Onboarding

Identity

55 sections
3760 source tickets

Last synthesized: 2026-02-12 16:45 | Model: gpt-5-mini
Table of Contents

1. macOS OOBE / 'Welcome to International University' login rejection

11 tickets

2. External worker/freelancer account provisioning with scheduled credential delivery

1479 tickets

3. myCampus / Okta login failures and mailbox access for new users

103 tickets

4. Service sign‑in failures due to missing provisioning or identity-source absence

385 tickets

5. Standard new-employee IT provisioning with scheduled credential delivery

1065 tickets

6. OpenAI/ChatGPT onboarding email and missing organization view

62 tickets

7. macOS initial local login failures caused by incorrect keyboard layout masking password input

6 tickets

8. Corporate device Apple ID conflict when personal Apple ID used IU email

9 tickets

9. Onboarding coordination for academic project teaching assignments with past start date

1 tickets

10. Corporate ChatGPT account invitation and access confirmation

61 tickets

11. Workflex onboarding form missing 'TK' (Techniker Krankenkasse) insurer option

1 tickets

12. Academic staff onboarding with multi-system accounts, licenses and macOS hardware shipment

180 tickets

13. Adobe access blocked by personal Adobe ID active in client

7 tickets

14. IU Shop customer account creation blocked by leadership-only access

1 tickets

15. Application access limited to VPN-hosted workstation (OASIS on Walbrook machine)

1 tickets

16. Requesting Salesforce access when app is missing from Software Catalogue

6 tickets

17. Salesforce user account creation for new employee

20 tickets

18. Jira forms not returned by search because form fields weren't indexed

1 tickets

19. Vonage telephony account provisioning and Salesforce record linkage

31 tickets

20. Removing or relocating intranet onboarding pages without changing user permissions

1 tickets

21. Jira access requests showing Automation for Jira approval notifications and short activation delay

30 tickets

22. Invitation-based provisioning for d.velop and Calendly access

40 tickets

23. Power‑user Windows 11 laptop build and shipment for new starter

2 tickets

24. Vendor‑ordered standard new‑hire hardware, peripherals and multi‑app account provisioning

42 tickets

25. Onboarding paused due to incorrect Workday contact and employee location causing hardware hold

7 tickets

26. Accounts‑only onboarding with credentials delivered to private email (no hardware)

24 tickets

27. Hardware ordering and time‑limited credentials for academic starter with FedEx tracking

2 tickets

28. Provisioning Cloudya (nfon), Adobe Cloud and assignment of internal/external phone numbers during onboarding

1 tickets

29. Provisioning standard hardware and enterprise access for external temporary workers

11 tickets

30. Onboarding when corporate mailbox or HR identifiers were missing (credentials sent to personal email or hardware staged for pickup)

30 tickets

31. Slow Eduroam performance at Peninsula House prompting alternate LIBF Wi‑Fi account requests

1 tickets

32. Windows 11 cloud‑native devices shipped without a local user data drive (user expectation/confusion)

1 tickets

33. Requests to create fictitious/test student accounts in myCampus instead of using EPOS enrollment

2 tickets

34. Conversion of external (.ext) IU accounts to internal employee accounts during onboarding

29 tickets

35. Expired or non‑working invitation/password‑creation links for new accounts

26 tickets

36. New‑hire application access gaps and broken service links due to provisioning timing

18 tickets

37. Viewneo subaccount created but no playback content available

2 tickets

38. External LIBFStudy account creation and EPOS teacher account linkage

12 tickets

39. Learninghub Data Privacy module flagged complete but final assessment remains locked

1 tickets

40. Azure AD/device enrollment failure during OOBE with error 801c03ed

5 tickets

41. Onboarding requests submitted using the wrong Jira form (software-order vs onboarding)

3 tickets

42. Requests for externally hosted institutional mail accounts (LIBF) that cannot be provisioned internally

2 tickets

43. Windows OOBE keyboard layout mismatch preventing initial password verification

1 tickets

44. MS365 access for external freelancer required contingent‑worker onboarding form

1 tickets

45. Automated onboarding flows failed to deliver scheduled letters/credentials despite successful runs or expected triggers

2 tickets

46. Approval/approver metadata not propagated in Jira/Atlassian automation causing pending or incorrect account provisioning

7 tickets

47. myCampus / CARE account creation or password‑reset failures due to existing account conflicts or missing notifications

4 tickets

48. Access and provisioning requests submitted outside the formal onboarding ticketing flow were delayed or rejected

2 tickets

49. AD group copy requests that omitted a reference user resulted in default group assignment

5 tickets

50. Windows 11 OOBE blocked by Okta sign‑in during initial provisioning

8 tickets

51. Onboarding handbook PDF with non‑functional links — content owner fix required

1 tickets

52. Onboarding blocked by incomplete delivery address and missing Salesforce reference user

4 tickets

53. Onboarding hardware delivery status and credential/notification receipt for new hires

1 tickets

54. Expired Microsoft 365 activation link causing account lockout

1 tickets

55. OnBoarding portal content not loading for Academic Lecturers (suspected local DNS/blocker)

1 tickets

1. macOS OOBE / 'Welcome to International University' login rejection
90% confidence
Problem Pattern

During macOS out-of-box experience (OOBE) or first-time app access, users experienced authentication failures where macOS Welcome/name or login screens rejected valid credentials without consistent error codes. Symptoms included the federated 'IU Group' sign-in option being absent during initial setup (for example after skipping Location Services), the name field rejecting usernames entered in email format (e.g., including @iu.org), single-app web logins failing while other services worked, device registration failing when the Mac lacked Internet access, MDM enrollment failing when one-time and user-set passwords did not match, and repeated failed logins sometimes prompting a FileVault recovery-key request. Separate post-onboarding symptoms included inability to install Adobe Creative Cloud despite obtaining local admin via IU Self Service.

Solution

Authentication failures during macOS OOBE and first-time app logins were traced to several distinct causes and resolved according to each root cause. Causes and outcomes included:

• Incorrect username format at the OOBE/name prompt: support signed users in with the account’s actual username (not the email-formatted username) and the existing Okta/Microsoft password.

• Accounts provisioned with temporary credentials: support supplied a secure link with the correct username and temporary password; users changed the temporary password at the identity portal (https://identity.iubh.de/service/public/) which allowed device enrollment to complete.

• Federated IU Group option suppressed during initial setup (notably when Location Services had been skipped): returning the Mac to the setup/login screen allowed the IU Group option to appear so users could sign in with institutional credentials and finish OOBE.

• Password-reset and username-format mismatches for CARE/EPOS/myCampus: specialists confirmed CARE passwords matched EPOS/myCampus passwords and supplied the correct CARE username (removing the '@iu.org' suffix where applicable); after using the my.iu.org 'Forgot password' flow or the provided/reset credentials, enrollment and app logins succeeded.

• Device registration failing because the Mac lacked Internet access during the register action: the register step required network access to download device profiles and redirect to the Okta sign-in page; when profile provisioning had already failed and the device was left in a broken setup state, reimaging/reinstalling the Mac and performing a full device setup was used to reapply profiles and re-register to Okta.

• MDM password synchronization requirements: some login failures were caused by the initial one-time password and the user-set password being different; after specialists aligned/synchronized those credentials the MDM accepted the login and the user could sign in.

• Repeated failed login attempts could present a FileVault recovery-key prompt: this symptom was observed during some initial-login failures and was handled as part of the above recovery workflows (recovery-key procedures or reimaging when setup/provisioning was broken).

• Post-onboarding application entitlement/licensing issues: a case was observed where a user who obtained local admin via IU Self Service still could not install Adobe Creative Cloud and received an instruction to contact administrators; that install-blocking symptom appeared related to application licensing/entitlement or management restrictions and no explicit Okta-vs-local authentication resolution was recorded in the ticket.

2. External worker/freelancer account provisioning with scheduled credential delivery
95% confidence
Problem Pattern

Scheduled or bulk provisioning of external/contingent accounts (.ext and Azure AD B2B guest) produced non‑activated, missing, or mistimed SSO and SaaS credentials and welcome/activation tokens. Symptoms included expired, bounced, quarantined, or misdirected activation/password emails (including delivery to incorrect or suspicious private addresses), first‑sign‑in failures (UI errors such as “Anmeldung fehlgeschlagen”, Microsoft messages like “does not exist as a Microsoft account”, or AADSTS90013), approval workflows stuck or auto‑closed, and directory/import corruption (name swaps, duplicates, ignored rows). Affected systems included Okta, Workday imports, Azure AD/B2B, Microsoft 365, Atlassian Cloud, and LMS/MyCampus; delayed license or group propagation caused missing course or project enrolments.

Solution

Technicians resolved repeated bulk and scheduled external/contingent (.ext and Azure AD/B2B guest) provisioning failures by creating and managing accounts through vendor/provider APIs and IU identity/provisioning tools rather than relying solely on spreadsheet bulk imports. Accounts were created with explicit start and term dates so welcome/password‑creation links were generated and delivered to the recorded private email on the correct date; when vendor systems required scoped access, accounts were created with limited scopes and app access was granted through the provider. When activation/password tokens were expired, bounced, quarantined, unusable, or delivered to the wrong address, technicians regenerated Microsoft 365 password‑creation tokens via admin support, resent tokens to alternate verified private addresses, used vendor “forgot password” flows or vendor support when admin resets were rejected, or placed credentials on the IU secrets platform for collaborators without IU‑hosted email. Technicians verified tenant account and license assignment when users reported account‑not‑found or first‑login errors and requested screenshots or alternate sign‑in checks (for example mail.iu.org) to diagnose Microsoft‑account vs tenant sign‑in issues. Okta welcome‑mail failures that prevented password creation were treated as activation‑token failures and triaged alongside other activation‑email issues; user‑side diagnostics (clearing browser cache/cookies, incognito testing) were used when interfaces failed to display expected UI elements. Directory/import errors (firstname/lastname swaps, duplicate or ignored rows, username/email mismatches) were corrected in the authoritative HR/onboarding record or via provider APIs; duplicate or automation‑created erroneous user records were removed and reprovisioned through the correct channel. Approval and contract‑metadata failures were traced to incorrect approver mappings, missing cost‑centre/manager/start‑date fields, duplicate ticket submissions, or lead‑time mismatches; technicians corrected mappings and notification/CC addresses, applied manual approvals or recorded exceptions when source changes lagged, and merged or removed duplicate requests/accounts created by double submissions. Temporary A1 licenses or manual fixes were applied when automation inputs were missing so access was available on start date. Workday↔Okta SSO failures were resolved by ensuring contingent workers were enabled and visible in Okta and by aligning Workday usernames with Okta SSO usernames; problematic import rows were ignored or replaced. Okta and Microsoft 365 last‑login and activation state were used as diagnostic signals to prioritise credential delivery and identify non‑activated users. LMS/MyCampus enrolment gaps caused by missing course/group syncs were handled by restoring or manually assigning the missing membership when automatic syncs had not populated. Atlassian Cloud membership and license propagation delays were monitored and, when automatic membership did not propagate, accounts were added manually to Confluence spaces and Jira projects. Tracking practices captured source spreadsheets as canonical lists and created individual Jira sub‑tasks per external worker to track internalisation, group membership, credential delivery, and verification status; misrouted requests were redirected to the correct external‑user onboarding portal and reprocessed via the proper flow. Where automation‑recorded private emails were incorrect or flagged as suspicious (for example apparent copy/paste errors), technicians verified and corrected the private email with the requester before relying on scheduled token delivery and recorded the verification in the ticket/subtask; tickets that had been closed without documented verification were reprocessed and the corrected contact recorded. Technicians also recorded recurring process constraints observed during provisioning (for example per‑person submission requirements on the freelancer form and missing hardware fields) and documented outcomes in Jira subtasks so activation and credential delivery status was confirmed at ticket closure.

Source Tickets (1479)
3. myCampus / Okta login failures and mailbox access for new users
95% confidence
Problem Pattern

New or recently changed my.iu.org / Okta / Azure AD / Microsoft 365 accounts failed to authenticate or became locked during onboarding. Reported symptoms included persistent Okta MFA/verification/passkey loops that blocked password sign‑in, missing/expired/undelivered activation or password‑reset emails and one‑time links, hardware token (YubiKey/FIDO2) enrollment or authentication failures that prevented workstation or portal access, and SSO or Outlook sign‑in errors despite recent successful log entries. Repeated attempts sometimes caused account lockouts, BitLocker prompts, or cached credential mismatches; short propagation delays after admin resets or password changes produced transient immediate failures. Affected platforms included Okta, my.iu.org, Azure AD/Workday provisioning, Microsoft 365, mobile authenticators, and device enrollments.

Solution

Support restored onboarding and mailbox access by reconciling identity records across Okta, Azure AD/Workday (including AMOS/Workday provisioning) and Microsoft 365, and by completing downstream provisioning tasks. Technicians retriggered or resent activation/verification/password‑reset messages or codes when activation emails or one‑time links were missing, expired, or delivered to alternate addresses; they observed some admin‑initiated password resets did not clear an outstanding activation/MFA prompt. Where Okta was reachable only from a particular device or browser, reachable authenticators (for example Microsoft Authenticator on a personal phone) were used to finish activation and MFA. Technicians provided onboarding instructions for adding an additional MFA factor and recommended using TOTP generators (Okta Verify or TOTP‑compatible apps such as Google Authenticator or FreeOTP) for maximum compatibility; they also noted Windows Hello and Touch ID methods only worked on the device where they were enrolled and that YubiKey/FIDO2 had compatibility limits in some flows. When Workday/AMOS provisioning had not run or extension attributes had not propagated, support corrected identity profiles, set required extension attributes (ea1–ea4 as applicable), created Microsoft 365/student accounts or application assignments directly, provisioned mailboxes, and delivered credentials via Safe; reassigning Microsoft licenses or Okta application tiles restored downstream access after short propagation delays. For hardware token issues technicians provided setup guidance, reconfigured or replaced tokens, and rebuilt or reinstalled devices when faults prevented enrollment or sign‑in. Technicians also verified and corrected Windows 11 group memberships that blocked local sign‑in or hardware‑token authentication; when devices became BitLocker‑locked after repeated sign‑in attempts they used supplied BitLocker recovery keys to unlock devices and completed in‑person or network‑connected provisioning. Staff noted some admin or remote password resets required the device to be on the corporate/CPG network or VPN so cached Windows credentials and downstream access could update. For Apple/iOS enrollments needing Apple ID changes, technicians created or adjusted a private iCloud email for the Apple ID to enable enrollment. For SSO and SaaS integrations support used reference users/profiles to replicate permissions, performed administrative email verification when SSO reported an email as “not verified,” reassigned or manually provisioned mis‑routed application requests, and reactivated accounts where self‑service flows failed. For Cloudya/telephony onboarding support created Cloudya users, assigned site/extensions and external numbers, and resent activation messages. Persistent tile/provisioning/passkey/MFA, license assignment, or hardware errors were escalated to platform owners. Cases often closed after successful sign‑in was recorded in logs.

4. Service sign‑in failures due to missing provisioning or identity-source absence
95% confidence
Problem Pattern

Automated onboarding and first-sign‑in failed when canonical identity attributes, device/computer-account records, site/location attributes, or HR/portal identity exports were missing, malformed, delayed, duplicated, or formatted differently. Symptoms included SSO/portal errors (for example “no active account found for ID <user@domain>”), site‑gated application logins that failed until a location/site was assigned, workstation/domain‑join trust failures (“The security database on the server does not contain a computer account for this workstation trust relationship.”), accounts left in 'Staged' or auto‑created duplicate states, missing AD/AAD/Okta group memberships or Microsoft licenses, delayed or missing welcome/password‑reset messages, OAuth2/MFA or device‑enrollment failures, and missing devices in Intune/SCCM. Affected systems included HR/portal exports (Workday, self‑service portals), identity providers (AD/AAD/Okta/EntraID), device management (Intune/SCCM) and downstream SaaS; non‑employee accounts were frequently delayed when routed to the wrong pipeline.

Solution

Incidents were resolved after missing or incorrect identity attributes, device/computer‑account records, site/location assignments, directory/group records, or HR exports were corrected and vendor propagation windows elapsed. Common remediation actions and observations that restored access included:

• Reference‑account templating and attribute seeding: a designated reference user’s AD/AAD/Okta memberships and canonical attributes were copied or seeded to new accounts so entitlements and admin inheritance became effective.
• Username/UPN/alias reconciliation: HR/portal and directory name‑formatting differences were normalized so Okta/AD produced the expected primary UPN/email and alias mappings, restoring SSO and mail routing.
• Duplicate and placeholder account handling: auto‑created placeholder accounts or numerically suffixed duplicates were detached, merged, or replaced so a single canonical identity existed and conflicting mappings were removed.
• Group, license and resource restoration: required AD/AAD/Okta group memberships, application role mappings and Microsoft licenses were applied or reapplied; after assignment downstream SaaS, printers and document stores returned and targeted deployments completed. Manual assignments were used where automation had not executed.
• Mailbox and password‑reset recovery and interim invites: mailbox provisioning and routing were corrected so welcome and password‑reset emails delivered; where institutional mailboxes were not yet active, alias invites, verified private‑email communications or time‑limited one‑time codes provided interim access.
• Directory, tenant and alias reconciliation: tenant/guest mappings, cross‑tenant discovery and alias/username mappings were retriggered so guest domains, enrollments and searchability returned and downstream permissions matched expectations.
• Local credential and device‑state reconciliation: stale cached Windows/VPN credentials and MDM/state mismatches were cleared; devices were re‑associated, re‑enrolled or reimaged when necessary and cloud credentials, Windows Hello and MFA enrollments were synchronized.
• Device activation and computer‑account recovery: missing or inactive computer accounts and non‑enrolled devices were activated in device‑management or domain systems (often after support obtained device identifiers such as the serial), restoring domain‑join/trust relationships and allowing first‑sign‑in.
• Approval, automation and license replay: stalled onboarding approvals and pending automations were cleared or replayed so imports, license assignments and downstream automations proceeded; some incidents required manual replay when automation had intentionally not executed.
• Ownership and routing clarification for non‑employee accounts: student, vendor and external user requests were redirected to their dedicated pipelines when discovered to avoid assignment delays.
• Interim communications and hardware handling: when provisioning or hardware delivery was delayed, temporary one‑time secrets/codes, start‑date notifications, verified private‑email communications or shipment reconciliations were used to enable initial access or ensure device arrival.
• Portal/website specific syncs: accounts created via self‑service portals sometimes required an explicit directory/tenant sync to become usable for OAuth2/Teams/Copilot flows; technicians synced the account to Microsoft to restore OAuth2 authentication.
• Site/location attribute assignment: site‑gated applications (for example a 'Care' application) required a location/site value in the location‑management system; assigning the correct site restored the user’s ability to sign in.
• Ticketing and verification observations: some users could not open support tickets because the ticketing system’s verification required an active sign‑in; technicians monitored account activity and, when activity appeared, confirmed installations or mailbox access were restored without additional remediation steps.
• Case closures and automation gaps: tickets closed without applying missed automated assignments were recorded as automation gaps and required manual assignment or clarification of intended automation behavior.

Common propagation timings observed: transient failures often cleared after short vendor propagation (~5–10 minutes); profile attribute syncs (for example Workday→Teams) typically propagated in ~1–3 days while some systems required up to one week for full propagation. In many cases a simple retry of first‑login or waiting for propagation succeeded; other cases required explicit activation/creation of the computer account, site assignment, device re‑enrollment, or manual replay of stalled automations.

Source Tickets (385)
5. Standard new-employee IT provisioning with scheduled credential delivery
95% confidence
Problem Pattern

New‑hire and rehire onboarding produced missing, delayed, expired, or misrouted credential deliveries (expired retrieval links, bounces to private addresses, unreadable/blocked attachments, or incorrect scheduled delivery windows). Accounts sometimes arrived without usable sign‑in names, with unexpected username formats from HR/SSO imports, or as multiple distinct accounts per employee across identity domains, and ownership of account‑creation subtasks was unclear. Device enrollment/OOBE failures (Intune AppWorkload.log or Intune Extension errors, Company Portal issues, Okta error 801c03ed, or macOS ABM/JAMF misenrollment) prevented first‑day sign‑in and app installs. Automated provisioning gaps produced absent group memberships, missing licenses, or missing HR identifiers that blocked app access; logistics issues (late/split shipments, wrong delivery addresses, or lack of loaner devices) compounded the impact.

Solution

Intake, ownership and ticketing: Procurement details (POs, approvers, delivery addresses, serial numbers, tracking IDs, Workday/employee IDs) and required account mappings were recorded on intake. Ambiguous or outstanding subtasks were resolved by assigning explicit owners (identity team, endpoint team, local coordinator) in the ticket and timestamping policy exceptions or manual delivery events. Jira automations and due‑date reminders prompted provisioning and escalated procurement, license shortages, or unresolved ownership; ticket states were corrected and login/profile details were explicitly delivered to local coordinators when visibility gaps occurred.

Credential delivery and automated flows: Automated credential dispatch used Okta Workflows with localized HTML templates and was triggered only after final copy and end‑to‑end testing. Expired or missing activation/retrieval links were replaced, reset links were resent and logged, and undeliverable bounces were resolved by correcting addresses and resending. When automation failed or user preference required it, credentials were delivered via admin‑initiated vault recovery (1Password/Safe), verified private addresses, or Microsoft Teams messages; problematic PDF attachments were resent as text‑only when recipients reported unreadable/blocked attachments. SignInLogs were used to confirm authentication failures that traced back to unused or unretrieved credentials. Routine reminders from Automation for Jira to deliver credentials were processed by retrieving credentials and sending them by the preferred channel when due dates were reached.

Account, username, delegated roles and multi‑account mapping: Workday→Okta imports that produced unexpected sign‑in names were accepted for first‑day access and documented; usernames were changed later where required. Where a single employee required multiple distinct accounts across identity domains (for example separate institutional, domain/server, and client‑admin identities), mappings of addresses to target systems were recorded and ownership of each account creation task was assigned in the ticket. Okta admin/delegated accounts (including accounts granted Workday‑Import permission) were created or requested when required to complete imports or delegated tasks; Okta support roles and delegated permissions were assigned and validated by access testing. Missing group memberships or license assignments were mitigated by temporary manual assignments, reference‑user (template) provisioning in directory systems, or by creating additional admin accounts from a reference AD admin user. License shortages were handled by reallocation or procurement escalation and recorded in ticket history.

Device procurement, staging, logistics and interim hardware: Purchase orders and PO numbers were recorded and reconciled in ticket history. Out‑of‑stock or late shipments were mitigated by loaners, alternate SKUs, direct supplier delivery, staged local pickup, or flagged for onsite pickup when lead time required. Power‑user SKUs were flagged to suppliers and staged; accessories (mice, docks, headsets) and third‑party licenses (for example TeamViewer) were requested and tracked. Delivery‑address or cost‑center discrepancies were corrected in ticket records and local coordinators were informed.

Device enrollment, OOBE diagnostics and remediation: Enrollment failures were investigated using Intune diagnostics (AppWorkload.log, Microsoft Intune Extension traces), Company Portal checks and client traces to identify failed in‑setup app downloads, network interruptions, or interfering recovery tools. Enrollment retries were performed on alternate networks (office LAN, Ethernet via dock, mobile hotspot) and recorded; problem devices were reimaged, erased and re‑enrolled when retries failed. Macs with ABM/JAMF misenrollment were erased and reprovisioned or staged for onsite setup; macOS admin‑rights requests were granted or documented when required by role and recorded in provisioning tickets.

Third‑party apps, vaults and service access: Where automated app provisioning failed, reference users and manual account assignments replicated expected access and temporary credentials were provided. 1Password vault access was provisioned for requested vaults (examples: EPOS, MyCampus, Test Accounts). Examples of manual fixes included provisioning Deskbird via the Okta dashboard, granting EPOS access using IU addresses, or triggering Salesforce password resets via internal ticketing. Application assignments for telephony (nFON/Cloudya), EPOS/CARE, myCampus, Salesforce, Confluence, Jira Software and Jira Service Management were documented and tracked per account mapping.

Network and remote‑access diagnostics: Remote access failures were investigated for credential, client and network causes; SSID details, dock/adapter observations and client logs were documented for escalation when VPN or client issues were tied to specific home networks.

Ticket workflow and recordkeeping: Tickets consistently recorded POs, approvers, tracking, delivery addresses, serial numbers, Workday IDs, credential activation/resend events, service‑account names, group membership, license assignments, AppWorkload.log and Intune traces, alternate‑network enrollment retries, Okta error codes (including 801c03ed), JAMF outage notes, SignInLogs where used, macOS admin‑rights requests, pickup or delivery notes, and any policy exceptions. When multiple accounts per employee were required, mapping of each address/account to its target system and the responsible team were recorded in the ticket to avoid ownership gaps.

Source Tickets (1065)
6. OpenAI/ChatGPT onboarding email and missing organization view
95% confidence
Problem Pattern

Institutional OpenAI/ChatGPT onboarding invitations or confirmation emails were not delivered, were delayed, or were filtered to spam; invite links sometimes expired or returned errors such as “Oops. This invite was already accepted.” Accepted invites occasionally produced unusable logins. Some approved users lacked an assigned corporate license and therefore received no usable access. Users sometimes landed in personal accounts or did not see the organization‑scoped UI (no “View organisation” link), saw “not invited to any project,” or were blocked by phone‑number verification. OpenAI does not provide SSO for these accounts, so institution credentials alone did not log users in without a password created via the invite or password‑reset flow.

Solution

Support verified institutional ownership and completed provisioning from the corporate OpenAI admin account. When accounts lacked an assigned corporate license, support assigned or activated the license and reissued invitations; support noted that admin approval did not necessarily equate to license assignment. Missing, delayed, misaddressed, or spam‑filtered invitation and confirmation emails were reissued (often located in Junk/Spam). For expired or invalid invite links (for example, “Oops. This invite was already accepted”), support verified org membership in the OpenAI admin console and had users sign in with their corporate email and use the password‑reset/“Forgot password” flow; when password‑reset or confirmation emails were not delivered after acceptance, support removed the user from the organization and reissued a new invitation, which restored account setup. Support documented that OpenAI did not provide SSO for these accounts; users had to create or set a password via the invite or password‑reset flow (institutional credentials alone did not log them in). When users landed in personal accounts or lacked the organization‑scoped web UI or Playground, support switched the active organization via Group Access or completed the onboarding “Create account” flow to produce the corporate account view. When users saw “not invited to any project” or project‑scoped features produced no responses, support added the user to the appropriate project/team so project features and the Playground returned responses. Support documented that OpenAI’s signup sometimes required phone‑number verification and that supplying a mobile number (for users without a Cloudya number) allowed verification to complete. In some cases support changed the inviter’s role (for example, Owner back to Viewer) and advised using a dedicated service account to send invitations to reduce confusion about which account sent the invite. Requests that produced no invite via the institutional form were forwarded to the specialist provisioning team, which processed them and delivered invitations or manually created accounts (often within about an hour). On request, support created separate corporate OpenAI accounts and delivered credentials; requesters were informed that GPT‑4 API access was gated by an OpenAI waitlist, so newly provisioned corporate accounts could be limited to GPT‑3/GPT‑3.5 until GPT‑4 access was granted. Support re‑triggered invitations when users could not complete signup within the invite validity window and provided links to internal orientation resources (GenAI @IU group homepage and the IU Learning Hub ChatGPT Playground guide). For Learning Path/onboarding e‑learning emails that did not arrive, support checked the Automation for Jira workflow, cleared pending approvals, and observed the onboarding email be delivered.

7. macOS initial local login failures caused by incorrect keyboard layout masking password input
90% confidence
Problem Pattern

New or newly‑provisioned macOS devices rejected local, activation‑code, or Okta sign‑in during initial setup despite users entering the password they had just set. Masked password fields hid character mismatches caused by incorrect keyboard/input layouts (for example Z/Y swapped or US vs German QWERTZ), producing silent authentication failures across activation‑code, FileVault, and Okta stages. Users sometimes could sign into Okta on another device but not on the Mac; repeated failed attempts often caused local accounts to become locked. Onboarding also occasionally involved missing or delayed welcome/activation emails that required resends.

Solution

Initial onboarding and first‑login failures were traced to incorrect macOS keyboard/input layouts that caused typed (masked) passwords to differ from the expected password. Support confirmed or switched the macOS input/keyboard layout (for example German QWERTZ vs US QWERTY), after which typed characters matched and sign‑in succeeded. For activation/Okta onboarding flows support also performed live remediation as needed: resending welcome/activation emails and activation codes, sending Okta password‑reset links, and removing or re‑enrolling MFA; those actions sometimes restored web/phone access but did not always restore local macOS sign‑in. Repeated failed local sign‑in attempts had locked some local accounts; resolving the locked account state alongside input‑layout, activation‑code/MFA, or timezone discrepancies was required in affected cases. Recovery Mode password resets or full OS reinstalls did not restore access when the device remained on the wrong key mapping. When a device had the wrong physical keyboard layout or provisioning issues persisted after remote remediation, the device was replaced (vendor/smart‑support and shipping tracked) and the replacement with the correct layout restored onboarding in those cases.

8. Corporate device Apple ID conflict when personal Apple ID used IU email
91% confidence
Problem Pattern

Users could not create or activate Apple IDs using corporate @iu.org addresses: account-creation and sign-in were rejected with messages such as "This email address is not available. Choose another address." or "You are not allowed to use an IU address." Affected systems included appleid.apple.com, iCloud, Apple Business Manager/Managed Apple IDs, the App Store, MDM/device enrollment, and corporate devices (iPhone, Mac, and Windows laptops), which showed persistent Apple ID prompts, blocked provisioning, or failed device setup. Failures occurred when the organisation address was already tied to an unmanaged personal Apple ID or when the domain had been reserved/used for device enrollment/remote management. Account-creation emails in some incidents contained only a temporary password without a verification link.

Solution

Incidents were resolved by addressing two distinct causes and using alternate Apple IDs when necessary. For addresses already registered as unmanaged personal Apple IDs, users signed into appleid.apple.com and changed the personal Apple ID’s primary email to a personal address (commonly by creating and verifying a free iCloud.com address) so the organisation address became available. IT then created Business/Managed Apple IDs in Apple Business Manager and supplied the email and temporary password; users completed activation in a browser (several incidents produced account-creation emails that contained only the email and a temporary password rather than a verification link). Corporate devices — including iPhones, Macs, and Windows laptops during device setup — required explicit sign-out of the existing personal Apple ID and sign-in with the new Business/Managed Apple ID before provisioning completed. Separately, where the organisation domain was reserved or in use for Remote Management/MDM (preventing creation of an Apple ID using that domain), the immediate workaround was to create or use an alternative Apple ID (for example a personal Gmail address or a free iCloud.com address) to sign in to the App Store or device. Support staff provided hands-on assistance for users who required help changing account emails, performing sign-out/sign-in on devices, or activating Business/Managed Apple IDs. Apple notification emails advising that an IU address could not be used were observed in some cases.

9. Onboarding coordination for academic project teaching assignments with past start date
90% confidence
Problem Pattern

User applied for a teaching position in an academic project whose start date was already in the past and requested guidance on onboarding and assignment coordination; no system errors or credential issues were reported.

Solution

IT support determined that onboarding coordination for academic project appointments was outside IT responsibility. The user was directed to contact their academic contact or their manager/supervisor, who were identified as the parties responsible for coordinating start dates, assignment details and onboarding steps. The ticket was closed after this guidance.

Source Tickets (1)
10. Corporate ChatGPT account invitation and access confirmation
95% confidence
Problem Pattern

Users requesting corporate AI service accounts (ChatGPT/OpenAI, LangSmith, Claude Pro/Anthropic) reported missing, delayed, expired, generic, or misdelivered invitation or activation emails (including delivery to non‑corporate addresses or spam). Time‑limited activation links sometimes expired before users could complete registration. Vendor admin consoles or workspaces showed inconsistent, phantom, or incorrect membership states ('invited', 'pending', 'reader') that blocked provisioning. Users also reported errors during initial signup or first sign‑in (generic error messages) and uncertainty whether to sign in with Okta/SSO versus service‑specific credentials.

Solution

Missing, delayed, expired, or misdelivered corporate AI onboarding invitations were resolved by reissuing valid organization invitations or resending activation/confirmation links when time‑limited links had expired. When invitations repeatedly failed to deliver, administrators sent direct corporate‑email invitations as a fallback and checked spam delivery. Inconsistent, phantom, or incorrect membership entries in vendor admin consoles or workspaces (including workspace‑level services such as LangSmith) were removed or corrected so provisioning could proceed. Stalled internal approval workflows in SharePoint, Learning Hub/Learn365‑Player, Automation for Jira, or Microsoft Forms were completed or approvers were engaged so vendors could issue invitations. For cases where users encountered errors during initial signup or first sign‑in, support initiated password resets when requested and recorded that password resets resolved sign‑up failures in multiple incidents. For bulk or urgent needs, administrators manually provisioned users or centrally added multiple users; complex or remaining cases were escalated to the specialist/provisioning team which created accounts or reissued invitations and supplied registration details. Support confirmed account creation and successful sign‑in before closing tickets when confirmation was available; in some cases tickets were closed after an activation invitation was sent if no follow‑up or error was reported. Confirmations noted corporate plan entitlements where relevant (for example GPT‑4 availability or Plus‑license workspace membership). Support informed users that service sign‑in sometimes used credentials created during registration that could differ from Okta credentials and noted that accessing services via portal.office.com (WebApps) occasionally presented identical credentials.

11. Workflex onboarding form missing 'TK' (Techniker Krankenkasse) insurer option
90% confidence
Problem Pattern

During Workflex (getworkflex.com) onboarding the health-insurance dropdown/search did not show the insurer 'TK' (Techniker Krankenkasse), preventing users from advancing past the insurance selection step. No error codes were reported; the symptom was the absence of the expected insurer option in the form's search/dropdown field.

Solution

Support advised users to enter the insurer's full name "Techniker Krankenkasse" (or its common abbreviation "TK") into the health-insurance search field to reveal and select the option. If the option remained absent, support directed users to contact support@getworkflex.com for assistance. The issue was resolved for the reported user after they typed/selecting "TK" and successfully submitted the form.

Source Tickets (1)
12. Academic staff onboarding with multi-system accounts, licenses and macOS hardware shipment
95% confidence
Problem Pattern

New academic staff frequently authenticated successfully but experienced incomplete or delayed downstream provisioning: mailboxes missing or provisioned late, retained external ('.ext') or duplicate accounts, renamed or mismatched email addresses, absent secondary or cross‑tenant mailboxes, and missing EPOS/CARE/myCampus or Moses roster entries that blocked access to dependent services. Welcome or credential emails were sometimes delivered to incorrect addresses or marked as spam. Hardware delivery, local pickup failures, or insufficient lead time (<10 working days) commonly delayed start dates. Device enrolment interruptions and intermittent background software-install failures on new laptops, and the need for flexible MFA methods and help configuring Teams/Outlook/Okta on personal devices, were additional recurring issues. Instructor/lecturer-specific accounts (for example LIBF/libfstudy or automated 'instructor' IU accounts) were sometimes absent and requesters reported uncertainty about credential ownership and delivery.

Solution

Incomplete academic onboarding was resolved by correcting tenant placement, restoring or creating the correct account and mailbox types, and reestablishing downstream entitlements, group memberships and licensing (Atlassian SSO, Microsoft 365 A5/A1, Adobe CC). Duplicate or retained '.ext' accounts and name collisions were resolved by verifying identity details and creating distinct external addresses where necessary; urgent starters were issued temporary credentials or credentials sent to hiring managers. Workday export errors (for example stray text in exported email fields or incorrect titles) were fixed in the source export and identity attributes so mailboxes and addresses synced correctly. When mailbox provisioning lagged, completing MFA and adding the account in Outlook macOS often triggered mailbox creation. EPOS/CARE/myCampus records and Moses roster visibility were added or corrected; Moses-team coordination restored roster entries where synchronization failed. EPOS/CARE instructor entries were created either by cloning a staff template or by IU support and mapped to libfstudy addresses; LIBF colleagues created libfstudy accounts and delivered credentials via the iu.org address in reported cases. Password-reset and email-delivery failures were resolved by validating account types and mail routing and coordinating with DNS and Auth0/CloudFront owners when authentication/redirect mismatches caused downstream omissions. Third‑party services were either bound to the corporate address or left on the prior sub‑brand and the state was documented for later migration. Procurement and hardware ordering issues were escalated when lead time was insufficient; purchase orders and cost-centres were corrected and vendor orders for standard-imaged laptops, tablets and peripherals were placed or expedited. Carrier tracking, address corrections, reroutes, split shipments and failed deliveries were recorded and retried, reordered, paused or cancelled when start dates changed or hires were withdrawn; satellite‑campus pickup arrangements and in‑transit hardware requests were coordinated with campus teams and asset management. Device enrolment issues were resolved by resuming paused activation flows (activation codes where used) and completing enrollment; intermittent background software-installation errors observed during imaging did not prevent final provisioning after the enrolment was resumed and installers retried. MFA was configured to accommodate user-preferred authenticators (including Google Authenticator) and Okta factors were provisioned as required; guidance was provided and credential delivery timed (or resent to hiring managers) to avoid activation expiry. Staff were assisted with Teams, Outlook and Okta setup on personal tablets and smartphones when requested. Onboarding-form validation edge cases, duplicate requests and data-entry errors were corrected in downstream systems and tickets were consolidated. Automation-for-Jira notifications and vendor tracking were monitored to confirm provisioning and delivery milestones.

Source Tickets (180)
13. Adobe access blocked by personal Adobe ID active in client
90% confidence
Problem Pattern

Users were unable to access vendor web/apps or institutional features because their sessions authenticated into a personal, shared, or alternate SSO identity, or because no institutional vendor license/application had been assigned to their account. Reported symptoms included login failures, “I do not have access” messages, automatic SSO into the wrong institutional account, missing institutional licensing/features (for example inability to use Adobe Acrobat commenting), inability to be added to or merged into the institutional instance, vendor-specific errors when an existing account with the same email blocked onboarding, and MDM/App Store installation errors on managed devices.

Solution

Access failures were resolved by ensuring the active vendor or device session used the institution account rather than a personal, shared, or alternate SSO identity, and by ensuring the user had an institutional vendor account and any required vendor license or application assigned. For Adobe, resolvers signed out of personal Adobe IDs and signed into the institution (work/school) Adobe account which restored institutional licensing and Acrobat/Creative Cloud features. Where a user had no Adobe account or Adobe Cloud application assigned, assigning the user an institutional Acrobat/Creative Cloud license (including fulfilling license-request and manager-approval flows when required) restored commenting and other functionality. When browsers or SSO sessions auto-authenticated into the wrong institutional account, opening an incognito/InPrivate window or signing out of the existing SSO session and signing in with the required institutional identity restored access to onboarding portals and downloads. Where a preexisting personal vendor account could not be linked or merged (for example Calendly), resolvers created a new account on the institutional instance and assigned the user to it; where vendors provided content-transfer tools (for example Canva), administrators invited the user to the institutional team and used the vendor’s content-transfer function to move ownership and content. After SSO rollouts disabled shared accounts (for example Cloudinary), conflicts caused by personal accounts with the same email were resolved by removing or relinquishing the conflicting personal account or changing the personal account email so the organizational account and license could be assigned. On managed mobile devices, required apps were installed from the institution’s Self Service/MDM catalog (for example Google Authenticator); when an app was absent from the catalog, the issue was escalated to the application/catalog team so device installation could proceed.

14. IU Shop customer account creation blocked by leadership-only access
90% confidence
Problem Pattern

Users could not create or log into IU Shop customer accounts to purchase onboarding merchandise; the registration flow required verification tied to a leadership contact and failed to complete, preventing order placement. Affected systems included the IU Shop customer registration system and onboarding purchasing process.

Solution

Investigators confirmed the IU Shop customer accounts were restricted to leadership-managed accounts. The issue was resolved when the employee's manager requested and/or created the customer account through the brand@iu.org contact; after the manager-created account existed the employee was able to log in and place the order.

Source Tickets (1)
15. Application access limited to VPN-hosted workstation (OASIS on Walbrook machine)
90% confidence
Problem Pattern

User reported they could not access OASIS because it was not installed on their IU-managed device and received a message or noted that "doesn’t have OASIS installed." The application was only available on a designated Walbrook-hosted workstation, and the user asked how to reach the computer where OASIS was installed. Affected systems: OASIS, Walbrook VPN, RDP/remote desktop; no error codes were provided.

Solution

Support created the user’s OASIS account and copied a profile from an existing user to the allocated profile on the Walbrook-hosted machine. OASIS was confirmed installed on the designated Walbrook workstation (not on IU-managed endpoints). The user was instructed to connect to the Walbrook VPN and remote (RDP) into the designated Walbrook computer; follow‑up assistance was provided via Microsoft Teams.

Source Tickets (1)
16. Requesting Salesforce access when app is missing from Software Catalogue
90% confidence
Problem Pattern

Requesters could not find required applications in the Software Catalogue or the onboarding application list (for example, GitLab, Salesforce, Connectedware/PMS), preventing access requests via the service portal. Selections on the onboarding form did not always result in expected account provisioning (for example, EPOS/CARE logins were not issued despite being requested). Hardware orders associated with onboarding sometimes lacked delivery dates or tracking and were delayed by vendor stock issues (for example, dealers reporting they were “waiting for Apple”). Affected systems included SaaS applications, the onboarding service desk/form, provisioning systems, and hardware ordering/vendor processes.

Solution

Requesters were asked to submit the standard Software request via the Software - IT Service Portal and to use the portal’s "software not listed" option so requests were routed and an approver could be identified. When a catalogue entry lacked an approver, support added the missing approver to the request so it proceeded through the normal approval workflow. If an application was not managed by IT (for example, Connectedware/PMS), support informed the requester, provided the owning team’s service-desk URL, and closed the IT ticket as Done. Where onboarding form selections did not result in expected accounts (for example, EPOS/CARE), support opened follow-up provisioning tickets and coordinated with the application owner or provisioning team until credentials were issued. Hardware-order problems were handled by liaising with the vendor/ordering team, providing tracking details to the requester when available, and noting vendor-reported delays (for example, stock/backorder messages such as "waiting for Apple") that postponed delivery.

17. Salesforce user account creation for new employee
91% confidence
Problem Pattern

New hires and existing employees reported missing or non-functional Salesforce access and absent entries in the internal SF Dashboard across production and non-production environments. Symptoms included no Salesforce user account visible or listed in the SF Dashboard, inability to authenticate via Okta SSO, missing or unreceived activation/invitation emails, and accounts shown pending/awaiting approval or blocked in Automation for Jira workflows. Users also reported missing integrated-app access (third‑party app licenses) and failed mobile eSIM activations via QR code. Requests sometimes contained incorrect or placeholder email/logins or required separate UAT/Dev requests.

Solution

Service staff provisioned Salesforce user accounts and, when provided a reference user or permission template, replicated the new account’s profile and permissions; Key User permissions were applied when requested. When a designated reference user blocked the Automation for Jira approval workflow or approvals were required, staff substituted a valid reference user or escalated/forwarded the request in the Automation for Jira workflow and obtained approvals before completing provisioning. Where a Salesforce account already existed, staff enabled production access via the Okta Salesforce tile and confirmed activation/invitation emails were sent. Staff corrected typographical errors and replaced incorrect or temporary IU logins, updated user attributes, and reissued activation emails. Non‑production (UAT/Dev) access was handled via a distinct SalesTech Service Desk request. Integrated third‑party app licenses such as Deskbird were assigned by staff; other integrated apps (for example Twilio) were sometimes reachable from the Salesforce Okta tile while Salesforce Marketing Cloud requests were tracked separately. Attempts to activate eSIMs via QR codes sometimes failed; staff requested additional details (QR image, PIN/PUK, profile or article numbers) and left tickets pending or closed them when no further customer response was provided. d-velop invitations were issued when required. Onboarding tickets that included hardware procurement resulted in purchase orders for standard laptops and peripherals, arrangements for delivery or myCampus pickup, and scheduling of credentials to be sent on the employee start date. In cases where frontline support lacked permission to edit the internal SF Dashboard, staff directed requesters to submit the provided Microsoft Forms or routed the request to an authorized admin who completed the dashboard entries. Users were advised to report any missing permissions or settings after access was granted.

18. Jira forms not returned by search because form fields weren't indexed
90% confidence
Problem Pattern

Onboarding/request forms submitted via Jira Forms were not found by standard Jira search (e.g., searching an employee name like "Brian Müller" returned no results). Affected systems: Jira Service Management forms and Automation for Jira. Symptom: form contents and identifying fields were not included in issue summary/header or searchable fields, so they did not appear in search results.

Solution

The issue was resolved by ensuring key form fields were placed into Jira's indexed fields so they became searchable. An Automation for Jira rule was implemented to copy identifying form fields (employee name, employee ID and other key fields) into the issue summary/subject header, and the Jira form configuration was adjusted so those fields were treated as header/searchable fields. After these changes, standard Jira search returned onboarding forms when queried by employee name or ID.

Source Tickets (1)
19. Vonage telephony account provisioning and Salesforce record linkage
92% confidence
Problem Pattern

Requests to provision, restore, or correct employee telephony accounts, mobile subscriptions (eSIM), and linked Salesforce records across Vonage, Cloudya, nfon, Twilio and external mobile providers. Reported symptoms included missing or misassigned provider extensions or caller ID entries, users absent from provider consoles, incorrect account naming or phone-prefixes, orders or workflows stuck in pending approval, and orders awaiting external provider processing or delivery scheduling. Twilio cases sometimes showed no visible errors because Worker accounts were auto-created on first SSO login when the Salesforce "Single Sign On Twilio" permission set existed. Affected systems commonly included provider consoles, Salesforce, and Workday entitlement fields.

Solution

Issues were resolved after confirming the target product (Vonage, Cloudya, nfon, Twilio or external mobile/eSIM provider) and validating the reference configuration visible in the provider console or order system. Where provider accounts or entries were missing, misassigned, or blocked, telephony teams corrected assignments, restored or recreated provider accounts, or selected an alternative reference so the employee appeared in the provider UI. For site moves the user’s site was confirmed and the corresponding Cloudya phone-prefix applied so the user received the correct location-based number. Vonage naming and prefix problems were resolved by standardizing unit/role labels and updating account name prefixes. Pending approval states and provisioning/order approvals (including Workday JobProfil entitlement checks) were reconciled when they delayed activation or vendor order submission. Mobile eSIM orders were handled by obtaining required approval, then sending the automated order to the external provider (for example Conbato / cpg-requests@conbato.de) and the IU mobile orders mailbox (Mobilfunkbestellungen@iu.org), with instructions to send order confirmations and delivery scheduling to the contract holder. Provider account credentials and account metadata were recorded and telephony/mobile records were created or linked to the employee’s Salesforce record; designation/role fields were updated when provided. For Twilio, teams checked the Salesforce permission set "Single Sign On Twilio" and noted Worker accounts were often auto-created on first SSO login; when manual Twilio action was required, specialists performed Caller ID verification with the user and linked or added phone numbers to the Twilio account. Returning employees and reassigned resources were handled by creating new telephony accounts when needed and reassigning previously used email addresses, phone numbers, or extensions so ownership appeared correctly in provider consoles. When provisioning occurred alongside other onboarding systems, IU Safe Portal notifications were sent, the Cloudya client was expected to auto-install on corporate devices, and other accounts (MyCampus, Jira, Deskbird) were enabled in the same workflow. Hardware and software entitlements (laptop, iPad, monitor, docking station, headsets, Adobe Pro, EPOS/CARE references, purchase/serial numbers, shipping info) were ordered and tracked as part of the onboarding package and requesters/users were informed.

20. Removing or relocating intranet onboarding pages without changing user permissions
90% confidence
Problem Pattern

Request to remove or relocate an intranet onboarding page so its content could be taken offline while preserving existing intranet permissions. No error messages were reported; the symptom was the need to decommission onboarding content without revoking or altering users' access to the broader Intranet. Affected systems: Intranet onboarding page and intranet permission model.

Solution

The onboarding page was removed by the designated specialist, allowing the content to be taken offline while leaving existing intranet permissions unchanged. The action achieved the goal of decommissioning the onboarding content without modifying user access rights.

Source Tickets (1)
21. Jira access requests showing Automation for Jira approval notifications and short activation delay
92% confidence
Problem Pattern

Onboarding requests routed through Automation for Jira approval workflows remained in a pending-approval state and generated approval notifications and repeated reminders. In some cases the approval UI did not display an Approve button or approvers did not respond, causing requests to be auto-declined after the 14‑day approval window; provisioning and account creation did not occur until an approver action. New users sometimes did not appear on the provisioning interface while approval was pending. Requests were also delayed or flagged when start or due dates and lead times were invalid, specified reference users could not be located, or request details were incomplete or ambiguous.

Solution

Automation for Jira had been configured to require approvers for selected onboarding, Atlassian‑account, equipment, and temporary external account requests. Tickets entered approval workflows and produced Automation for Jira approval notifications and repeated reminders; when an approver completed the approval the system created the requested Atlassian or external account and downstream onboarding actions executed, with provisioning and access activation observed approximately 5–10 minutes after approval. When approvers did not respond, Automation for Jira sent reminders and, after the 14‑day approval window, automatically marked requests as declined which prevented onboarding actions from completing. On occasions where the approval UI did not display the Approve button, approvers used alternate/manual approval methods or support manually created the user accounts and issued credentials to complete onboarding. Requests were also delayed or flagged because start dates were in the future or invalid, due dates or lead times were too short, reference users could not be located, or request details were incomplete or ambiguous; support requested clarifications, remediated incorrect or duplicate ticket types, corrected reference‑user discrepancies, and recorded cancellations or 'wont‑do' outcomes when hardware or access was later declined. Hardware procurement and technician scheduling were handled separately from account provisioning; in cases where hardware was required support placed the order and confirmed that access credentials would be delivered automatically at the employee start date. Where a direct application entitlement was sufficient, support assigned application access and provided the Okta app URL; application‑specific workflows (for example EPOS) were routed to SelfService.

22. Invitation-based provisioning for d.velop and Calendly access
95% confidence
Problem Pattern

Users could not complete SaaS or onboarding workflows because accounts were missing, inactive, tied to a different sign‑in portal (for example Okta vs Microsoft), or blocked by changed onboarding workflows. Reported symptoms included undelivered activation or first‑login emails, silent or failed password‑reset flows, sign‑in redirects or infinite loops, repeated returns to the email entry screen, onboarding forms creating duplicate accounts, inability to assign seats/licenses, nonfunctional vendor/test SSO accounts, and onboarding requests submitted to external partner portals remaining in an “open” state with only automated acknowledgements and no human response. Affected systems included Atlassian/Confluence, d.velop, Calendly, Jira, Google/Omni, Salesforce, Zoom, Make, vendor storefronts, PMS, and other onboarding-integrated services.

Solution

Support diagnosed access failures by first confirming whether an active account or an outstanding admin invitation existed and by clarifying the correct sign‑in portal (for example Okta vs Microsoft). Where no active account or invitation existed, support created accounts (including Microsoft service and external/test accounts) and reissued activation invitations, monitoring delivery and activation until completion. Licenses, named‑user seats, project roles, group memberships, and cost‑center/chargeback attributes were applied as requested. When onboarding workflows had removed direct invite capability (for example Confluence), license and seat requests were processed through the ticketing system and assigned by IT rather than relying on user‑sent invites. Common resolutions for silent or failed password resets, undelivered invites, and sign‑in redirect loops involved reissuing activation or password‑reset flows, confirming account/invitation state, and coordinating with the owning application team for application‑specific configuration. For automation platforms (Make) seat/license requirements were clarified with Corporate Consulting and onboarding was completed accordingly. Dedicated SSO test or vendor‑facing accounts were provisioned via ticket; requesters opened tickets for external‑employee or test accounts, IT verified and created the accounts, and coordination with the vendor restored test‑side access. Credentials and service‑account secrets were delivered over secure channels (for example 1Password) when applicable, and hardware or procurement actions were initiated for PMS and similar requests. Service accounts followed the svc.* email pattern and credentials were provided to requesters after coordination with relevant application owners. Support also handled cases where onboarding requests were submitted to external partner portals (for example careerpartner.atlassian.net) but remained in an “open” state with only automated acknowledgements and nonresponsive vendor or internal contacts: support confirmed ticket creation in the external portal and escalated or re‑routed the request through internal ticketing when required. Representative outcomes included restoring an institutional Zoom account using Zoom’s “Forgot password” flow; Calendly administrators sending invitations, creating accounts and assigning Teams licenses; Jira named‑user accounts created with Okta‑based first‑time authentication; d.velop and libfstudy accounts provisioned or activation invitations sent and portal ownership clarified; Salesforce and Vonage accounts provisioned with sales group membership and cost‑center attributes; Haufe/Care Academy issues escalated to People Projects when required; Egencia access confirmed through internal account issuance and procurement guidance when applicable; and dedicated IU Shop SSO test accounts created and coordinated with the vendor to restore shop‑side test access.

23. Power‑user Windows 11 laptop build and shipment for new starter
90% confidence
Problem Pattern

Requests to provision and deliver corporate laptops (Windows 11 or macOS) for new starters, often specifying a preconfigured power‑user account and additional hardware such as monitors, docking stations, and peripherals; required applications may be listed. Requests are solely for provisioning and dispatch of equipment or replacement devices; no operational errors or functional symptoms are reported.

Solution

Power‑user onboarding requests were completed by building, verifying and shipping the requested device(s). Windows 11 or macOS was installed and validated and the requested power‑user account/configuration was applied. Required peripherals and accessories (for example: monitor, docking station, mouse, keyboard, wired headset) were included or recorded, and listed applications (for example: EPOS/CARE, myCampus, Confluence, Jira Software) were provisioned as requested. Device hardware was confirmed against the ticket, device serial number(s) were recorded, and acceptance of replacement devices from stock was noted when applicable. Devices were boxed and dispatched with shipping recorded in ticket comments, access credentials were scheduled or delivered, and the ticket was closed with shipment/status recorded.

Source Tickets (2)
24. Vendor‑ordered standard new‑hire hardware, peripherals and multi‑app account provisioning
93% confidence
Problem Pattern

Vendor‑ordered new‑hire hardware and peripherals were frequently delayed, partially delivered, misdelivered, or reported undeliverable; shipment tracking was often missing or inaccurate and multi‑package or wrong‑address deliveries caused failed or incomplete deliveries. Cross‑border shipments were held for VAT/import duties with courier tracking showing 'outstanding payment' or import charges. Identity and application provisioning failed when HR/source‑data errors or identity‑sync issues (Workday/Okta/Salesforce/Azure) prevented account creation, produced missing apps in Azure MyApps, or caused failed first sign‑ins and password resets. Mobile service procurement (for example UK eSIMs) lacked documented ordering processes and often required handset make/model details and vendor quotes before orders could be placed. Peripheral compatibility problems (for example docking stations lacking the ports required by a user’s monitors) and unclear campus‑routing caused additional onboarding delays and missing functionality for new starters.

Solution

Vendor shipments were tracked and managed with suppliers and logistics partners; vendors were asked for dispatch confirmations and tracking updates and tracking information was shared with requesters and recipients. Missing, partially delivered, or misdelivered items were escalated to suppliers and re‑ordered or express re‑shipped when necessary; multi‑package deliveries were reconciled and outstanding peripherals were re‑shipped or shipped separately. Cross‑border customs and duty issues were chased with couriers and customs authorities; in at least one case the courier was instructed to pay import duty on behalf of the employer to prevent the recipient being billed and delivery was subsequently confirmed. Where delivery to a campus or private address was problematic, orders were redirected to confirmed campus pickup points or private addresses were used after confirmation; campus‑routing ambiguity was clarified with local contacts. Hardware lead‑time expectations (approximately four weeks for standard orders) were communicated to requesters so equipment could arrive by start date. Peripheral compatibility issues were identified (for example docking stations with only one HDMI + one DisplayPort vs users with two HDMI monitors) and resolved by arranging compatible replacements, alternative cabling advice, or separate shipments of the required peripherals. Faulty devices were troubleshot remotely (resets, remote assistance, first‑login and password support) and replaced when defective. Account and multi‑application provisioning used template profiles; corrective actions included fixing identity sync and HR/source‑data errors (for example Workday/Okta mappings, job‑title or reference‑user corrections), enabling missing apps in Azure MyApps, and creating accounts so cloud apps (Salesforce, Jira, Deskbird, Office365) appeared. Credentials were delivered to IU mailboxes or to private emails when requested. Telephony integrations and WLAN access for campus locations were arranged on request; UK eSIM procurement was handled with the mobile provider (Global4) and required handset make/model details and a vendor quote before ordering, so quotes were requested after handset details were provided. It was documented when third‑party AI services required separate end‑user applications (for example ChatGPT/Copilot). Tickets were closed after order placement and tracking confirmation or when credentials/provisioning had been delivered and validated against the start date.

25. Onboarding paused due to incorrect Workday contact and employee location causing hardware hold
90% confidence
Problem Pattern

Onboarding provisioning and hardware assignment were blocked when an employee's HR/Workday record was missing, had incorrect or misspelled private/personal email or phone number, or showed a 'Not on interface' / absent status on the Workday→Okta provisioning interface. Existing external accounts using a different email prevented federated linking or required reactivation and user confirmation. Pending onboarding approvals or incomplete HR paperwork caused users to be absent from provisioning tools. Ambiguous employer affiliation (for example, which legal entity supplies hardware) or mismatched shipping/contact details delayed hardware orders and caused shipments to be held.

Solution

Onboarding and hardware holds were resolved after HR contact and ownership details were corrected and reconciled. Teams updated Workday records (private/personal email and phone) and resolved spelling discrepancies by confirming addresses and numbers with the employee; once the HR record surfaced on the Workday→Okta provisioning interface the user was imported into Okta and accounts were created. Where existing external accounts used a different email address those accounts were reactivated and the user confirmed the email change before federated linking. Pending onboarding approvals or incomplete HR paperwork were completed and recorded so the record appeared in the onboarding tool and provisioning resumed. Employer affiliation (which legal entity supplies hardware) and a shipping reference user/manager were clarified to determine procurement and delivery ownership; after recipient, shipping address, phone, delivery window and inventory/asset assignments aligned hardware was ordered. For urgent start dates teams arranged expedited shipment or local pickup as required, sent tracking details when items shipped, and provisioned devices to stated OS requirements. MFA/authenticator needs were confirmed and either configured on the device or provided to the user as part of account activation; login credentials and access details were sent automatically at account activation or on the user's start date.

26. Accounts‑only onboarding with credentials delivered to private email (no hardware)
95% confidence
Problem Pattern

New starters and external users reported they had no corporate account or could not sign in to corporate services on their first day and requested IT create accounts and grant access while they had no corporate hardware. Requesters routinely asked that initial login credentials or scheduled password‑reset links be sent to a private/personal email address. Affected systems commonly included corporate email/Outlook, Okta, Workday, IT Service Portal, Atlassian (Jira/Confluence), 1Password, myCampus, Salesforce, telephony (nfon/Cloudya) and EPOS/CARE.

Solution

Onboarding requests were processed through the IT Service Portal (Jira Service Management). IT created the requested corporate accounts and provisioned application access for users without corporate hardware, commonly including a corporate email account, Workday access, IT Service Portal access and requested third‑party/internal application accounts (observed examples: Atlassian/Jira/Confluence, 1Password, myCampus, nfon/Cloudya telephony, EPOS/CARE, Salesforce, OTRS). Initial login credentials or scheduled password‑reset links were delivered to the private/personal email address supplied by the new starter or to the requester. Automated workflows (Automation for Jira and API calls) were used to generate provisioning notifications and to schedule password‑reset links to be sent to the user’s private email on their start date. In cases where users reported sign‑in failures (examples: Outlook, Okta), IT regenerated credentials and sent them to the private email and attempted follow‑up contact; when users did not respond, tickets were sometimes closed as unresolved/unconfirmed after repeated contact attempts.

27. Hardware ordering and time‑limited credentials for academic starter with FedEx tracking
90% confidence
Problem Pattern

New academic starter requested standard laptop and peripherals and user accounts. The starter was unavailable for the scheduled hardware delivery and requested shipment be postponed; later they reported not receiving hardware and were unsure whether delivery had occurred. FedEx shipping/tracking notifications were sent to a private email address. No software error messages were reported; affected systems included hardware delivery/shipping and user provisioning.

Solution

User accounts were created and time-limited credentials (14‑day validity) were delivered to the private email address supplied. The hardware order (laptop, docking station and additional peripherals such as monitor and headset) was placed and FedEx tracking was used. A requested delivery hold/postponement was recorded and shipment was scheduled after the specified week; however, vendor pallets were dispatched and FedEx sent tracking/notification emails to the employee’s private address, which led to uncertainty when the employee reported not having received the hardware. Delivery status and tracking notifications were reconciled with the employee and the private-email delivery of credentials was confirmed.

Source Tickets (2)
28. Provisioning Cloudya (nfon), Adobe Cloud and assignment of internal/external phone numbers during onboarding
95% confidence
Problem Pattern

New-starter required Cloudya telephony, Adobe Cloud access via Company Portal, Windows workstation and hardware. Credentials and portal access needed delivery to a private email; telephone numbers needed assignment (internal and external). No system errors were reported.

Solution

Accounts for Cloudya and Adobe Cloud were created and made available in the Company Portal; the Cloudya username was set to the employee's email. Hardware was ordered. Internal and external telephone numbers were assigned (internal 4456 and external +4940284683556) and the access credentials were sent to the private email address provided.

Source Tickets (1)
29. Provisioning standard hardware and enterprise access for external temporary workers
91% confidence
Problem Pattern

External temporary workers experienced missing or not-yet-provisioned external IU accounts or delayed/absent credentials that prevented access to Microsoft 365 services (Office WebApps, Exchange shared mailboxes, Teams, Outlook, SharePoint). They also reported missing application-specific access or licenses (CARE, myCampus, Salesforce, PowerApp, EPOS, Adobe Acrobat) and occasional errors or blank pages when opening those applications. Hardware procurement or PC imaging/build issues sometimes caused multi-day delays to workstation delivery and use; requests frequently lacked procurement/PO numbers, delivery addresses/tracking details, or clear program-level access instructions for contingent accounts.

Solution

Provisioning followed standard IT procurement and ordering workflows and contingent-worker requests were processed via the Manage Contingent Worker Account where applicable. External IU accounts were created using the firstname.lastname.ext@iu.org convention; account notification and password-reset emails were sent to the contractor’s private email and scheduled to coincide with the start date. Application- and program-level accesses were granted and licenses assigned as requested (examples observed: CARE, myCampus, Salesforce, PowerApp, EPOS, Adobe Acrobat Pro DC); in one case Adobe was assigned and the user was instructed to download and sign in using the IU email address. Exchange/shared-mailbox access and distribution-list membership were applied where required and Microsoft 365 service access (Office WebApps via portal.office.com, Teams, Outlook, SharePoint) was confirmed; Azure AD provisioning logs were retained. Standard-user Windows devices (commonly Lenovo laptops) and peripherals were procured, serial numbers were recorded, and equipment was prepared and shipped to the supplied private or internal delivery addresses; carriers used included TNT and DHL and shipping confirmations/tracking numbers were recorded in the ticketing system. International shipments sometimes incurred additional transit delays. In some cases workstation/PC builds failed or encountered unspecified technical issues that caused multi-day delays; those incidents required extended troubleshooting and collaboration with regional colleagues (for example, Canterbury teams) before the computer build was completed and the account fully provisioned. Cloudya phone numbers were provisioned when requested. Several tickets lacked detailed error messages or technical logs, so recorded resolutions concentrated on account creation, license assignment, access grants, hardware procurement records, and noting when hardware-build troubleshooting delayed readiness.

30. Onboarding when corporate mailbox or HR identifiers were missing (credentials sent to personal email or hardware staged for pickup)
88% confidence
Problem Pattern

Onboarding produced missing, inactive, placeholder, incorrect, or duplicated corporate or student mailboxes and personnel/applicant IDs that prevented complete account provisioning and caused directory‑visibility or authentication failures. Symptoms included inability to complete password‑reset or activation flows because verification codes were delivered to inaccessible mailboxes, temporary passwords that allowed sign‑in on one device but not others, repeated SSO/third‑party credential prompts (for example EBSCO), placeholder or wrong personnel/applicant IDs, and authentication errors such as Windows/Okta/VPN codes (for example 782 and 691). Affected systems included Active Directory/EntraID, IU‑Mail/myCampus and student mailboxes, EPOS/CARE, Salesforce, Jira, Parallels, PowerBI, telephony platforms, SSO, device provisioning, and downstream directory/ intranet employee listings when HR/Workday feeds failed to populate them.

Solution

When HR records or the integration feed were missing, incorrect, or duplicated, the correct personnel/applicant number was requested from HR/Academy and the user import retried; provisioning resumed and was reconciled after the source‑system update. Where automated provisioning could not wait for final HR identifiers, accounts were created from available identity data with a placeholder employee ID (for example 000000); Active Directory and EPOS/CARE entries were adjusted and licenses were assigned. When the corporate mailbox or private‑email entry was incorrect or inactive, records were corrected and initial credentials were issued immediately; credential emails were sent to the user’s personal email when required and corrected private‑email entries were propagated to Workday so credential messages could be resent. Authentication failures (including Windows/MS Office sign‑on, Okta and VPN failures with error codes 782 and 691) were resolved by reissuing credentials or resetting passwords and confirming server‑side access (for example via Outlook Web App) before closing the record. Duplicate or secondary records (for example separate BD vs ND records, mismatched academy IDs, or an existing student account at a different domain) were escalated to HR/Academy for reconciliation and the correct mailbox/personnel ID was assigned to the active record. Returned‑to‑sender or wrongly‑delivered hardware was corrected by updating addresses and re‑dispatching shipments or staging devices for pickup; delivery and tracking details were recorded in asset management. Authenticator hardware (including YubiKey), Okta registration assistance, and Windows/image coordination for OS images and Windows‑dependent applications (for example Parallels Desktop, PowerBI Pro) were provided as required. For local or non‑Workday numbering systems (for example LIBF), Customer Services allocated the employee number after receiving the new worker’s full name and email address and confirmed the allocation so provisioning could continue. Student‑specific onboarding issues included accounts whose usernames pointed to study mailboxes the student had not been told about; those incidents were routed to student support, where technicians created or activated the student mailbox or, when immediate access was required, issued initial or temporary credentials to the student’s personal email and completed activation so SSO/EntraID tokens refreshed. Temporary passwords that permitted sign‑in on a single device while other devices and SSO‑integrated services repeatedly prompted were resolved by completing the first‑login/reset cycle, reissuing credentials where necessary, and ensuring SSO tokens and cached credentials refreshed so downstream services reauthenticated. When missing mailbox or directory details were later provided, technicians created or activated the mailbox, notified the manager that credentials had been issued, and noted that the account would appear in the global address list or intranet employee listing after directory/GAL/Workday sync completed. Cases where users were absent from the intranet employee overview were handled via HR/Workday updates or regional administrative inclusion requests; support directed users to regional administrative leadership or to submit a Workday change and closure occurred after HR/Workday populated the downstream directory. Some records remained open when users did not complete password resets or first‑login steps and were documented accordingly.

31. Slow Eduroam performance at Peninsula House prompting alternate LIBF Wi‑Fi account requests
90% confidence
Problem Pattern

Users at Peninsula House reported very slow Eduroam wireless throughput (about 10 Mbps) with no error codes and requested LIBF Employee Wifi account creation as an alternative. Affected systems included Eduroam, the local wireless infrastructure, and the LIBF Employee Wifi service; multiple staff were impacted and reported degraded network performance onsite.

Solution

The network team increased Eduroam throughput at the Peninsula House site from 10 Mbps to 50 Mbps to improve onsite performance. Users were informed of the change and asked to report if slow connectivity persisted. The ticket was closed after the throughput was raised rather than provisioning alternate LIBF accounts.

Source Tickets (1)
32. Windows 11 cloud‑native devices shipped without a local user data drive (user expectation/confusion)
90% confidence
Problem Pattern

New Windows 11 corporate devices were provisioned in a cloud‑native posture without a local user data drive. Users — particularly new academic staff — expected a visible local drive for storing files and reported confusion about where to save data. Affected systems included Windows 11 client devices and cloud storage services (OneDrive personal and team).

Solution

A prepared and approved notification text was produced to explain the Windows 11 provisioning policy. The notification stated that corporate Windows 11 devices were provided without an automatically mounted local data drive and recommended using existing cloud storage options (Personal OneDrive or Team OneDrive) for user data. The message also specified that if a local drive was required it had to be requested through the IT Service Portal and clarified that locally attached drives were not backed up or supported by central IT.

Source Tickets (1)
33. Requests to create fictitious/test student accounts in myCampus instead of using EPOS enrollment
85% confidence
Problem Pattern

Requesters asked support to create fictitious/test user accounts — including student enrollments and institutional lecturer email accounts (for example @iu.org or libfstudy.ac.uk) — for use in myCampus (Course Feed) and other end-to-end tests. Tickets typically provided desired account details (Care ID or specific address) and reported the absence of the required account or no confirmation that it had been created, rather than an explicit error. Requests assumed support would provision fully provisioned institutional accounts needed for Course Feed and cross-system testing.

Solution

Support clarified that creation of test or fictitious accounts and institution-specific email addresses was not performed directly through the general support ticket. Student test identities were provisioned via the EPOS enrollment system, while institutional email addresses (for IU or LIBF domains) were provisioned through the central account/email provisioning processes or via the KM/account teams. Requesters had supplied Care IDs or desired addresses and noted that external Gmail accounts were technically unsuitable for Course Feed integration; those account requests were not completed in the support ticket and were closed as 'Won't Do' or marked obsolete when the requester did not pursue the official provisioning channels.

Source Tickets (2)
34. Conversion of external (.ext) IU accounts to internal employee accounts during onboarding
94% confidence
Problem Pattern

External (.ext), cloud‑only or legacy on‑prem AD objects and single‑profile identity policies caused HR/Workday imports or provisioning flows to match incoming records to existing external accounts instead of creating internal AD/Azure identities. Symptoms included users arriving with .ext or wrong‑domain addresses, missing or hidden entries in identity‑sync/provisioning interfaces, Okta import conflict markers or missing Approve controls, and Workday‑Okta interface matches that prevented AD account creation. Additional indicators included duplicate or deactivated AD/Azure entries and Exchange/GAL/address‑book collisions. Downstream impacts were missing licenses, group memberships or roles, hardware/telephony/mail routing errors, and blocked issuance of required role‑specific institutional emails.

Solution

External, cloud‑only and legacy on‑prem AD records were consolidated into standard internal identities by converting external sign‑ins to firstname.lastname@iu.org primary addresses and preparing importable records for identity‑sync/DS. Legacy on‑prem objects were reactivated, renamed or flagged so identity‑sync could reconcile them; duplicate accounts created by imports were removed or merged and the correct account was selected as primary. Okta import conflicts and missing Approve controls were cleared by removing import conflict markers and completing approvals or reinitializing Okta/AD accounts to restore visibility on the provisioning/import interface. In at least one case the Workday‑Okta interface was inspected and the incoming Workday record was confirmed to have matched an existing .ext account, explaining why a new AD account had not been created; records were reconciled so the correct internal account could be provisioned. Exchange/GAL/address‑book collisions were resolved by renaming or removing conflicting address records so mailboxes and GAL entries no longer blocked provisioning. Entitlements, group memberships and licenses (examples: Office 365 Desktop A5, Atlassian SSO, Learning Hub/LMS, myCampus/Care, EPOS, Adobe Creative Cloud, Windows/Teams groups and Salesforce roles) were reconciled and reprovisioned and application‑level role parity was verified and corrected. Corporate telephony numbers were assigned and hardware (Windows laptops, Dell notebooks, macOS devices and peripherals) was ordered and shipped under recorded purchase orders; missing or empty package contents were investigated and claims or replacements were coordinated. macOS devices were reset/reimaged and joined to the directory when applicable. MFA/authenticator setup guidance and account access details were delivered to alternate/private emails only when required, and password‑reset messages scheduled to private addresses were reassigned or withheld once accounts were internalized. Cutover dates and welcome‑mail timing were coordinated to avoid confusion. Jira automation and onboarding tracking managed due dates, hardware inventory, reprovisioning tasks and shipping status throughout the process. Where onboarding rules had enforced a single profile and blocked issuance of role‑specific institutional emails (for example iu‑study.org student addresses when a user already had an iu‑akademie address), required domain‑specific student addresses were provisioned as secondary aliases or as a dedicated mailbox/profile mapped to the same internal identity; import preparations were updated to detect existing iu‑akademie addresses and prepare iu‑study.org aliases or manual exceptions, and student support was engaged to complete registrations that required manual intervention.

35. Expired or non‑working invitation/password‑creation links for new accounts
92% confidence
Problem Pattern

Time‑limited or system‑generated activation/registration/password‑creation links or activation codes were expired or not delivered, producing 'expired', 'not found', or non‑delivery symptoms that prevented initial account setup and first sign‑in. Affected systems included SSO/Okta, Microsoft 365/Office.com, Salesforce, myCampus/mylibf, Nfon/Cloudya, Google/Gmail and other service‑specific platforms. Failures occurred both when users missed short validity windows or interrupted required MFA during initial setup and when activation‑code/email/SMS delivery integrations were failing. Some users could not open support tickets because their accounts were not yet active.

Solution

Support reprovisioned accounts or regenerated time‑limited activation/registration/password‑reset links so users could complete initial account setup. Administrators used Okta password‑reset actions and Okta Workflows to produce new initial sign‑in links or temporary passwords; an Okta‑initiated password reset produced a new Microsoft 365 password‑creation link when an earlier link had expired, and technicians issued password‑setup emails and completed required MFA setup guidance for Office.com sign‑in. For Salesforce, administrators sometimes cloned an existing user/profile and triggered a Salesforce password reset (reset links were often time‑limited, e.g., ~24 hours). When users could not access the support portal because accounts were not yet active, support sent password‑reset emails or temporary passwords to an external email address or phone and provided sign‑in instructions. Support recommended signing in through SSO entry points (for example the intranet or the Okta dashboard) when direct links had expired and clarified system‑specific username formats (for example myCampus short usernames vs Office 365 email addresses and external‑instructor '.ext' addresses), noting that passwords were not shared across systems. Where activation codes were not delivered due to an integration/delivery‑layer fault (for example mylibf), IT diagnosed and repaired the integration so codes became deliverable again; affected users were advised to reattempt activation after the fix. For other service‑specific cases (for example Nfon/Cloudya), support resent access/activation links. Accounts managed outside central IT (for example external Gmail) were referred to the provisioning owner.

36. New‑hire application access gaps and broken service links due to provisioning timing
87% confidence
Problem Pattern

New hires and newly created accounts were unable to access onboarding applications, devices, or service links immediately after account creation due to provisioning and downstream propagation delays. Symptoms included missing Okta applications, inability to sign into Microsoft 365/Outlook (sometimes with Office repeatedly prompting for a product key or reporting messages such as 'Uni‑Konto abgelaufen ist'), Teams or other services available while Exchange/Office access failed, Workday‑linked services remaining inaccessible until HR activated the Workday profile, downstream services (for example Egencia) taking one to four days to provision, Windows 11 OOBE PIN setup stalling during app provisioning, and device activation steps in the IT onboarding portal failing or rejecting error submissions without producing error codes.

Solution

Support validated that affected accounts and application assignments existed in identity systems and found most access failures correlated with provisioning timing and downstream propagation. In many incidents services became available after identity propagation or when asynchronous downstream synchronizations finished; Twilio and Calendly links commonly became functional when rechecked, and Egencia activations were observed to complete asynchronously — frequently within 1–3 days but sometimes taking up to 4 days. Workday‑linked services were confirmed provisioned by IT but commonly remained inaccessible until HR activated the Workday profile. For Windows 11 OOBE cases logs showed PIN setup sometimes stalled while Company Portal and other management apps had already been installed but were not immediately visible; users located Company Portal via search and proceeded to install Office 365/Teams/Zoom. Support provided device re‑setup guidance, Company Portal install information, and observed that app provisioning and installs could take up to about two hours and were more reliable over a wired LAN connection. VPN and replacement laptop setup issues were handled through the same device re‑setup and Company Portal workflow; where failures were caused by provisioning, access became available after propagation and retrying. For travel-related activation delays that could not be expedited, users were directed to einkauf@iu.org. A subset of cases involved the IT onboarding portal failing to complete the device activation step or failing to accept error submissions without producing error codes; these incidents were recorded but frequently lacked detailed remediation steps in the ticket thread. A recorded replacement‑laptop case documented Office repeatedly prompting for a product key and Outlook reporting 'Uni‑Konto abgelaufen ist' while Teams continued to function; that ticket did not include a final resolution. Overall, most observed access failures resolved after identity/ licensing propagation or completion of asynchronous downstream syncs.

37. Viewneo subaccount created but no playback content available
90% confidence
Problem Pattern

A Viewneo account or subaccount was provisioned and reported active (credentials and/or licenses present) but the instance contained no playlists or media items, causing blank or idle players at the site. No authentication errors or player connectivity faults were reported; the user-visible symptom was missing playback content.

Solution

Provisioning tasks for Viewneo accounts/subaccounts were completed but content availability was handled locally. For the Freiburg site a subaccount was created and the provisioning task was confirmed complete; investigation showed the account had no uploaded playlists or media items, which caused the absence of playback. Content responsibility was assigned to the Freiburg local contact and account credentials plus usage tutorials were prepared and handed over. For Bonn the account s.viewneo-bonn@iu.org was created and two licenses were assigned; the ticket recorded the provisioning as completed with no further actions documented.

Source Tickets (2)
38. External LIBFStudy account creation and EPOS teacher account linkage
91% confidence
Problem Pattern

External staff or newly provisioned LIBF users lacked appropriate LIBF tenant accounts or provisioning, causing sign‑in and service access failures across EPOS, CARE, myCampus and VLEs. Common symptoms included SSO failures or unexpected MFA/authenticator prompts blocking sign‑in, missing or unprovisioned Exchange mailboxes so password‑reset emails did not arrive, missing Oasis contact records or LIBF Numbers that prevented Brightspace/myCampus enrolment, and inability to assign tasks or grant roles because accounts or licences were not created or linked.

Solution

Support confirmed the correct LIBF tenant/domain and approver with stakeholders and provisioned the required accounts and service records in the appropriate LIBF tenant. For students and Handshake workflows accounts were issued in LIBF’s Microsoft student tenant (name.lastname@libfstudy.ac.uk); apprentices or cohort workflows used LIBF’s Google tenant and tester-account spreadsheets were shared with stakeholders. EPOS teacher records and CARE access were created where required (including for external domains such as walbrook-study) so staff could be assigned tasks. For Brightspace/myCampus access support ensured an Oasis contact record and LIBF Number existed and that student registrations/subscriptions were present before granting access. Where users were blocked by unexpected MFA/Authenticator prompts or did not receive password‑reset emails in the LIBF mailbox, support coordinated with LIBF tenant administrators and the IU identity team to remove or reset authenticator registrations and to confirm Exchange mailbox provisioning/activation before retriggering password resets. Where existing external licences or accounts (for example Zoom) needed reassignment, support transferred licences/accounts to the new LIBF account and triggered activation. Account credentials and login details were delivered to the user’s iu.org email or, when necessary, to requesters via IUsafe secure email. Requests that required actions outside tenant/account creation (for example laptop provisioning, device/mobile telephony, shared‑mailbox OASIS/profile replication, or SharePoint site‑owner permission grants) were forwarded to the relevant specialist teams. Support also requested missing user provisioning details (full name and contact details) when initial requests lacked them.

39. Learninghub Data Privacy module flagged complete but final assessment remains locked
90% confidence
Problem Pattern

In Get Started@IU (Learninghub), the 'Data Breaches' or Data Privacy module displayed as completed after reading content but the platform still prevented starting the final test, reporting the module as not completed and blocking completion of onboarding. Issue occurred in web browsers with no explicit error codes shown.

Solution

The issue was resolved after the user's browser history and cookies were cleared and the browser was restarted; the module state updated and the final assessment became available. Where the problem persisted beyond a cache/cookie clear and restart, the case was escalated to people-projects@iu.org for further investigation.

Source Tickets (1)
40. Azure AD/device enrollment failure during OOBE with error 801c03ed
90% confidence
Problem Pattern

New or replacement Windows devices failed to complete first-time sign-in/OOBE with error code 801c03ed and an accompanying message about an administrator policy restriction. The failure occurred during OOBE/first-sign-in while attempting device join/enrollment, preventing access to corporate services. Affected devices were corporate laptops undergoing initial provisioning in environments using Azure AD or federated identity providers (for example, Okta).

Solution

The failures were traced to an enrollment/policy configuration issue on the identity backend (Azure AD or a federated identity provider such as Okta). The incidents were resolved by applying a server-side change to the identity/enrollment configuration; after the backend policy change propagated (typically within minutes), affected devices that retried initial sign-in completed the device join/OOBE process successfully. In at least one case an end user retried sign-in during support contact and setup completed immediately; support guidance in another ticket noted sign-in became possible after a short propagation delay (~5–15 minutes).

41. Onboarding requests submitted using the wrong Jira form (software-order vs onboarding)
95% confidence
Problem Pattern

Onboarding, credential‑provisioning, or initial‑equipment/access requests were submitted using incorrect or non‑onboarding Jira forms (e.g., software‑order, initial‑equipment/new‑employee, or localized forms) or were raised for users who already had accounts. Those tickets did not trigger automated myCampus or Microsoft 365 provisioning, often showed Automation for Jira approver/waiting‑for‑approval messages, appeared stuck, or were auto‑closed after inactivity (for example, Automation for Jira closing after 14 days with resolution 'Done'). The symptoms affected Jira Service Management workflows and risked duplicate requests and disruption of automated provisioning and approval processes.

Solution

Support reviewed each ticket and determined requests created on non‑onboarding or incorrect Jira forms could not be converted into onboarding/employee‑starter requests and therefore did not trigger automated myCampus or Microsoft 365 provisioning. Requesters were informed that initial‑equipment/access tickets must not be created for existing employees and were given the correct onboarding or access‑request form link in the IT Service Portal (for example, the Mitarbeitererstausstattung/employee initial equipment form). No hardware or account provisioning was performed until the proper onboarding form was completed. Tickets were closed after guidance was provided to resubmit using the appropriate onboarding form so the provisioning workflow and approval automation could run. Support also noted Automation for Jira approver/waiting‑for‑approval messages in ticket comments and recorded when Automation for Jira auto‑closed tickets due to inactivity (e.g., after 14 days with resolution set to 'Done'), advising requesters to use the correct form to avoid duplicate requests and to prevent disruption of automated onboarding processes.

42. Requests for externally hosted institutional mail accounts (LIBF) that cannot be provisioned internally
85% confidence
Problem Pattern

A request asked for a LIBF-hosted mail account (external partner institution address) to grant access to partner Post Sales systems (Teams, Viva Engage). Internal provisioning of a partner institution account was not available and test accounts from LIBF were insufficient for access, leaving the requester without the requested internal account.

Solution

Support engaged the external partner directly and used a direct LIBF contact as a workaround rather than creating an internal LIBF account. No internal mailbox was created and the request was closed with outcome recorded as 'Won't Do' because the account type could not be provisioned internally.

Source Tickets (2)
43. Windows OOBE keyboard layout mismatch preventing initial password verification
90% confidence
Problem Pattern

During Windows out‑of‑box experience (OOBE) initial sign‑in the device presented a non‑German keyboard layout, so typed characters did not match the user’s Okta password and Windows reported "password could not be verified" or denied access. Affected systems included Windows OOBE, Okta password provisioning and keyboard/display language settings; the symptom was inability to complete first login.

Solution

The user’s Okta password was replaced with a simpler secret that avoided characters that differ between German and English layouts (avoiding swapped letters such as Y/Z and problematic special characters). During the subsequent OOBE run the keyboard layout was verified/set to German so typed input matched the account password, and the sign‑in completed successfully. An example password used in the ticket was moh3To!f4v to illustrate a layout‑neutral choice.

Source Tickets (1)
44. MS365 access for external freelancer required contingent‑worker onboarding form
95% confidence
Problem Pattern

A requester sought an MS365 account for an external freelancer to use the IU billing app, but the freelancer lacked the required MS365 account and could not access the app. There were no application error messages; the request was submitted via a general support ticket rather than an onboarding/contingent‑worker workflow.

Solution

The requester was directed to submit the access request through the dedicated 'New Contingent Worker Account - IT Service Portal - Jira Service Management' onboarding form. No account provisioning occurred from the original general ticket; once the correct contingent‑worker form was identified and communicated, the case was closed pending a formal contingent‑worker submission.

Source Tickets (1)
45. Automated onboarding flows failed to deliver scheduled letters/credentials despite successful runs or expected triggers
90% confidence
Problem Pattern

Automated onboarding jobs (Power Automate/Dataverse or other scheduled provisioning) reported successful runs or had entries in HR data but did not send onboarding letters or credentials. Affected systems included Power Automate flows, Dataverse tables, related SharePoint lists and the reporting/status lists; symptoms included records for new hires present but no letters/credentials delivered and timing tied to start‑date-based midnight triggers.

Solution

The Power Automate flow 'OnboardingLetterNewHires_Dataverse' was escalated to the specialist team and the flow was adjusted by a developer (Jens Streicher), after which the missing onboarding letters were sent as expected. In a separate case the lack of credential delivery was traced to conflicting/incorrect start dates in HR data which prevented the scheduled midnight automation from firing; the start‑date data was corrected and manual provisioning was applied while the scheduling behaviour was validated. SharePoint list hygiene (previously recommended cleanup) was noted as relevant to reliable runs.

Source Tickets (2)
46. Approval/approver metadata not propagated in Jira/Atlassian automation causing pending or incorrect account provisioning
85% confidence
Problem Pattern

Onboarding and account-creation requests stalled or were auto-closed because approver or HR metadata was missing, empty, incorrect, or not captured by the form. Affected systems included Jira, Automation for Jira, request forms, and Atlassian provisioning APIs. Symptoms included tickets showing empty or incorrect approver fields despite requester actions, Automation for Jira messages indicating "your ticket is missing the approver... will be close" and tickets auto-closed as 'Won't Do', approval notifications not triggering or not being adopted by downstream provisioning, and worker-create requests rejected by provisioning APIs for invalid HR fields (for example salutations/titles).

Solution

Investigations identified two related failure modes. One was metadata-propagation failures: approver or HR metadata entered (or expected) on request forms was not consistently propagated through the Jira-to-provisioning pipeline, leaving approval state unset in downstream automation and causing requests to stall, be auto-closed as 'Won't Do', or be rejected by Atlassian provisioning APIs. The other was form design/validation failures: approver fields were sometimes missing or not clearly exposed to requesters, or fields were present but not marked required, allowing submissions without approvers or with invalid HR values (for example salutations/titles). Recorded remediations and outcomes included: documenting incidents as workflow/approval-propagation issues; removing incorrectly created Atlassian users when discovered; requesters recreating worker records with corrected salutations/titles and including the required approver/CC so provisioning could proceed; manual creation of at least one Atlassian user with a scheduled password-reset to the user’s private email for start date; advising requesters to check account invitations (including spam) when applicable; and, in some incidents, changing form configuration (required-field flags) to prevent empty submissions. In at least one matched case no form change was implemented and the automation closed the ticket as 'Won't Do'. All actions and outcomes were recorded in the relevant tickets to inform future onboarding requests.

47. myCampus / CARE account creation or password‑reset failures due to existing account conflicts or missing notifications
80% confidence
Problem Pattern

Users could not complete myCampus/CARE account setup or receive password reset emails. Symptoms included CARE-created profiles without usable passwords, 'forgot password' not sending reset e‑mails, or staff account creation being blocked because an existing Dozenten (lecturer) account was already linked to the same IU email.

Solution

Support investigations found existing student/Dozenten accounts that conflicted with the requested staff account creation; in the reported cases IT staff confirmed the presence of existing usernames and that password resets for those accounts were subject to the student account processes. One user resolved the conflict themselves after being informed; in other cases the account creation was blocked until the existing Dozenten linkage and HR/start‑date data were clarified so the correct account type could be provisioned.

48. Access and provisioning requests submitted outside the formal onboarding ticketing flow were delayed or rejected
90% confidence
Problem Pattern

Access requests for core systems (Workday, corporate e‑mail, Microsoft 365/Office 365) that were submitted outside the formal onboarding ticket flow were left unprocessed, delayed, flagged as unprocessable, or auto‑closed. Affected users reported no account creation, no login credentials, missed start dates, and no license assignments. Intake failures typically occurred in Jira Service Management when the onboarding workflow/form was not used.

Solution

Support paused fulfillment of access requests that arrived outside the standardized onboarding workflow and instructed requesters to resubmit via the onboarding form. The ticketing team recorded that Workday account provisioning, corporate e‑mail provisioning, and Microsoft 365/Office 365 license assignments required a formal onboarding ticket; in the absence of such a ticket accounts and licenses were not created and requests were sometimes auto‑closed. In affected cases IT provided the requester with the required onboarding procedure and intake guidance, and provisioning proceeded only after a compliant onboarding ticket was opened so the requests could be processed according to established onboarding integrations and rules.

Source Tickets (2)
49. AD group copy requests that omitted a reference user resulted in default group assignment
95% confidence
Problem Pattern

Requests to copy access or to assign application/global roles sometimes produced missing or incorrect rights on the target account. Symptoms included targets receiving only the default/baseline AD group set, lacking expected application permissions or global roles (for example MyCampus 'IU Thesis Teacher'), or provisioning records showing no, ambiguous, or invalid reference‑user details. Affected systems included Active Directory, Salesforce, MyCampus, and line‑of‑business applications such as Oasis and CAMA. Issues frequently surfaced alongside onboarding‑interface flags and automation/approval workflow notifications.

Solution

Support verified whether a valid, system‑local reference user and explicit application/rights details had been supplied and acted according to what was present. When no reference user or an invalid reference user (for example a person without an account in the target system) was included, the provisioning process had applied the standard/default AD group set for the target account and the requester was informed that a valid reference user and explicit application/rights were required to copy non‑default permissions. When a valid reference user was provided or substituted, support confirmed scheduling details (for example the target’s start date), clarified which applications and exact rights were needed (for example specific CAMA reports/tools versus broader roles), inspected onboarding‑interface flags and automation/approval state (for example Automation for Jira approvers and due dates), and provisioned matching AD groups and application roles in the target systems (Salesforce, Oasis, CAMA, MyCampus). For MyCampus specifically, support assigned the required global role (IU Thesis Teacher) via Website‑Administration → Nutzer/innen → Rechte – Globale Rollen zuweisen and verified the assignment. Support also coordinated outstanding items such as hardware procurement and outstanding approvals; the requester was notified to report any remaining access gaps.

50. Windows 11 OOBE blocked by Okta sign‑in during initial provisioning
52% confidence
Problem Pattern

Windows 11 devices failed to complete OOBE/initial sign‑in or join Azure AD/Intune when interactive authentication during provisioning did not complete or was interrupted. Symptoms included Okta/OOBE sign‑in errors (for example “the account cannot be verified”), the OOBE screen showing “New User” with the “Other user” option not working, inability to complete one‑time/temporary password changes because the password‑change window closed, external SSO or VPN prompts blocking the provisioning flow, and failure to recognize a preexisting personal Microsoft account that prevented Azure AD join. Many incidents lacked error codes, screenshots, or logs, limiting diagnosis.

Solution

Multiple onboarding incidents failed when interactive authentication at Windows 11 OOBE did not complete or when users expected a VPN sign‑in option. Documented remediations and observed outcomes included:

• One Lenovo device with Okta sign‑in failure was returned/replaced; no in‑place recovery was recorded for that unit.
• A Dell laptop that was linked to a prior personal Microsoft account required OEM recovery; support restored the device image using Dell SupportAssist OS Recovery (accessed via the Dell OneTime Boot Menu/F12) and the device was successfully reprovisioned. Imaging resolved at least one case where a preexisting personal Microsoft account blocked Azure AD join.
• For Okta/OOBE sign‑in failures, support performed standard account troubleshooting (confirming Wi‑Fi at the OOBE/login screen, attempting the “Other user” option, and verifying sign‑in at the Okta web portal); many tickets lacked error codes, screenshots, or logs and had no documented final resolution.
• At least one incident that left the device at a “New User” OOBE state was resolved in‑place by executing an internal remediation script provided by engineering; after the script ran, login/enrollment was restored and the user could sign in normally.
• One user who expected VPN for initial sign‑in completed enrollment after support confirmed VPN was not required and provided commissioning guidance.
• A VPN authentication failure (CPG‑VPN‑LOGON) was traced to problematic special characters in the user’s password; support performed an Okta password reset, the user chose a password without those special characters, and sign‑in completed.

Across incidents, definitive recoveries frequently involved OEM imaging/reimaging or hardware replacement, though at least one documented non‑imaging remediation (internal script) restored enrollment. A persistent limitation for troubleshooting was sparse diagnostic detail in many tickets.

51. Onboarding handbook PDF with non‑functional links — content owner fix required
90% confidence
Problem Pattern

An attached onboarding handbook PDF contained multiple links that did not open or respond when clicked. The user reported no error codes or additional technical symptoms and requested support assistance to make links work. The PDF and links appeared to be part of manager‑provided onboarding materials rather than centrally managed documentation.

Solution

Support inspected the report but did not modify the handbook because it was not produced or managed by the IT team. No technical remediation was performed; instead the user was directed to contact their manager or the onboarding organiser to obtain an updated handbook or request that the broken links be fixed by the document owner.

Source Tickets (1)
52. Onboarding blocked by incomplete delivery address and missing Salesforce reference user
90% confidence
Problem Pattern

Onboarding hardware orders or shipments were blocked or left undelivered because the onboarding form contained incomplete or incorrect delivery address data — examples include missing postal code/city/country, missing building or address suffix, or an unavailable private address. In some cases mandatory onboarding fields (for example, the Salesforce reference user) were also left blank, preventing related provisioning. Symptoms were shipment non-delivery or orders not being created and the absence of system error messages; affected systems included parcel delivery, onboarding logistics, and Salesforce provisioning.

Solution

Support requested and recorded a complete postal address and the mandatory Salesforce reference user when those fields were missing. Where requesters did not provide required address details or a reference user, no hardware order or Salesforce provisioning occurred and the request was ultimately closed without remediation. When private delivery addresses were unavailable, support confirmed an alternate delivery destination (for example, a local campus) with a local contact and placed the order to that site; confirmation from local staff indicated the shipment was placed. For delivery failures caused by incomplete address elements (for example a missing building/suffix such as “Meierei”), tickets were resolved after the address was corrected and packages were reshipped or located, although some tickets lacked detailed remediation steps. Resolved tickets contained either confirmation that shipments arrived or that an agreed delivery destination and order placement had occurred.

53. Onboarding hardware delivery status and credential/notification receipt for new hires
85% confidence
Problem Pattern

New‑hire onboarding requester lacked confirmation whether corporate hardware had shipped or been delivered and whether initial accounts (Epos, CARE, myCampus, Salesforce) were provisioned; there were no error messages, only uncertainty about delivery status and who could request access on behalf of the new user via the Self Service portal.

Solution

The package delivery was verified with the carrier: the FedEx shipment was delivered on 2025-10-22 and the recipient had received FedEx notification emails at their private/personal email address. The ticket was closed after confirming hardware delivery and notification receipt to the personal email.

Source Tickets (1)
54. Expired Microsoft 365 activation link causing account lockout
90% confidence
Problem Pattern

A newly created Microsoft 365 account activation link had expired and the user became unable to sign in (account locked), citing an expired activation/activation link; there was some confusion about the correct institutional email address in use.

Solution

An administrator generated and sent a password reset to the user's private/personal email address, which restored access and closed the ticket.

Source Tickets (1)
55. OnBoarding portal content not loading for Academic Lecturers (suspected local DNS/blocker)
35% confidence
Problem Pattern

Users attempting to access the OnBoarding intranet area for Academic Lecturers reported missing content (a PowerPoint) and were unable to request access. After initial guidance a different error appeared and the page failed to load or present access-request controls. The issue was observed from a home-office environment and was suspected to be related to local network DNS filtering/blockers (e.g., Pi-hole) or transient connectivity; Edge was the recommended browser.

Solution

No confirmed remediation was recorded in the ticket. Support documented that the problem was suspected to be caused by local DNS filtering or a home‑office network blocker (examples noted: Pi‑hole) or by transient connectivity issues. Support advised following the portal's on‑screen instructions, using the recommended browser (Edge), and retrying access from an unrestricted network environment; no further confirmation of a permanent fix was captured.

Source Tickets (1)
Back to Summaries
An unhandled error has occurred. Reload X