Data Ownership and Source Mapping¶
This page explains which connected source is authoritative for which identity data and how source mappings are defined in the Identity Operations Platform.
The focus is on practical customer operation, especially for deployments that use OpenText Advanced Authentication together with directory sources.
Terminology¶
Operator: an authenticated person who performs actions in the platform.Managed Identity: the target identity/account handled by identity operations.User Source: a connected upstream system.Source Mapping: a defined mapping between one source context and another source context.
Why Ownership Matters¶
In multi-source identity environments, each source usually owns only part of the full identity context. Clear ownership avoids:
- conflicting updates
- inconsistent identity views
- unclear operational responsibility
The Identity Operations Platform therefore treats data ownership as explicit, not implicit.
Leading Source Principles¶
The platform applies these principles:
-
One authoritative source per data domain
Every data element is owned by a defined source context. -
Map before merge
Data is only consolidated across sources when an explicit source mapping exists. -
Preserve source boundaries
Consolidation creates an operational view, but does not remove source ownership boundaries. -
Decision-time consistency
Operational decisions can use current source state so actions align with the latest authoritative data.
OpenText Advanced Authentication-Centric Model¶
For many customer setups, OpenText Advanced Authentication is the entry point for authentication and repository context, while directory services provide directory-specific identity data.
Typical ownership split:
| Data Aspect | Leading Source (Typical) |
|---|---|
| Operator sign-in context | OpenText Advanced Authentication |
| Repository context / source assignment | OpenText Advanced Authentication |
| Directory identity attributes | Active Directory or LDAP |
| Directory group memberships | Active Directory or LDAP |
| Directory account state attributes | Active Directory or LDAP |
This model keeps authentication and directory governance clearly separated while still allowing one consolidated operational view.
How Source Mapping Works¶
A source mapping defines which directory source belongs to a specific repository context from OpenText Advanced Authentication.
Operationally, this means:
- OpenText Advanced Authentication identifies the relevant repository context.
- The platform resolves the configured source mapping for that context.
- The mapped directory source provides directory-owned identity and group data.
- The platform combines these data domains into one managed operational view.
Without a source mapping, cross-source consolidation is intentionally limited.
Customer Design Guidance¶
To keep behavior predictable, customers should:
- Define ownership per data domain before go-live.
- Keep source mappings explicit and documented per repository context.
- Avoid overlapping ownership for the same identity attribute across multiple sources.
- Validate source mappings during onboarding and after topology changes.
- Reconfirm ownership and mapping assumptions during major integration updates.
Summary¶
The Identity Operations Platform uses explicit ownership and explicit source mappings to consolidate identity data safely. With OpenText Advanced Authentication as authentication context and mapped directory sources as directory context, customers get a clear and governable operating model for identity operations.