Best Practices & Scenarios
This guide provides practical examples, best practices, and advanced scenarios for using bulk operations effectively in User Management & License Optimizer.
Planning and Preparation Best Practices
Before Starting Any Bulk Operation
Test with Small Groups First
Try operations on 5-10 users before scaling
Verify results match expectations
Identify any unexpected behaviors
Refine approach based on test results
Verify User Selections
Double-check User Browser filters capture intended users
Review user list for any unexpected inclusions
Confirm user count matches expectations
Check for Organization Admins in selection (they'll be skipped)
Document Operation Purpose
Record business reasons for the operation
Note any compliance or security requirements
Document expected outcomes
Maintain audit trail for reviews
Check Dependencies and Impact
Review users' group memberships and site access
Identify any project ownership or critical assignments
Check for automated integrations or API usage
Plan for potential service disruptions
Timing Considerations
Schedule During Low-Usage Periods
Early morning or late evening for large operations
Avoid peak business hours
Consider global timezone impacts
Coordinate with maintenance windows
Coordinate with Other Changes
Avoid conflicts with scheduled maintenance
Plan around identity provider sync schedules
Coordinate with other administrators
Check for concurrent automated tasks
Common Use Case Scenarios
License Optimization
Scenario: Quarterly License Cleanup
Business Need: Reduce costs by removing inactive users from expensive applications
Process:
Identify candidates: Filter users inactive > 90 days
Review by application: Start with most expensive licenses (JSM, Premium features)
Manager confirmation: Export list for management review if required
Execute in phases:
Week 1: Remove access to expensive applications
Week 2: Remove access to secondary applications
Week 3: Suspend accounts if completely inactive
Track savings: Document license cost reductions
Key Considerations:
Preserve access for users on planned leave
Maintain documentation access during knowledge transfer periods
Consider seasonal usage patterns (consultants, contractors)
Scenario: App-Specific License Optimization
Business Need: Optimize specific high-cost application licenses
Example - Jira Service Management Optimization:
Filter users: JSM access + inactive > 60 days
Analyze usage: Review ticket creation/assignment history
Convert to customers: Remove JSM agent access, add to customer groups
Maintain basic access: Keep Jira Software access if needed
Monitor impact: Track customer experience and cost savings
Employee Lifecycle Management
Scenario: New Employee Onboarding
Business Need: Standardize access for new team members
Standardized Onboarding Process:
Identify new users: Filter by creation date (last 7 days) + department email domain
Department-specific access:
Engineering: Add to
engineering-team,dev-tools-access,code-review-teamMarketing: Add to
marketing-team,creative-tools-access,campaign-managersSales: Add to
sales-team,crm-access,customer-facing-tools
Universal access: Add all to
company-all-hands,security-training-requiredVerify access: Test login and application availability
Welcome communication: Trigger welcome emails and training schedules
Scenario: Department Offboarding
Business Need: Remove access for departing team members
Phased Offboarding Approach:
Week 1 - Sensitive Access Removal:
Remove from admin groups
Remove from financial/HR applications
Remove from production systems access
Maintain collaboration tools for knowledge transfer
Week 2 - Operational Access Reduction:
Remove from project-specific groups
Remove from development tools
Convert to documentation-only access
Transfer project ownership
Week 3 - Complete Offboarding:
Remove all remaining application access
Suspend user accounts
Archive user data according to policy
Complete audit trail documentation
Contractor and External User Management
Scenario: Project Contractor Management
Business Need: Manage external contractor access for specific projects
Project-Based Access Control:
Project start:
Filter contractors by email domain
Add to project-specific groups:
project-alpha-team,external-dev-toolsAdd to collaboration groups:
project-alpha-communicationExclude from internal groups: Remove from
internal-only-access
Project completion:
Remove from project-specific groups
Remove development tool access
Maintain documentation access for 30 days
Convert to customer/guest access if ongoing relationship
Contract end:
Complete access removal
Suspend accounts
Document project contributions for future reference
Scenario: Vendor Access Management
Business Need: Control vendor access during engagements
Vendor Lifecycle Management:
Engagement start: Add to
vendor-limited-access, specific project groupsEngagement progress: Add to additional groups as trust/need develops
Engagement completion: Remove project access, maintain communication access briefly
Contract end: Complete removal and suspension
Security and Compliance Scenarios
Scenario: Security Incident Response
Business Need: Immediate access restriction following security incident
Emergency Response Process:
Immediate lockdown:
Suspend affected user accounts immediately
Document incident details and timestamp
Notify security team and management
Investigation period:
Keep accounts suspended during investigation
Preserve audit trails and access logs
Document all investigative steps
Resolution:
If cleared: Reactivate with previous access
If violations confirmed: Complete permanent removal
Update security policies based on findings
Scenario: Compliance Audit Response
Business Need: Address audit findings about excessive access
Audit Remediation Process:
Access review: Filter users by privileged groups
Validation: Confirm business need for each high-privilege user
Remediation: Remove unnecessary admin access, implement principle of least privilege
Documentation: Create detailed records of all changes
Follow-up: Schedule regular access reviews to prevent future findings
Multi-Site and Complex Environment Scenarios
Scenario: Site Consolidation Project
Business Need: Migrate users between sites during infrastructure consolidation
Migration Process:
Phase 1 - Preparation:
Document current access patterns by site
Map groups between source and target sites
Create migration plan with rollback procedures
Communicate changes to affected users
Phase 2 - Dual Access:
Add users to target site groups
Verify access works on target site
Test critical functionality
Maintain source site access during transition
Phase 3 - Cutover:
Remove access from source site
Verify all functionality on target site
Monitor for issues and provide support
Document completed migration
Scenario: Geographic Reorganization
Business Need: Restructure access based on new geographic organization
Regional Access Management:
Current state analysis: Document existing global access patterns
Regional grouping:
APAC users: Add to
team-apac-leads,access-apac-sites-fullEU users: Add to
team-eu-leads,access-eu-sites-full,gdpr-compliance-requiredUS users: Add to
team-us-leads,access-us-sites-full
Global access adjustment:
Remove from
access-global-sites-fullAdd to
access-global-sites-readfor collaboration needs
Verification: Test regional access patterns and cross-region collaboration
Advanced Best Practices
Large Organization Considerations
For Organizations with 1000+ Users:
Batch processing: Limit operations to 100-200 users at a time
Staging approach: Test in development environment first
Performance monitoring: Track operation duration and success rates
Support coordination: Engage support team for optimization guidance
Maintenance windows: Schedule during dedicated maintenance periods
Complex Multi-Site Environments
Site Relationship Management:
Document site hierarchy: Understand production, staging, development relationships
Group mapping: Maintain documentation of which groups provide access to which sites
Dependency tracking: Understand cross-site group and permission dependencies
Migration planning: Use systematic approach for site consolidation projects
Automation Integration
Coordinating with Automated Tasks:
Manual override capability: Use bulk operations for exceptions to automated rules
Filter consistency: Leverage same saved filters for both manual and automated operations
Timing coordination: Schedule manual operations between automated task runs
Documentation alignment: Maintain consistent documentation for both approaches
Troubleshooting Common Scenarios
Partial Operation Success
When some users fail in bulk operations:
Analyze failure patterns:
Check if failures are user-specific or group-specific
Review error messages for common themes
Identify any SCIM-managed users in the failed list
Common failure causes and solutions:
Already in target state: User already suspended or already has/lacks the access
SCIM conflicts: Identity provider managing the user/group
Permission issues: Insufficient admin rights for specific operations
Network timeouts: Retry during off-peak hours
Resolution approaches:
Retry failed operations with smaller batch sizes
Address underlying causes (SCIM conflicts, permissions)
Document exceptions for compliance records
Consider alternative approaches for problematic users
SCIM and Identity Provider Conflicts
When operations appear successful but don't persist:
Identify SCIM-managed resources:
Work with identity team to identify which groups are SCIM-managed
Document which users are provisioned via identity provider
Understand sync timing and frequency
Coordination strategies:
Make changes in identity provider when possible
Time manual operations between SCIM sync cycles
Document manual vs. automated management boundaries
Set up monitoring for sync conflicts
Operation Sequencing Strategies
Complex Multi-Step Operations
Department Transfer Example:
- Step 1: Add to new department groups (grants new access)
- Step 2: Add to new project groups (provides work context)
- Step 3: Remove from old project groups (cleanup old context)
- Step 4: Remove from old department groups (completes transition)
- Rationale: Ensures continuous access while cleaning up old permissions
Security Incident Response Example:
- Step 1: Suspend user immediately (stops all access)
- Step 2: Remove from admin groups (cleanup - can be done later)
- Step 3: Document incident (separate process)
- Rationale: Prioritizes immediate security over administrative cleanup
Testing and Validation Workflows
Before Large Operations:
Small-scale test: Run on 5-10 users first
Validation: Check results in User Browser and test actual access
Refinement: Adjust approach based on test results
Stakeholder approval: Get sign-off for large-scale execution
Full execution: Run on complete user set
Post-validation: Verify results and document outcomes
Compliance and Documentation
Audit Trail Best Practices
Documentation Requirements:
Business justification: Why the operation was necessary
Approval records: Who approved the changes
Execution details: When, how, and by whom operations were performed
Impact assessment: What changed and who was affected
Validation results: Confirmation that changes worked as expected
Compliance Integration:
Regular access reviews: Use bulk operations to implement review findings
Certification processes: Document bulk changes as part of access certification
Audit preparation: Maintain detailed logs for compliance audits
Change management: Integrate with organizational change approval processes
