User Account

Identity

14 sections
178 source tickets

Last synthesized: 2026-02-13 02:27 | Model: gpt-5-mini
Table of Contents

1. Automated username/email renames triggered by Workday (Okta renaming workflow)

77 tickets

2. Missing or uneditable academic titles / profile salutations across systems

8 tickets

3. Login failures caused by incorrect, forgotten, or mistyped usernames

44 tickets

4. Duplicate or multiple profiles blocking updates and causing assignment conflicts

9 tickets

5. Application errors caused by missing or incorrect permissions

5 tickets

6. Stuck on Apple ID email association prompt on corporate iPhone

3 tickets

7. Provisioning external SaaS accounts with service credentials, billing, and data residency constraints

2 tickets

8. Upstream/downstream attribute mismatch: copied email at account creation prevents later updates

10 tickets

9. Service account rename in Exchange/Azure AD where display name changed but primary SMTP/UPN stayed the same

1 tickets

10. Manual legal name change requiring primary email/mailbox and directory attribute updates

6 tickets

11. Directory email address corrections causing intermittent mail delivery failures

1 tickets

12. Device lockout due to encrypted disk requiring recovery key

3 tickets

13. Provisioning nonstandard local/service user accounts for events and restricted access

8 tickets

14. Third-party SaaS profile name changes requiring end-user self-service (Twilio)

1 tickets

1. Automated username/email renames triggered by Workday (Okta renaming workflow)
95% confidence
Problem Pattern

Automated renames originating from Workday or Okta Workflows changed corporate usernames, iu.org email addresses, and displayName attributes. Symptoms included stale or reverted display names in Microsoft Teams, Office 365, and Atlassian/Jira (background jobs sometimes reverted manual corrections); Outlook showing old addresses, outdated contact cards, or missing shared/brand mailboxes; malformed usernames for hyphenated, compound, middle‑initial, or preferred‑name cases (including consecutive dots); downstream services retaining old identities or failing to ingest updates (proxyAddresses/mail‑alias attributes sometimes not updating); and local authentication failures when UPN/local-account mappings diverged (observed Error 691). On macOS endpoints, local-login/UPN divergence commonly required full device re‑provisioning.

Solution

Technicians verified Workday name fields and confirmed renaming intent with users (including preferred-name and middle/second-name preferences and collecting private contact addresses when users were unavailable). The Okta renaming workflow was invoked (via Okta Workflows invoke URL) to update the Okta profile and the iu.org username/email, and execution was confirmed using Okta admin pages and Workflows notifications. All rename actions, confirmations, cancellations, aborted renames, and downstream fixes were tracked on an internal renaming checklist and follow-up tickets. Renames typically caused brief user downtime (~10–15 minutes) and client-side cache/sync delays; Teams and Office 365 often continued to show old display names/addresses for hours to days, and Outlook contact cards or shared/brand mailboxes sometimes remained stale. The automation occasionally produced malformed usernames for hyphenated, compound, middle‑initial, or preferred‑name cases (including consecutive dots); those renames were aborted to avoid invalid mailboxes or corrected manually after the workflow completed. ProxyAddresses (mail-aliases) were observed to sometimes not update or propagate and required separate manual correction and tracking. Several downstream systems did not receive automated changes and required manual updates or follow-up tickets (examples: single-entry 1Password records, EPOS/Care, AB Tasty, academy systems, Atlassian/Jira); Egencia continued to apply changes via a nightly HR-feed CSV. Where Okta wrote displayName into Atlassian and background jobs later retriggered and reverted values, affected Jira/Confluence entries were manually corrected and tracked. Local sign-in issues caused by UPN/local-account mismatches were resolved by signing users out and back in, administrator-initiated password resets, or—on multiple macOS endpoints—by re-provisioning. Mac endpoint cases commonly required a full device reset/re-provisioning; technicians advised preserving OneDrive and other local data and performed backups before resetting. All manual corrections and downstream follow-ups were recorded in the renaming checklist and subsequent tickets.

2. Missing or uneditable academic titles / profile salutations across systems
91% confidence
Problem Pattern

Users reported incorrect or missing name elements (academic salutations or surnames) displayed across multiple systems such as course websites, Microsoft 365 apps (Outlook, Teams), SharePoint, and third‑party apps. Affected fields appeared inconsistently between systems or showed legacy/incorrect values. Some name/title fields were not editable in the user-facing profile UI and appeared to be controlled by HR source data, directory synchronization, or application-specific admin settings.

Solution

Two resolution patterns were observed. In cases tied to HR records, the user initiated a name/title change in Workday; the change required lead approval in Workday and then propagated to connected systems via directory synchronization (identity management). Propagation updated Microsoft services (Outlook, Teams, Microsoft account/SharePoint), course-management displays, and other connected systems, and was observed to take up to about two weeks. In other cases where the display value was controlled by the application or identity provider, an administrator directly updated the relevant field (for example, the Okta 'Salutation external' field or the Atlassian account display name), which immediately corrected the display in the affected application. It was noted that some profile fields are not editable by end users in the UI and required administrative changes in the authoritative system or the target application.

3. Login failures caused by incorrect, forgotten, or mistyped usernames
95% confidence
Problem Pattern

Users were unable to sign in or access services because the presented identity or device credential did not match the authoritative account or device-signin state. Reported symptoms included authentication failures with messages like "credentials incorrect" or "Anmelden nicht möglich", numeric error codes, endless sign‑in loops or intermittent "Switch user" loops, newly required sign‑ins after email/profile changes, inability to open linked documents, and device-specific failures such as Windows Hello/biometric authentication not working. Common triggers included misspelled or misformatted usernames, use of email or display names instead of the canonical login name, duplicate or legacy app‑specific accounts, missing SSO/Okta group membership, misconfigured HR/provisioning records (for example Workday), and stale or unsynced permissions or device credential state.

Solution

Access problems were resolved after support identified the authoritative account or device sign‑in method for the affected system, corrected the record or device state, and confirmed successful sign‑in or profile discoverability. Observed resolutions included: corrected canonical usernames and profile fields in authoritative systems (examples: CARE account name fixes that allowed successful sign‑in and profile discovery); administrator‑sent password resets or password‑reset emails that restored Microsoft/Okta/Office access; correcting recorded or stored email addresses when an application used an email address as the login key (no password reset required for those apps); verifying and restoring required Okta group membership; merging or removing duplicate application records and escalating application‑side record fixes to the owning teams (examples: Moses/EPOS name-field and duplicate-entry fixes); identifying separate non‑SSO application accounts and forwarding requests to the app owner to create or reset the app‑specific account (examples: DCWeb, SiteFusion). Device sign‑in failures were addressed by delivering one‑time access/recovery codes in several cases, reinstalling macOS for a local account conflict, and in at least one instance running a script that reset and reconfigured Windows Hello which resolved intermittent sign‑in loops and device recognition problems. Support also observed administrator refresh/sync of a user’s permissions in the identity system breaking an Office‑installation sign‑in loop, and clarified SSO routing when provisioning (for example a misconfigured Workday setting that blocked Atlassian/Service Portal SSO because the Service Portal authenticated via Okta). For third‑party sites, verifying which email address was being used (stored or cached credentials) resolved app‑specific numeric errors (example: Keywordtool.io error -895025148). Each incident was closed after the authoritative identity or device access method in the affected system was corrected and successful access was confirmed.

4. Duplicate or multiple profiles blocking updates and causing assignment conflicts
81% confidence
Problem Pattern

Duplicate, legacy, missing, or external user records and stale proxy email addresses created conflicting ownership of email/proxy attributes, group memberships, and resource ownership across directory-sync and downstream systems. Symptoms included users not appearing in provisioning/import selection lists (for example Okta), failed automatic provisioning, external accounts being imported as “known user” and then internalized, empty or content-less IT Service Portal pages, inability to be added to requests, missing SSO group memberships, failed recovery-email/IU‑Mail assignments, incorrect course/assignment associations, and approvals routed to the wrong approver. Affected systems included identity stores, directory-sync (AD/Azure AD), Okta SSO, IT service portals, Atlassian/Confluence, LMS integrations, Workday approvals, and application-specific user stores.

Solution

Investigations found duplicate or legacy records, missing profile entries, or stale proxy addresses that retained ownership of email/proxy attributes, group memberships, or resource ownership in external systems. Resolutions consolidated users to the intended internal/SSO account by recreating missing profile entries or removing duplicate/legacy records and clearing stale proxy addresses; where deletion or merge was not possible, duplicate downstream accounts were explicitly labeled (for example “(do not use)” / “(nicht benutzen)”) to prevent user confusion. Confluence group memberships and space ownerships were reassigned or replicated to the SSO account before legacy records were removed when necessary. Directory-sync mappings and Azure AD/Okta configurations were corrected so the updated identity state propagated to IT service portals and SSO, and Workday cost-center mappings were updated where legacy records had been receiving approvals. When automatic provisioning/import failed, a manual Okta user import was executed to create/import the missing user, and external accounts that were processed as “known user” were internalized during the import. After consolidation, sync propagation, manual import, or labeling, IT Service Portal content and links appeared as expected, users could be added to requests, recovery-email and IU‑Mail assignments attached to the intended account, Confluence access and course/assignment mappings aligned to the SSO account, and Workday approvals routed to the correct approvers. Tickets requesting new accounts were closed when an existing account was present (status recorded as "won't do") and requesters were advised to use the dedicated "Report access problem" IT Service Portal form for actual login/access failures; clearing browser cache or using alternate portals was noted as a useful diagnostic but the root causes were identity record ownership and sync state.

5. Application errors caused by missing or incorrect permissions
90% confidence
Problem Pattern

Users signed in successfully but encountered blocked features or missing functionality: dashboards showing only error messages, authentication errors (for example 'undefined general error') or repeated password prompts, OS prompts requesting administrator credentials, automation/service accounts failing to run, or software installs from the Company Portal being unavailable due to pending manager/approver approval. Affected systems included application dashboards (EPOS, d.velop, CARE), automation bots (UI Path), device features on macOS (screen sharing), and app deployments via the Company Portal (Unternehmensportal).

Solution

Access and functionality failures were resolved by correcting account presence and permission state at the layer where the failure occurred. Missing managed application accounts were created and invitation workflows completed; after users accepted invitations, sign-in and dashboard access returned. Where application roles or permissions were insufficient or incorrect (for example a CARE bot account lacking Bearbeitungszugriff for Prüfungsleistungen and Antragsverwaltung), the account roles/permissions were aligned with a working reference user and, after permission propagation and the user signing out and back in, the errors and missing functionality cleared. Automation/service accounts were reprovisioned as regular user accounts when API access was unnecessary and logins were verified before assigning application-level rights. On macOS, long-term administrative accounts were used to grant required local permissions or to add users to the admin group; after those changes device-level features such as screen sharing functioned again. For app deployment issues where installations were blocked by pending manager/approver approval in the Company Portal (Unternehmensportal), manager approval was requested or approver assignments were changed and IT enabled the app for the user in the Company Portal; apps already present in the portal (for example JASP) were confirmed visible and newly enabled apps (for example LibreOffice) became installable within about an hour. In all cases resolution was confirmed by successful sign-in and restoration of the previously blocked feature, installation, or dashboard view.

6. Stuck on Apple ID email association prompt on corporate iPhone
90% confidence
Problem Pattern

Users were unable to create, change, or re-associate Apple ID/iCloud accounts on corporate Apple devices and PCs. Symptoms included iPhones stuck at an Apple ID email-association prompt requesting an email without error codes, explicit errors when attempting to create an Apple ID/iCloud email, PCs immediately terminating the session when a different/new email was entered, and failure of Apple devices (iPhone/MacBook/iPad) to sync or reflect account changes.

Solution

Incidents were resolved by addressing the Apple ID/iCloud account association either by adding an iCloud Mail address to the existing Apple ID or by creating/signing in with a new Apple ID via Apple’s web portal. In one case an iCloud Mail mailbox was created and added to the Apple ID linked to the corporate iPhone; after the iCloud address was associated the device cleared the email-association prompt and resumed normal operation (the exact mailbox name did not affect the outcome). In other cases where on-device creation failed or produced errors, a new Apple ID / Apple e‑mail was created through the Apple account web portal and then signed into the iPhone and MacBook (verification completed); after that the devices synced and became compatible. When account changes were performed on an Apple device (iPhone/iPad/Mac), the new or updated iCloud address propagated to other systems and PCs reflected the updated login.

7. Provisioning external SaaS accounts with service credentials, billing, and data residency constraints
80% confidence
Problem Pattern

Request to create an external SaaS account (studio.nebius.ai) for an organisational service with a configured payment method, service-account sign-in via Microsoft credentials, and GDPR/data-residency requirements. Request included C-level approval and a zero‑data‑retention option; initial credential delivery via a SAFE 1Password link expired and prevented access to the service credentials.

Solution

The account was created with the requested billing configuration (payment method and auto-topup) and the zero‑data‑retention option enabled. C-level approval and GDPR/data-residency details (data processing located in France) were recorded. A dedicated service account was provisioned and integrated with Microsoft authentication for the it-bops service principal, and credentials were reissued via SAFE/1Password after the original share expired so the team could access them.

Source Tickets (2)
8. Upstream/downstream attribute mismatch: copied email at account creation prevents later updates
90% confidence
Problem Pattern

Identity attribute values and group memberships (email, username, employeeID, date of birth, display name, recovery/primary work email, and AD/AAD/Okta group membership) were inconsistent or stale between authoritative sources and downstream systems. Symptoms included downstream displays of private or outdated addresses, attributes captured at account creation remaining immutable or independently stored, missing source fields (for example Workday Primary Work Email or Microsoft birthdate) causing downstream service failures (Pulse surveys undelivered, Bing Chat blocked), and missing or incorrect group memberships or EmployeeID preventing expected role/access. Intermediary IAM or provisioning processes (notably SOAP/EPOS writes, Okta syncs, or manual provisioning) sometimes overwrote or restored attributes and caused login failures, reverted name changes, or missing access roles. Affected systems included Workday, Okta, SOAP/EPOS IAM, AD/AAD, Quercus, Competency App, MyLIBF, myCampus, Klausurensystem, and Microsoft integrations.

Solution

Investigations consistently identified two main causes: downstream systems taking independent, permanent copies of identity attributes at account creation, and intermediary IAM/provisioning processes (notably SOAP/EPOS and Okta, plus manual provisioning actions) writing or restoring attributes or failing to copy group memberships. Recorded resolutions and actions included: - Quercus retained an edu.libf.ac.uk email captured at account creation; backend administrative correction of the stored email fixed the display. - The Competency App’s missing competency mappings were restored after the EmployeeID stored in the Competency App was corrected. - AD, Azure AD (AAD) and Okta group memberships for a target account were aligned to a reference user and the Employee ID field was populated to restore expected access and group-based roles. - A myCampus record containing a private GMX address was corrected by replacing it with the user’s IU Mail and saving the record; a separate surname inconsistency between myCampus and Workday was escalated to HR. - myCampus/Care display-name and username were manually updated when legal-name changes did not propagate; the same updates were reapplied after values reverted due to IAM writes. - An access outage affecting Klausurensystem and myCampus was traced in CARE logs to SOAP/EPOS writes that had overwritten username changes; timestamped EPOS logs were used to identify and align the correct username across records. - An EPOS recovery-email attribute was successfully updated to a private GMX address and the change was saved and confirmed. - A Microsoft/Bing Chat access failure was resolved after a missing birthdate was added to the Microsoft/IU profile; the absent birthdate had been preventing the service from launching. - An instructor account with an outdated iubh address had its email rewritten in the provisioning system and the user was notified; account-creation/approver guidance was provided when a new instructor account was required. - A Pulse Survey delivery failure was traced to a missing Workday Primary Work Email (likely caused by an Okta sync issue); the Primary Work Email was added in Workday (the authoritative source) to restore downstream delivery. - A finding that students could edit Date of Birth in MyLIBF was recorded and routed into the formal data-change process. Where intermediary IAM writes were implicated, timestamped logs (EPOS/CARE/Okta) were used to identify the correct source values for reconciliation and the required administrative-change pathways were documented in each case.

9. Service account rename in Exchange/Azure AD where display name changed but primary SMTP/UPN stayed the same
80% confidence
Problem Pattern

Request to rename a service user (zpa-service@svc.iu-it.org) to a new departmental name (CAMA-service@svc.iu-it.org). Only the display name had been changed initially; the primary SMTP address and sign-in name (userPrincipalName) remained with the old name, causing a mismatch between mailbox identity, aliases and sign-in name.

Solution

The mailbox and Azure AD identity were aligned by updating the mailbox primary SMTP and SMTP proxy addresses and by changing the Azure AD userPrincipalName/sign-in name to the requested CAMA-service value while preserving required aliases. Display name, primary SMTP and UPN were synchronized so the service account used the new departmental identity for email and sign-in without losing existing alias routing.

Source Tickets (1)
10. Manual legal name change requiring primary email/mailbox and directory attribute updates
90% confidence
Problem Pattern

User-requested or provisioning-driven name changes and corrections caused inconsistent identity records and authentication failures. Symptoms included incorrect display name or email in Okta/Microsoft 365 welcome messages, mismatched primary email/login and mailbox addresses across Active Directory/Okta, myCampus and downstream systems, failed sign-ins on replacement or reimaged devices with 'password incorrect' errors, loss of network/Wi‑Fi or OneDrive access due to missing group memberships, and occasional absence of explicit error messages beyond login failures or incorrect display names. Affected accounts included internal staff and external/affiliate users.

Solution

Directory display-name and surname attributes were updated in the institution’s identity sources (Active Directory and Okta) and corresponding myCampus and any external/affiliate records were updated to reflect the corrected name. Minor spelling corrections were completed in Okta when the issue only affected automated welcome messages and Microsoft 365 display names. Where the primary email/login and mailbox required change, the mailbox and login were changed to the new surname-based address while the existing password was retained. When users still could not sign in on replacement or upgraded devices despite using the retained password, support reconciled duplicate or legacy username/User Principal Name entries (removed or aligned stale aliases) and corrected account provisioning attributes. Missing group memberships that impacted network/Wi‑Fi authentication and OneDrive access were restored. Login tests were performed on replacement devices using the updated login and retained password and propagation to downstream systems was verified; users were informed of the change and access confirmation was obtained.

11. Directory email address corrections causing intermittent mail delivery failures
90% confidence
Problem Pattern

User directory entries contained incorrect or outdated primary email addresses for Academy users, causing intermittent or missing email delivery and user reports of not receiving messages. Affected systems included the central user directory, email routing, and CARE/EPOS account records. Users reported specific senders/messages not arriving or delivery failures tied to older addresses.

Solution

Support reviewed the listed Academy user records, corrected incorrect primary email addresses in the user directory, and confirmed remaining accounts already had correct addresses. Corrections were applied to the directory entries referenced by CARE/EPOS so email routing matched the updated primary addresses, and the support team verified the affected accounts for successful mail delivery after the changes.

Source Tickets (1)
12. Device lockout due to encrypted disk requiring recovery key
85% confidence
Problem Pattern

A device's disk encryption lock required a recovery key, preventing access to the local hard drive and sign-in to local and web accounts. Users reported blocked logins or application-specific errors (for example, 'Sie können Ihr Nutzerprofil nicht bearbeiten') when accessing services such as online exam portals. Affected systems were laptops with encrypted disks that could not be used until the recovery key was applied.

Solution

Support retrieved and provided the disk-encryption recovery key to the user via secure email or the vendor recovery link. In some incidents the recovery key allowed an immediate unlock and users regained access to the local hard drive, email, and their account. In at least one case the user obtained the recovery key via the provided link and performed a full OS reset; after the reset the device and access to the exam system returned to normal.

13. Provisioning nonstandard local/service user accounts for events and restricted access
90% confidence
Problem Pattern

Requests to create nonstandard or tenant-specific accounts and to grant temporary or permanent local elevated access, including: temporary local administrator accounts on managed or unmanaged Windows devices; kiosk or device-specific enrollment accounts; Office365/Teams/Exchange accounts for role-based groups (for example works-council members); and test/student/teaching/service accounts in specific tenants. Reported symptoms included inability to install software due to missing admin rights, requests to revoke role-based access when membership ends, accounts missing from the expected tenant or application, naming or group-membership requirements (for example computer names containing "Kiosk"), and licensing or policy constraints blocking second personal accounts. Affected systems included Windows 10/11 devices, Microsoft 365 (Teams/Exchange), AMOS-managed test accounts, libfstudy/EPOS teaching accounts and other tenant-specific applications.

Solution

Support provisioned nonstandard local and service accounts on a case-by-case basis and recorded associated asset links in the inventory. For event and unmanaged devices, support created local Windows administrator accounts on unmanaged Dell Precision/Latitude laptops, configured Office 365/service accounts on those devices, recorded device and service tags in the asset inventory, and coordinated temporary special handling for the assets. For restricted variants of existing users, support created mirrored accounts (for example a b. account modelled on b.cmarsden) and adjusted permissions so the account had only network-related access. For kiosk devices, support created the requested standard kiosk account, ensured the computer-name pattern included “Kiosk,” and configured group membership as confirmed by the requester. Where provisioning was tenant- or application-specific, support routed requests to the responsible teams: AMOS/test-account requests were referred to the Identity Access Management / Core Component team; libfstudy/EPOS teaching account requests were forwarded to the specialist team who created the account on libfstudy.ac.uk and applied the teaching-account label. Decisions not to provision were recorded: requests for additional personal accounts (for example second personal accounts for works-council members) were refused when they conflicted with licensing or IT policy and requesters were advised of those constraints and the need to involve governance/compliance teams for data-retention or deletion of role-related communications. Requests for local administrator rights on corporate-managed devices were evaluated against approved job profiles; access was denied when the job profile did not permit admin and users were informed, while in other cases local admin rights were granted for documented operational reasons (for example to replace or remove a server). Requests were closed after confirming account creation or denial, recording group/label assignments where applicable, and updating device/service records in the inventory.

14. Third-party SaaS profile name changes requiring end-user self-service (Twilio)
90% confidence
Problem Pattern

A user requested a retroactive surname change in a third‑party SaaS (Twilio) to correct external records (e.g., bonus agreements). Twilio support indicated they could not change the user's name on the user's behalf and that profile/display name edits were controlled via the Twilio Console user settings. Affected system: Twilio user profile (last name/display name) in the Twilio Console.

Solution

Twilio support confirmed they could not perform the name change for the user. The user signed into the Twilio Console, opened the user settings page (https://console.twilio.com/user/user-settings/overview), edited the last name field (changed Kunrath to Uden), saved the profile, and verified the update succeeded.

Source Tickets (1)
Back to Summaries
An unhandled error has occurred. Reload X