Offboarding

Identity

10 sections
783 source tickets

Last synthesized: 2026-02-12 23:09 | Model: gpt-5-mini
Table of Contents

1. Automated termination via Automation for Jira / Atlassian API

69 tickets

2. Standard multi-system employee offboarding and account deactivation

439 tickets

3. Hardware return logistics and iPhone / Apple ID activation-lock issues

220 tickets

4. Offboarding of accounts used by automations (Power Platform / Power Automate impact)

4 tickets

5. Removal of access from AI / model playgrounds (OpenAI IU Playground)

4 tickets

6. Inventory recording and closure after returned offboarding hardware

41 tickets

7. Offboarding documentation requests for external agencies (Arbeitsbescheinigung to Bundesagentur für Arbeit)

2 tickets

8. Coordinated user account rename after Workday name change (Okta workflow triggers immediately)

1 tickets

9. Account registered in external Azure AD tenant prevented Teams sign-in and self-removal

1 tickets

10. Post-exit email forwarding and distribution list cleanup

2 tickets

1. Automated termination via Automation for Jira / Atlassian API
95% confidence
Problem Pattern

Termination dates submitted via Automation for Jira/Atlassian API or originating from HR (Workday) produced scheduled deactivation/lock events that sometimes mismatched the authoritative portal or failed to trigger. Symptoms included due‑date alerts showing a different exit date than the IT Service Portal, queued deactivations executing with no explicit error codes, Okta/M365 termination dates not visible due to propagation/sync delays, and 'could not be found in Okta' / user‑not‑found errors when the wrong account record was referenced. Missing or invalid personal (private) email in forms caused offboarding notifications to fail, and some workflows auto‑closed tickets after a no‑response interval. Workday field mapping issues (for example setting only the 'Last day of work' / End Employment Date) did not reliably trigger the automation.

Solution

Termination‑date entries originating from Automation for Jira/Atlassian API or coming from Workday produced queued deactivation events that were investigated and resolved to match root causes observed across tickets. Workday field mapping issues were identified as a cause when only the 'Last day of work' / End Employment Date was set and did not trigger the automation; teams monitored Workday for the authoritative termination field and adjusted scheduled disable actions to 'pending' until the correct termination data propagated. Where automation and portal records showed different exit dates, IT‑Service Portal and Jira records were reconciled so the automation queued the intended date. Expedited requests were handled by administrators marking the disable action pending and performing immediate manual locks when requested; Automation for Jira sometimes retained the original queued date after a manual lock, and tickets were closed with the manual action recorded.

Records that referenced the wrong account (for example selecting an internal user in an external‑provider field) were corrected so Okta automation targeted the correct identity; in cases where the account was already deactivated no further action was required. Propagation or sync delays caused termination dates to be invisible in Okta or other identity systems, and administrators confirmed propagation status in identity logs before taking manual action. When Automation for Jira reported a due date reached but additional human steps remained (hardware returns, vendor‑specific accounts, licensing/AD changes after externalization), technicians manually locked or suspended accounts after reviewing automation logs and due‑date notifications; hardware return instructions or vendor links were provided as documented. Failed delivery of offboarding/hardware‑return emails because of missing or invalid personal addresses was recorded and tickets proceeded to account lock when required; missing approver or manager fields were restored or alternate approvers were engaged so approvals could complete.

Throughout, automation logs and due‑date notifications, identity‑system records (Okta/AD/licensing), and Jira Service Management fields were used to confirm queued events, verify execution, and record manual interventions. It was documented that academic departments (or LCC via Jira Service Management when no academic contact existed) owned exit‑date extensions. Firefox compatibility notes for the corporate offboarding form and device‑specific guidance were communicated when relevant.

2. Standard multi-system employee offboarding and account deactivation
95% confidence
Problem Pattern

Automated HR termination feeds, directory synchronisations and ticket automations caused mistimed, duplicate, premature or incomplete offboardings across identity providers (Okta, Azure AD/Entra), mailboxes (Exchange/Teams/OneDrive), licensing, telephony, MDM/Jamf, asset inventories and student/LMS systems. Symptoms included recurring provisioning jobs reactivating disabled users, inconsistent HR effective dates producing duplicate or urgent ad‑hoc disables, ticket automations that marked tasks done or auto‑closed tickets before manual steps completed, orphaned owner/group memberships and accounts remaining in non‑SSO third‑party services after Okta disables, stale MDM records preventing remote wipe, and failed OneDrive/leaver transfers leaving data inaccessible.

Solution

Offboardings were executed and reconciled across identity, mail, licensing, asset and ticketing systems and recorded against HR effective dates and scheduled automations. Identity and SSO: Okta and Azure AD/Entra primary and secondary accounts were disabled, suspended or deleted per exit dates; immediate terminations included Azure AD session revocations and Okta session clears where supported. Recurring provisioning jobs that re‑added memberships were identified and removed. Where Okta deactivation did not remove accounts in independently managed or non‑SSO services (examples included Auth0, O'Reilly, 1Password and other third‑party apps), those accounts and memberships were manually revoked or recorded as outstanding; several incidents were noted where Okta disabled linked apps but no further manual deprovisioning was recorded and tickets had been auto‑closed by Automation‑for‑Jira, so technicians rechecked and reopened tickets or logged remediation when gaps were found. Notifications and scheduling: automated deactivation notices and Automation‑for‑Jira due dates were reconciled with real‑time HR requests; technicians annotated or closed duplicate tickets and recorded human‑initiated early disables or delayed actions. Directory retention and mailboxes: account recoverability windows (Azure AD) and mailbox retention (≈90 days default) were tracked and deletions/externalisations logged with restore windows; mailbox auto‑replies, forwarding recipients and delegations were documented and Legal/Data‑Protection approvals were sought for central mailbox redirection. OneDrive and leaver handling: failed leaver‑flow notifications were tracked and affected users were reprocessed through specialist offboarding flows to restore transfers and permissions; files required for ongoing work were moved into shared/team SharePoint sites before deactivation. Endpoint and MDM/Jamf: devices were locked or blocked via MDM/Jamf and stale device records were reconciled after returns; devices signed into personal Apple IDs were marked non‑reusable until signed out or factory‑reset and cases without a managed device record required hardware recovery or legal escalation to enable remote wipe. Hardware returns and logistics: returns were coordinated through the refurbisher/SmartSupport workflow; technicians delivered return instructions, carrier labels and tracking numbers via the external portal or emailed labels to private addresses when corporate lookups failed and logged handover details. A browser compatibility symptom was recorded where the packaging/label web form was not functional in Firefox and technicians advised alternate browsers. License, telephony and externalised accounts: licence blocks, tier mismatches for contingent/external transitions and manual unassignment where group removal did not clear subscriptions were reconciled; telephony numbers and carrier updates were deactivated and externalised accounts with changed usernames/external addresses were created where required to preserve portal access. Student and community systems: learning‑platform and community accounts were suspended or deleted per withdrawal/exit dates and membership removals and HE data updates were recorded. Escalations and approvals: Legal/Data‑Protection were engaged for urgent disables, central mailbox access approvals and communication embargoes; immediate disables for non‑compliant or high‑risk leavers were recorded and any subsequent reactivations requested by HR were documented. Ticketing and audit: actions were logged in tickets including deactivation timestamps, returned‑asset tracking numbers, manual group/owner removals, OneDrive transfer outcomes, password‑reset actions to external addresses, community/Care/MyCampus suspensions and evidence for disputed exit dates and temporary reactivations. Cases where Automation‑for‑Jira auto‑closed tickets or where only SSO deactivation occurred without recorded manual deprovisioning were identified and rechecked; technicians reopened or annotated tickets and documented any remaining remediation.

Source Tickets (439)
3. Hardware return logistics and iPhone / Apple ID activation-lock issues
95% confidence
Problem Pattern

Departing employees were unable to complete device handovers because corporate accounts had been suspended or disabled, preventing on‑device Apple ID sign‑outs and normal hand‑over flows. Company iPhones/iPads frequently presented iOS Activation Lock tied to prior Apple IDs; sign‑out or Activation Lock removal failed when passwords were forgotten, two‑factor methods were unreachable, the Settings app stalled or crashed, on‑device biometrics blocked resets, or Activation Lock persisted after a factory reset. Devices remained enrolled in Apple Business Manager/Jamf or lacked IMEI/serial links in MDM, blocking remote wipes and reprovisioning. Asset‑return workflows were also blocked by missing or incorrect shipment metadata (missing serial/IMEI, delivery address, package counts/weights) and by portal regional restrictions or absent HR authorization for ownership transfers.

Solution

Returns were processed primarily through the internal asset‑return portal (navigate: Abdeckung → Rückgabe → Auftrag). Agents directed requesters to request packaging materials and return labels via that portal; in practice IT did not proactively dispatch return shipping information as a standard service, and agents only generated or emailed courier labels (for example DHL labels, DHL Express or multi‑barcode formats) when the portal failed, was region‑restricted, or produced incorrect labels. When corporate mailboxes were inactive, labels and packaging instructions were resent to employees’ private email addresses and tracking was recorded in Inventory360/MEA to close tickets. Drop‑off at regional IT sites (Berlin, Campus Nuremberg) or on‑site wipes (Munich) were offered when shipments could not be created due to missing dimensions/weights or other metadata; when package counts/weights were unavailable, agents requested per‑package weights or used the New Hires shipping profile as a documented fallback to create shipments.

Browser compatibility and guidance: agents documented a recurring Firefox incompatibility with the returns form and used alternate submission channels (Google Forms, SmartSupport/SmartSupport GmbH, Conbato or other vendor portals) when the portal was inaccessible.

Apple devices and Activation Lock: agents advised that company iPhones/iPads required the user’s Apple ID to be signed out and activation lock cleared (Apple support article https://support.apple.com/en‑us/109511 was referenced). Returned devices that still presented Activation Lock were typically recorded as scrap unless documented recovery existed (reachable Apple ID credentials, recorded passcode reset, or HR‑approved authorization). Endpoint/MDM teams collected IMEI/serial numbers, looked up devices in Jamf/Apple Business Manager and attempted remote wipes only after device serial numbers and HR authorization per termination agreements. Devices still enrolled in ABM/Jamf or missing IMEI/serial links in MDM were recorded as reprovisioning‑blocked; Macs were removed from management and erased when conversion or reprovisioning required it and manager approval was recorded when removing management to convert devices to personal use.

Escalation, tracking and ownership transfers: lookups in Inventory360, Jamf/ABM, SmartSupport and HR/Workday resolved missing assignment or contact data and identity was verified with HR when records conflicted. Offboarding and account‑suspension workflows were monitored across Inventory360/MEA, Salesforce, CARE, OTKA and telephony systems and Jira automation rules were watched for prematurely auto‑closed offboarding tasks. Vendor delays, incorrect packaging, return emails in spam, and unresponsive refurbishers were escalated to managers and alternate courier or third‑party handling was arranged. When employees sought to keep or accept company hardware, IT accepted transfers only after HR provided a hardware‑takeover letter or equivalent authorization; IT did not draft legal takeover documents. Small devices and accessories found on site were temporarily held by colleagues or secured in server‑room cabinets and missing accessories were logged in asset records.

Source Tickets (220)
4. Offboarding of accounts used by automations (Power Platform / Power Automate impact)
90% confidence
Problem Pattern

Power Automate / Power Platform flows, PowerApps, Microsoft Forms, and related automations lost selectable users or failed when individual user accounts used by those automations were disabled, blocked, or had licenses removed during offboarding. Symptoms included connection errors such as "password incorrect" or "connection expired", flows remaining functional but inaccessible for editing or owner-only actions, Forms and PowerApps not listing departed users for selection, and downstream notification or forwarding failures. Affected systems included Power Automate/Power Platform, PowerApps, Microsoft Forms, SharePoint, Exchange mailboxes, Teams, and downstream systems such as Salesforce.

Solution

Impacted automations were restored by either returning ownership to an active account so the owner could sign in and refresh Power Platform connections, or by replacing departing named users with designated service or shared accounts and adding co-owners and alternate recipient addresses. In several incidents a deactivated or blocked account was re-enabled and its license restored so the account owner could reauthenticate and remove the connection error. In other cases flows and connected Forms were updated to use a service account (for example s.auditcompliance@svc.iu-it.org) and to add co-owners and alternate recipients so email-forwarding and notification workflows continued without interruption. Where Forms ownership transfer was required for continuity, Forms were transferred to the supervisor or to a designated shared mailbox (examples: netzwerk.fkb@iu.org, rc_kulturelle_bildung@iu.org) and public Form links were preserved for the requested period so published links remained functional after the employee’s departure. One incident involved a student-provisioned account that had been incorrectly included in offboarding; re-enabling that account and refreshing its connection removed the immediate errors.

5. Removal of access from AI / model playgrounds (OpenAI IU Playground)
90% confidence
Problem Pattern

Users requested revocation or deletion of access to OpenAI/ChatGPT organizations or other company model playgrounds, often citing identity conflicts between business and personal accounts or that they no longer required access. Users reported inability or unreliable behavior when attempting self-removal from OpenAI/ChatGPT organizations (no error codes) or specified an effective removal date. Affected systems included the target application (OpenAI/ChatGPT IU Org, model playgrounds), identity/identity-management, and the ticketing system.

Solution

Access-removal requests for OpenAI/ChatGPT IU Org or other model playgrounds were handled by application-level administrators or via central identity/identity-management depending on administrative control. When users reported unreliable or failing self-removal from OpenAI/ChatGPT organizations, administrators performed org-level removal to revoke access. Where application teams had direct admin control, accounts were removed or disabled on the requested effective date and the action was recorded; when teams lacked control, users were directed to the application owner or asked to create a Jira Service Management request and the application team completed the removal. Central account deactivation in the identity/identity-management system was used where applicable to revoke access across systems. Teams confirmed that access was no longer possible before marking tickets resolved. Tickets were subject to automatic closure by Automation for Jira after configured inactivity periods.

6. Inventory recording and closure after returned offboarding hardware
93% confidence
Problem Pattern

Offboarding produced uncertainty whether departing users' accounts and cloud resources had been disabled and whether returned devices had been logged in inventory. Symptoms included assets still marked as 'productive' despite missing devices; mismatches between asset tags, procurement/shipment logs and inventory records; missing, delayed, unusable or private-address tracking numbers; absent hand‑in receipts; stale device‑management telemetry (JAMF last check‑in, Windows last logon); duplicate or stale MEA/asset records; and missing documentation about cloud resource access (for example SharePoint) or account deactivation. Affected systems included identity providers (Okta, Azure AD), device management (JAMF, Windows endpoints), inventory/asset systems, carrier tracking and procurement, reception logs, HR contact data and access‑control systems.

Solution

Offboarding reconciliations combined identity deactivation verification with physical asset intake and inventory reconciliation. Accounts for departing users had been disabled in Okta and, where applicable, Azure AD; timing varied (some deactivated on the leave date, others after hardware receipt) and manager or HR confirmations were used when timing differed or suspension dates were requested. When hardware returns were required, staff created carrier return labels and tracking, sent labels/return links to departing employees or designated contacts (corporate or private email when Workday contact data was unreliable), and issued multiple labels when multiple packages were expected. Returned items were accepted via carrier delivery or local hand‑in at staffed reception or IT locations and logged in the inventory system (Inventory360 or equivalent). Where sites were unstaffed, staff arranged presence or routed devices into the refurbisher/Smart Support workflow; returns from unstaffed locations were only accepted when staff arranged shipment to the refurbisher or Smart Support. Devices that had been issued but never put into use were processed back into inventory and routed to Smart Support when specified, with asset tags and PO numbers recorded. Devices sent for reuse were wiped or factory‑reset; Windows 11 primary‑user‑bound units were imaged/fresh‑started during reprovisioning. Offsite refurbisher/Smart Support receipts and tracking were used and units were functionally tested on arrival. When the corporate hardware return web form was incompatible with a browser or when no formal hand‑in ticket existed, staff recorded hand‑ins manually or via alternate intake; device‑management telemetry (JAMF last check‑in timestamps, Windows last‑logon/hardware scan times) and Jira automation due‑date indicators were used as corroborating evidence of return. Discrepancies — missing, delayed or unusable tracking, devices still showing as 'productive', wrong reported locations, duplicate shipments, or items later found locked away — were reconciled by checking local IT hand‑in receipts, inventory history and MEA/asset records, procurement and shipment logs (POs, asset tags, serial numbers), device activation/service history, refurbisher/Smart Support tracking and reception records, and access‑control logs. Duplicate or multiple MEA/asset entries were investigated by matching asset tags and serial numbers to physical devices and consolidating or retiring redundant records. Incidents with inaccessible tracking or evidence of loss/theft were treated as potential loss events and assets were reclassified or retired in inventory with refurbisher, procurement and HR involved for disposition. Tickets were closed after hardware arrival was logged in inventory and account deactivation status in the relevant identity systems was confirmed; however, some tickets recorded hardware return without documenting cloud resource access or account deactivation (for example SharePoint file access), creating an audit/documentation gap that required follow‑up with HR or the access team. Returned asset types explicitly recorded included laptops, monitors, keyboards, mice, headsets (Polycom Blackwire, Jabra models), iPads and Apple Pencil/cases/screen protectors, laptop sleeves, docks, phones, access cards and authentication tokens such as YubiKeys and Kentix tokens, with asset tags or serial numbers logged where available.

7. Offboarding documentation requests for external agencies (Arbeitsbescheinigung to Bundesagentur für Arbeit)
90% confidence
Problem Pattern

Outgoing employees requested that an IU unit or service desk transmit statutory employment certificates (Arbeitsbescheinigung) electronically to the Bundesagentur/Agentur für Arbeit, often by a specified deadline. Requesters sometimes also asked for written confirmation of the transmission and for remaining personnel documents to be mailed. Requesters expected the internal support team to hold or issue these personnel records, but the documents and transmission authority resided with HR; affected systems include HR, internal support/service desk, and the Federal Employment Agency.

Solution

Support reviewed the request and confirmed they did not hold or have access to Arbeitsbescheinigungen or other personnel records and were not the authorized issuer or transmitter. Support informed the requester that HR was the responsible contact and directed them to HR so HR could provide the required Arbeitsbescheinigung and, if needed, transmit it electronically to the Bundesagentur/Agentur für Arbeit, issue written confirmation of transmission, and mail remaining documents. The ticket was closed after redirecting the requester to HR.

Source Tickets (2)
8. Coordinated user account rename after Workday name change (Okta workflow triggers immediately)
90% confidence
Problem Pattern

Workday reported a first/last name change requiring email and username rename; the Okta workflow used for renaming starts the change immediately when the workflow link is clicked. The user was on an older MacBook and requested the rename be delayed until a replacement device arrived to avoid local device issues. Affected systems included Workday, Okta/Okta Workflows, corporate email, Microsoft Teams, Atlassian, and HR records.

Solution

Support prepared the Okta workflow link and provided the Okta user profile link plus a renaming checklist to the requestor, then scheduled a Teams meeting to coordinate execution. The rename was staged to run only after the user's new MacBook arrival to prevent device-side complications; the Okta workflow was used as the execution mechanism and no errors were reported when prepared.

Source Tickets (1)
9. Account registered in external Azure AD tenant prevented Teams sign-in and self-removal
60% confidence
Problem Pattern

A user account was registered in an institution's Office 365 / Azure AD tenant (former student) and the user could not leave the organization or sign in to the intended tenant via Teams. There were no explicit error codes reported; symptoms were inability to self-remove from the external org, persistent org membership when signing into Teams, and license/tenant linkage blocking access to the correct M365 identity.

Solution

The account was removed from the institution's Azure AD tenant by that tenant's administrator and the associated Microsoft 365 licenses were revoked in Azure AD. After the tenant-level removal and license cleanup the account no longer appeared as a member of the external organization and the user could sign out of the wrong org and sign in to the correct tenant in Teams.

Source Tickets (1)
10. Post-exit email forwarding and distribution list cleanup
90% confidence
Problem Pattern

Persistent inbound mail from a departed employee was still being delivered either via mailbox-level forwarding or an active mailbox/license. Affected systems included the user mailbox and Exchange forwarding settings, distribution lists and collaboration groups (e.g., Teams), and identity/license management. Users reported ongoing forwarded messages (examples: system reminders) and administrators sometimes could not locate server-side forwarding rules or delete the account.

Solution

The account was locked/disabled in the identity system and the user was removed from configured distribution lists and collaboration groups (e.g., Teams). Where appropriate, an Exchange mailbox forwarding rule was configured to redirect incoming mail to the nominated recipient. In cases where no server-side forwarding was found and the mailbox could not be deleted, the user's license was removed so the mailbox no longer accepted inbound mail, which stopped further forwarded deliveries (example: Deskbird reminders).

Source Tickets (2)
Back to Summaries
An unhandled error has occurred. Reload X