Join InCommon

Complex Identity Matching with a Commercial IAM Product

InCommon Catalyst Program Case Study

Executive summary

The University of Pennsylvania’s Information Computing & Services (ISC) department worked with InCommon Catalyst Instrumental Identity to document requirements, determine current state, and develop use cases to initiate an RFP process and vendor selection for a new identity governance and administration (IGA) solution. Instrumental Identity helped the department navigate vendor selection while remaining solution agnostic. Ultimately, Penn selected SailPoint IdentityIQ as its next IGA solution. 

Incommon catalyst logo

However, out-of-box, SailPoint IdentityIQ does not have a “fuzzy matching” engine, nor does it provide any user interface for manually reviewing ambiguous matches or merging mismatched records, which were key business requirements for Penn. Instrumental Identity had a  clear understanding of the business requirements around a centralized matching process as well as the need to delegate conflicts that arise in the matching process. Leveraging the plugin framework of SailPoint IdentityIQ, Instrumental Identity created database tables, a custom UI, and API calls with configurable matching rules to develop a custom SailPoint plugin. Implementation of the custom plugin drastically reduced the resolution time to correct and match identities.

Background

The University of Pennsylvania is a private Ivy League research university in Philadelphia. The university has four undergraduate schools and12 graduate and professional schools. The population at Penn is comprised of 28,000 students, of which 13,000 are graduate students, and 26,000 faculty/staff (including the health school).

Identity Works LLC d/b/a Instrumental Identity was engaged by the University of Pennsylvania’s ISC department to initially help the team through the process of documenting requirements, determining current state, and developing use cases to initiate an RFP process and vendor selection for a new IGA solution. Instrumental Identity worked with Penn throughout the process, helping them navigate vendor selection while remaining solution agnostic. Penn selected SailPoint IdentityIQ as its next IGA solution. It would replace the university’s legacy “Penn Community” (aka PCOM) system, a homegrown IAM solution created and maintained by Penn for 20 years.

Challenges

In a typically higher-ed scenario, Penn Community was responsible for aggregating and disambiguating user data from various systems of record and matching multiple records to a single human identity. This system was also responsible for flagging account data as invalid, precluding it from matching until the problems were corrected in the source.

Penn Community also included a web-based user interface (EntryView) that allowed analysts to view conflicting or invalid records and then act on them with various action buttons. It optionally provided different views of the data, depending on the privileges the analyst possessed .

Out-of-box, SailPoint IdentityIQ does not have a “fuzzy matching” engine, nor does it provide any user interface for manually reviewing ambiguous matches or merging mismatched records. It also does not provide a way to flag records as “invalid.” IdentityIQ also treats data access in an “all or nothing” way, requiring additional customization to retain EntryView’s permission model. Without the ability to manage the complexities of Penn’s data, IdentityIQ would not be a reasonable part for Penn’s IAM program.

Solutions

Instrumental Identity had a  clear understanding of the business needs and requirements around a centralized matching process and a need to delegate conflicts that arise in the matching process. These are capabilities most vendor solutions don’t provide, but we have been able to solve not just with SailPoint, but with other products, such as Oracle Identity Manager, as well. 

Leveraging the plugin framework of SailPoint IdentityIQ, Instrumental Identity created database tables, a custom UI, and API calls with configurable matching rules, including the ability to leverage what Penn had already been doing for many years, which was fuzzy matching using Jaro-Winkler. The result was branded as PennMatch, a custom SailPoint plugin, which provided a conflict resolution process that leverages the following features:

Impact

The resolution time to correct and match identities was drastically reduced. Data stewards were able to resolve and identify issues coming from their sources, and in quite a few instances, we were able to help them identify problems within their own data, so they could put more controls and validation checks in place. The adoption from the data stewards far exceeded expectations and having insights into their users helped them field customer-facing questions more easily, which increased visibility into their data and where problems occurred and allowed them to correct changes on their own or provide feedback.

The manner in which Instrumental identity implemented the solution enabled application developers to easily configure data validation rules, add additional attributes to be supported for matching rules, easily onboard new sources, and maintain a per environment source code structure. All these tasks were harder to support and manage using the legacy solution.

From a security perspective, the solution had clear auditing trails on when data changed on conflicts, what the previous values were, and who viewed conflict records. The ability to know who was looking at a particular case or if it had been viewed at all was extremely helpful to the team(s) supporting the process as they could avoid duplicate efforts. There were also security controls put in place such that affiliated organizations like the health center could not see other records within the system, only their own.

Prior to the conflict resolution process being conducted within IdentityIQ, analysts would need to look in multiple databases to get additional data elements about the user, such as account claiming attempts and details, address, and contact information they didn’t have in their homegrown IAM system. This added time and nuance to determining if a new user should be matched with someone else or if there was a duplicate scenario. With the way it was implemented in IdentityIQ, even if we weren’t storing data within the application, we had ways to read in the data dynamically for viewing purposes all in one place with the incoming data from the source.

Lessons learned

About Instrumental Identity

Instrumental Identity specializes in providing strategy and implementation consulting services with a specialty in higher education identity and access management programs.

Instrumental Identity logo

About University of Pennsylvania

The University of Pennsylvania’s Information Computing & Services (ISC) is Penn’s Trusted IT Partner, collaborating with the Penn community on IT services that enhance and support the mission of the University.

The InCommon Catalyst Program, launched in June 2021, assists higher education institutions, research organizations, and sponsored partners in their efforts to enable better security, access to services, and user experience through InCommon’s integrated service and software solutions. A group of industry leaders and Internet2 members that actively contribute to IAM within the R&E community, InCommon Catalysts offer a wide range of IAM support services. If you’re interested in leveraging the experience and expertise of an InCommon Catalyst to solve a particular challenge or devise a roadmap for a full IAM reboot, feel free to reach out directly.


Back to the InCommon Catalyst Case Studies