisted from hours to days or weeks due to backend propagation, client-side caches, or external search indexing.

Solution

Incidents were resolved according to where the authoritative data lived and where the stale view appeared. For display-name and title changes originating in central HR/profile systems (Workday, myCampus and similar) and flowing through identity providers (Okta) to Microsoft services, tickets were closed after backend synchronization and propagation windows completed and after any required approvals (for example manager approval in Workday) had processed. Typical observed propagation times for Workday→Okta→Microsoft chains were about 1–3 days, with occasional services taking up to ~2 weeks. Client-side cache behavior explained many perceived failures: Microsoft clients cached profile/display data locally and often continued to show old values until caches refreshed; simple application restarts frequently did not force an update, and in at least one case the Teams desktop client only displayed the updated name after the user signed out and signed back in. Changes could not be edited directly in Microsoft Office when the authoritative value resided in the HR/profile system. In the case of incorrect photos shown in public search results while the internal IU directory photo was correct, IT verified the internal profile and the resolution involved submitting a correction/report to the external search provider (Google) via its reporting portal; no internal IT changes were performed.

4. Identity lifecycle changes required approval workflows and automation to apply updates
85% confidence
Problem Pattern

Requests to modify lifecycle attributes (for example, extend external worker termination dates or update display names that entered an approval queue) required approver notifications and automated backend changes; users reported awaiting approvals and the applied change not being immediate.

Solution

Changes entered the established approval workflows (Automation for Jira/Workday approval flows) and approvers were notified. After approvals, automation via Atlassian API and Okta updated the identity attributes (e.g., extended termination date), and confirmation messages were provided to requestors. These automated/approved updates completed the lifecycle change and were reflected in the identity directory.

5. Authentication service outage caused by misconfigured rate limiting and retry amplification
95% confidence
Problem Pattern

A recent deployment misconfigured an internal rate-limiter, causing sign-in/signup/profile/password-reset requests to receive HTTP 429 responses and client retry behavior amplified load, resulting in widespread authentication and profile API failures.

Solution

The incident was resolved by rolling back the recently deployed feature that introduced the misconfigured rate limit. The rollback stopped the 429 responses and the cascading failure; incident remediation restored normal authentication, signup, profile retrieval, and password reset flows.

Source Tickets (1)
6. Incorrect or personal admin entries in Okta Security Contacts causing unclear notification routing
88% confidence
Problem Pattern

Okta Security Contacts and the Support page listed outdated or personal admin accounts (e.g., a personal admin address) and ambiguous recipients for security/IT notifications. There were no explicit errors, but administrators and security staff were unsure which mailboxes or people actually received Okta security messages. Affected systems were Okta's Security Contacts UI and corporate mailboxes (Outlook) used for incident/CSM coordination.

Solution

Support corrected the Okta Security Contacts entries by removing the personal/admin mailbox references and replacing them with the organisation's official security recipients. The change was coordinated with the Customer Success Manager and inbox checks were performed to confirm the listed addresses (including the central information security group address) had valid mailboxes and ownership. The Support page was updated to reflect the clarified primary security contacts and named recipients.

Source Tickets (1)
7. Unsolicited Okta email-address-change notifications traced to background sync changes
85% confidence
Problem Pattern

Users received unsolicited email notifications from external providers (Okta, Apple) indicating a primary email/address change they did not request after HR/identity system updates or background identity syncs. Affected systems included single-sign-on and consumer-cloud identities (Okta, Apple ID/iCloud), user devices (iPhone, iPad, Mac), and corporate email identity records. Users reported confusion about account compromise, mail delivery/forwarding, mixing personal and work data, and uncertainty about Apple Business/federated account behavior.

Solution

Technicians traced unexpected "email address changed" notifications to automated/background identity updates originating from HR/Workday or directory syncs and treated each provider accordingly. For Okta cases, the unintended primary email value was reverted to the original address (for example, htaylor@libf.ac.uk) and the account configuration was confirmed corrected; the user was informed of the restoration. For Apple-related notifications, staff confirmed the messages were expected as part of the Apple Federation Switch after the corporate email change, supplied the intranet SharePoint guidance, and recommended requesting a managed Business/Work Apple account through the Service-Portal when appropriate. In situations where a separate work Apple identity was required, a new iCloud email address was created to preserve separation of personal and work data; teams noted and communicated that Apple Business/federated accounts may not support migrating existing personal iCloud data to a managed account. Each incident resolution documented the source of the identity change (HR/Workday or directory sync), the corrective or explanatory action taken, and the user-facing outcome.

8. Managed Apple device account mismatches and temporary Apple ID prompts causing sign-in failures or frozen Settings
90% confidence
Problem Pattern

Managed iOS devices experienced account-related authentication failures and persistent Apple ID/account update prompts. Symptoms included repeated prompts for a temporary Apple ID (…@temporary.appleaccount.com) that caused the Settings app to become unresponsive; recurring Apple account update prompts that reappeared after many attempts and could not be completed on-device or via the Apple ID website; and sign‑in failures when users attempted to authenticate with personal accounts on devices under remote management. Affected systems included Apple ID, iOS Settings, iCloud, the Apple website, and remote device management enrollment.

Solution

A persistent temporary Apple ID prompt on managed devices was resolved by signing the device out of the temporary Apple ID and replacing it with a private Apple ID (for example, an icloud.com address); after the replacement the device returned to normal operation. Sign‑in failures on devices under remote management were resolved when users authenticated with their institutional credentials (IU Study / IU email) as required by the management profile. A separate case where an Apple account update prompt repeatedly failed both on-device and via the Apple ID website was resolved during a remote Microsoft Teams support session; the ticket did not record the specific technical steps taken during that session.

9. Jamf Connect startup error dialogs on macOS cleared by re-authenticating via the menu-bar Connect item
95% confidence
Problem Pattern

On macOS the user saw persistent Jamf Connect error dialogs at startup that did not clear when re-entering known passwords; the issue appeared after signing out and back into an Adobe account and produced repeated authentication error prompts without other immediate functional limitations.

Solution

The issue was resolved by opening the Jamf Connect menu‑bar item, selecting 'Connect', and completing the login through that Connect menu. After successfully authenticating via the Jamf Connect menu the error dialogs stopped and normal operation resumed.

Source Tickets (1)
10. Page-level wiki edit permission denied for specific article
90% confidence
Problem Pattern

User reported inability to edit a single wiki page (Winback) despite having general wiki access; no error codes were supplied and the symptom was simply lack of edit controls for that page. The issue affected only that page and appeared to be a permissions or ACL restriction rather than a client or authentication failure.

Solution

Support granted the user explicit edit permissions for the Winback wiki page and notified them; access was confirmed by the user and no further issues were reported after a one-week follow-up.

Source Tickets (1)
11. Sudden desktop sign-out from Microsoft Teams and Outlook resolved by re-authentication and use of web clients
80% confidence
Problem Pattern

User was unexpectedly logged out of Microsoft Teams and Outlook desktop clients and prompted to sign in; clicking Continue produced errors and clearing the app cache did not restore sign-in. The symptom prevented use of desktop clients but did not indicate specific error codes in the ticket.

Solution

Support instructed the user to use the web versions as a temporary workaround. The user re-authenticated and confirmed sign-in was restored. Support also verified the workstation's device activation status and confirmed activation was retained.

Source Tickets (1)
12. Third-party application login failures escalated to owning support teams
70% confidence
Problem Pattern

Users were unable to sign in to third-party applications (SiteFusion, UniPark) with generic "unable to login" symptoms and no actionable local error details; basic user troubleshooting (reboots, alternate browsers) did not resolve access. The affected systems were owned by other organizational teams rather than local IT.

Solution

Support identified the owning teams and redirected the requests: SiteFusion issues were referred to the CfE-TEAQ support team with contact details and the CfE-TEAQ FAQ page (including an "Unable to Login" troubleshooting section), and UniPark access was escalated to the Library and Information Service (LIS). No additional local remediation was performed before handoff.

Source Tickets (2)
Back to Summaries
An unhandled error has occurred. Reload X