Definitive Guide To Username Conventions
Definitive Guide To Username Conventions
Definitive Guide to
Account Username Conventions
Troy Moreland
Co-Founder & CTO
Identity Automation
Contents
PAGE
FOREWORD 3
OVERVIEW 5
GUIDING PRINCIPLES 8
METHODOLOGY 10
CONCLUSION 20
As your organization’s IAM champion, you will need to engage with key players across your
organization, including department and business owners who manage data sources and
application targets of the IAM system, decision-makers within senior management and at
the C-level, and the end-users who provide usability validations. This guide highlights the
stakeholder groups involved in each step of the process to ensure you engage with the
right people, at the right time.
The methodology presented in this guide is not absolute. You will need to adapt the steps
in this guide to fit your organization’s particular needs and situation. And while there is no
way to fully future-proof a username convention, following the steps in this guide will help
set your organization up for success.
Troy Moreland
Co-Founder & CTO, Identity Automation
Troy Moreland is an expert technologist in the field of identity and access management.
He has more than 20 years of relevant experience, including his leading efforts to
select, design, and deploy one of the first commercially successful identity management
implementations in the United States. Since Identity Automation’s founding, Troy has
architected, designed, and implemented identity management solutions for hundreds of
organizations including Adobe, CarQuest, Hunter Douglas, eBay, TDBank, Health Canada,
Lowe’s, Overstock.com, MD Anderson Cancer Center, Kansas University, State of Texas,
State of North Carolina and many more.
During the initial implementation of any Identity and Access Management (IAM) system, the
solution provider must coordinate with the customer organization on a variety of settings
in order to configure the new or replacement IAM system, such as password policies,
challenge questions, authoritative data source systems, audit retention policies, and many
others. The goal is to align the IAM configurations and policies with an organization’s
current governance operating model (e.g. business rules, processes, and security
requirements). One of the most important, but also the most challenging configuration
options, is defining the company’s username convention.
This guide provides the individual driving the project with a detailed approach to creating
an effective username convention that serves both current and future needs. By following
this approach, you can significantly reduce the time required to define and standardize their
username convention. To further aid in the process, a tear out sheet is included at the
end of the guide as a quick reference to the methodology steps.
Identity Automation, the Identity Automation logo, and the RapidIdentity name and wordmark are trademarks of
Identity Automation, LLC., registered in the U.S. and other countries.
The authentication process in most IAM systems comprises two basic elements:
identification and verification. Organizations typically deploy a username (e.g. jdoe, Changing an
jdoe@company.com, jane.doe) as the data value used in the identification step and a account username
password for the verification step. not only affects
every user, but the
While it’s worth mentioning that there are other authentication credential types (QR
Code, Smart Card, Fingerprint Biometrics, etc.), username and password remain the most username must
common, and this guide focuses on the traditional username format for the be changed in
identification step. every aspect of the
core IAM system
WHY ACCOUNT USERNAME CONVENTION MATTERS
and all connected
Before jumping into the details of the account username convention development
methodology, it is important to understand why this configuration is so crucial. The main
applications.
reason being that providing users with single sign-on (SSO) is a critical requirement of
the majority of identity management initiatives. To facilitate this, an identity management
project lead needs to establish a single identity for each user, with a single username and
password, that enables access to all application resources.
The benefits of SSO are well-documented and include enabling easy access to applications,
reducing support calls, and decreasing overall security risks. To meet these goals,
organizations need an account username convention that will be appropriate for every
connected system and user in the organization’s digital ecosystem for many years to come.
This requires not only considering usernames for employees, but also for the entire universe
of contingent users, such as partners, vendors, contractors, and other external audiences.
CHALLENGES
Developing an account username convention for all current and future users of an IAM
Service is no small task given that there will never be a single convention that completely
satisfies all users. Each user has opinions about what they think a username should or
should not be. Furthermore, systems and applications often use different, pre-defined
username conventions, such as first initial + last name, firstname.lastname, or email
address.
Keep in mind, changing a username is much more involved than changing another attribute,
such as job title. Almost everything in the IAM system is connected to or dependent on the
username. So, changing a username not only affects every user, but the username must be
changed in the core IAM system and all connected applications.
Note that in some organizations, the technology department sets the priorities, whereas
in others, priorities are set by the business or by external factors, such as compliance
regulations. Gartner1 describes other potential considerations in the formation of a
username, such as uniqueness, persistency, neutrality, universality, and memorability. Our
four drivers, which encompass these key points, are described below.
USABILITY
Usability is a top concern for end users and helps drive adoption of a new username
convention, as well as the IAM solution as a whole. The username is one of the very first
interactions a user will have with the new system. Organizations most concerned with
keeping users happy will set usability as the top priority. Name-based conventions, such as
“jdoe” or “johndoe,” are the most typical account naming conventions in this scenario.
SECURITY
The primary security concern with usernames is unauthorized access, more specifically, the
ability of an intruder to guess the username and therefore, know half of the authentication
credential. The typical account naming convention in a security prioritized scenario is a
system generated account name that is not directly linked to identity data in any way.
For example, using 4 letters + 4 numbers (e.g. qlvz4426 ) or combining words from a range
of different categories (e.g. biscuitcrispy). Online tools, such as JIMPX, can be used as a
AUDIT
Organizations need the ability to run reports that show the access history of specific
users—who did what and when. This requires a naming convention where the username
does not change (such as a primary key in a database), since access logs normally only
store usernames and not a GUID. A unique identifier from an authoritative data source,
such as employee ID for staff or contractor ID for external workers, would be the typical
username convention in this prioritized scenario. These are typically numerical identifiers,
like 234567890 or 3456543456. However, if the employee or contractor ID is a SSN or Tax
ID, an alternative unique identifier is typically used. Although IAM systems support renames
and tracking historical accounts, most third-party systems lack this ability. As such, access
logs cannot be guaranteed to resolve to the appropriate end user.
These guiding principles are the core of the methodology outlined below and have been the
cornerstone of the hundreds of IAM implementations Identity Automation has performed.
While there can be exceptions that prohibit utilizing this approach, this guide provides a
valuable perspective for any implementation. Additionally, these points are provided under
the current environments and market offerings, but future technologies could warrant
updates, changes, or additions.
Organizations typically begin the process of trying to decide what a good username will
be by asking what people like or prefer. One person might like email address, another may
prefer “firstname.lastname,” and a third may prefer it to be the same as his or her employee
ID. Essentially, everyone has a personal preference and makes a suggestion based on what
he or she finds important.
There are multiple flaws with this approach. It may seem like complying with this would be
part of the original drivers—usability. However, while that may be true, you are only going
to satisfy a subset of people whose preference aligns with the convention.
Step 1: Document Known Constraints - What can the username NOT be and why?
Step 2: D
evelop and Evaluate Possible Username Algorithms - Document possible conventions with pros, cons, and
risks. Exclude known constraints.
Step 3:Review, Recommend, and Next Steps - Give a summary of the analysis with a recommendation for the
username convention that best balances the drivers and carries the least risk. Once approved, configure the
IAM system with the “policy” and train end-users.
Each of the steps are documented in detail below with general descriptions, context, and specific examples.
For example, some applications will not accept an email address (e.g. jdoe@company.com)
as the username due to the “@” character. Thus, a known technical constraint would then
Recording known constraints eliminates options that cannot be used or that would create
a conflict with a business owner. Some constraints can be removed, but not without
impacting integrated services or applications. For example, if the only technical constraint
for not using the convention of “firstname.lastname” is that a single application cannot
support a username with a “.” in it, an organization may choose to postpone the application
integration and move forward with the convention.
Below is a list of potential constraints derived from best practice guides2,3 for selecting
username conventions, as well as known technical requirements of current and future
target services. This list also demonstrates how to capture and document constraints.
Must work with all current and future target systems to the extent possible.
Username constraints must comply with the most restrictive username policies across all
known current systems, as well as any under consideration.
Example: System 1 has a constraint of a maximum 255 characters for the username, System
2 has a constraint of a maximum 10 characters for the username, System 3 has a constraint
of a maximum of 12 characters for the username. Selected username criteria cannot contain
more than a maximum of 10 characters to ensure compatibility with System 2.
Usernames must not contain references to a particular type of user, as there is a possibility
of users that are some combination of affiliations.
Example: An employee of the enterprise is also a customer AND a member of the board.
Must work for users that move between departments and/or locations.
Usernames must stay static, while the account retains the ability to transition with the user
across departments and/or locations.
Example: Any employee in the Houston, Texas office who moves to the Raleigh, North
Carolina office should not have to change his or her username due to a location change.
Long user IDs are not only difficult to remember, but may also be incompatible with
current or future systems. Any convention selection needs to align with the most
restrictive username length of a target system.
Example: Many older, legacy systems limit the username convention to 8, 12, or 20 characters.
Many target systems do not allow or only allow a select few non-alphanumeric characters
within the username. Username constraints must adhere to the most restrictive policy in
current and known future systems.
Example: Google Apps does not allow spaces in the username and does not differentiate
between the same username with a period and one without (i.e. “j.smith” is evaluated as
“jsmith” within the system).
A username must not be used as a single authentication piece for any other system,
as usernames are visible to a wide audience. This means the username cannot be
considered a confidential value or PII.
Example: If an Employee ID was used as a username and the corporate cafeteria also
used the employee ID as a lunch PIN, then any employee would be able charge the lunch
account for another employee just by knowing the other employee’s username.
Username constraints should provide enough combinations for X number of active users
and accommodate the expected influx of new employees, contractors, and customers
without being reused. Additionally, username constraints should not only provide enough
combinations for the projected user population, but also enough to significantly decrease
the probability of a brute force attack against organizational resources.
Example: Sample use case of 4 billion unique combinations and a current population of
10 million. Using a password strength constraint of a minimum of 8 characters with a
minimum of 1 lowercase letter, 1 uppercase letter, and 1 number, there are a possible
Example: Usernames should not contain curse words, religious figures, political figures, or
politically charged words or statements.
Username naming scheme must comply with the most restrictive username policies
across all current and known future target systems.
Example: Some Linux / UNIX system usernames must start with an alpha character.
This enables local provisioning of specific departmental business systems with the
same username.
Username naming scheme must comply with the most restrictive username policies
across all current and known future target systems.
Example: Some UNIX based systems are case-sensitive, even when using Kerberos
authentication against case-insensitive systems.
Auditing requirements for this project demand that audit logs be retained indefinitely and
audit actions remain tied to the person to whom they apply. Therefore, a given username
should never be used by more than one person.
Example: Account jsmith is assigned to John Smith. Even after John Smith is no longer
within the source data for this project, the account jsmith must never be re-assigned to
another user.
Auditing requirements for this project demand that audit logs be retained indefinitely and
audit actions remain tied to the person to whom they apply, regardless of name change,
position change, department change, or location change.
This step can be frustrating if the list of constraints is long, leaving only a short list of
viable options. In these instances, the remaining potential username options may have
such a negative impact that the constraints must be reconsidered.
For example, the technical restraints of one target system can prevent a great username
convention from being created. If this is the case, it may be worth it to exclude this one
system and then flag it as an exception.
Below is a sample outline for generating the usernames after considering all the
appropriate constraints. This outline would be repeated for all username options.
SAMPLE OUTLINE
OPTION 1 Brief Description/Title
Username Convention A
Username Convention B
OPTION 1: A single username for all user affiliations in the enterprise (employees,
contractors, vendors, partners, and customers)
• There
is an unknown set of applications
• A
single username across all user affiliations • Due
to the extensive list of constraints and
that potentially has issues integrating with
is a viable option that will be successful pure scale of the IAM Service, each of the
IAM because of the multiple affiliation
across a large scale of applications and users. conventions results in a new username that
functions. If downstream applications
• This option aligns with the goal of the IAM is not easy to remember or particularly user-
cannot support this function, the
Service to provide every stakeholder in the friendly.
integration may not be successful.
organization with a single username and
• Mitigation
Strategy: Document this risk
password that will enable access to their
and explore the potential issue for each
business resources.
target application during the application
• The IAM Service is self-sustained for
planning stage.
username generation, management, and
• A
new username convention may result in
support, with minimum dependencies on
slow adoption by some departments who
external groups/processes.
currently have a wide-scale convention
• There will be a better user experience
with which users are already comfortable.
because IAM support structures will be more
• Mitigation
Strategy: Provide
able to solve issues internally.
documentation and justification as
• This is the only option that meets ALL initial
to why the username was selected.
known constraints and exclusions.
Understanding how and why the team
came to the recommendation can
alleviate some pushback. As the new
IAM username convention becomes more
widespread, other currently used identities
can be deprecated to ease the burden on
users who have multiple accounts.
• Pattern:
4 random [ (21^4) * (10^4) • xtwd9417 • T
he structure pattern • N
ew username will be
letters + 4 random - 10,000,000 ] = • rrqx3782 (4 letters + 4 numbers) a change that users
numbers 1,934,810,000 • lcqh9170 makes memorization may not potentially like.
• Excluding (~1.9 billion) • cbdz2371 easier because of the • E
asy to type incorrectly
vowels (a,e,i,o,u) • k szx7505 concept of chunking. because of misheard
(26^4)>(21^4) • M eets all currently characters, resulting
combinations known technical in operational and
• Excluding potential criteria and constraints. security impacts (e.g.
bad words/numbers • P rovides enough the wrong user’s
[~1000 bad words combinations for all password could be
* combinations] = users for 10+ years reset or the wrong
10,000,000 exclusions given current growth u
ser be given certain
and churn rates. entitlements).
• A
randomly generated
string of 4 letters could
deploy a potential
word that is considered
“bad” and must be
regenerated for that
user. A support process
needs to be established
to account for bad
username allocations
and provisioning.
• E
ach “bad” word or
number removed will
actually remove a total
of 10,000
p
ossible combinations,
thus eroding the total
namespace.
• C
annot identify the
type of user based on
username (good for
security, difficult
for administration).
The recommendation should provide a simple summary overview of the thought process,
guiding principles, and recommended username convention. It should show each option
and format, including pros, cons, and risks. The goal of the recommended option is to
minimize the challenges/risks and maximize benefits for the whole organization, while
balancing the four drivers: usability, security, administration, and audit.
Because there is no perfect answer, it is important to take extra time on this step to
ensure the best possible recommendation is made. Undoubtedly, there are pros, cons,
and risks associated with any recommendation. The key point is that the team should
feel the risks associated with the recommended option are manageable and that the
pros significantly outweigh the cons. While the increased usability factors obtained with
certain options may be appealing, consider potentially significant increased support risks
as well.
The following is an example memo and that can be attached to the detailed analysis
document for supporting information as needed.
After much research and discussion with the IAM team and key stakeholders throughout the organization,
we have reached a consensus on a recommendation for the IAM Service Account Username Convention.
The team recommends Option 1, Convention B: A single username for all user affiliations in the enterprise
(employees, contractors, vendors, partners, customers with the format 4 letters + 4 numbers = 8 characters
total (with no prefix).
We took extra time on this topic to ensure that the best possible recommendation was made because
we know there is no perfect answer. The recommendation reflects a balance between usability, security,
administration, and auditability. We have received feedback both for and against Option 1, as well as
Option 2.
There are pros, cons, and risks associated with our recommendation, which are detailed in the attached
document. However, the team feels the risks with Option 1 are manageable and the pros significantly
outweigh the cons. While the increased usability factors obtained with Option 2 were very appealing, with
this option, the IAM Service would also have significantly increased support risks.
In the attached document, you will find a detailed narrative of the process followed to develop the
recommendation. The pros, cons, and risks for each username option and convention are explored.
The IAM team kindly asks that you review the documentation and let us know if you are aware of any
absolute show-stoppers that would prevent us from moving forward with the Option 1 recommendation for
the IAM Service Account Username Convention.
Thank you,
No matter how much communication and documentation is provided, expect higher than
normal support demand during the initial deployment, as people get used to the new
system and username convention. Be patient because the change will be more significant
for end-users than for members of teams closer to the IAM project. Focus on the positive
aspects of the username change and what it will empower the users to do better, faster,
and easier.
This IAM configuration step is not easy, but it is critical. While it takes time and effort to
develop the right username convention with this methodology, getting it right the first time
is significantly less difficult than having to change the convention after deployment. This
guide was developed to steer organizations through this process and help them come out
the other side confident in the account username convention they have chosen.
SOURCES
1. “Best Practices in User ID Formation, 2012 Update - Gartner.” 28 Aug. 2012, https://www.gartner.com/
doc/2138117/best-practices-user-id-formation.
While the goal is to develop a convention that balances the four drivers, we recommend that organizations first prioritize
the drivers, so that any necessary trade-offs are understood.
METHODOLOGY
STEP 1: DOCUMENT KNOWN STEP 2: DEVELOP AND ANALYZE STEP 3: REVIEW, RECOMMENDATION,
CONSTRAINTS POSSIBLE USERNAME ALGORITHMS AND NEXT STEPS
Document any specific characters, formats, Algorithm General Format: The final step for the IAM Champion and
parameters, or styles that would create project team is to present a recommendation
OPTION 1
conflicts with current users, applications, for the username convention to the appropriate
• General Pros
systems, business processes, and/or regulatory decision-makers. A simple overview of the
• General Cons
requirements. thought process, guiding principles, and
• General Risks
recommended username convention should
• M ust work with all current and future target • Convention A
be provided.
systems to the extent possible • Combinations, Examples, Specifics Pros,
• Must work for the IAM and target system Cons, Risks
logging/auditing mechanisms • Convention B
• Must be available at the time the account is • Combinations, Examples, Specifics Pros,
provisioned Cons, Risks
• Must work for users with multiple affiliations
OPTION 2
• Must work for users that move between
• General Pros
departments and/or locations
• General Cons
• Must work for users associated with multiple
• General Risks
departments and/or locations
• Convention A
• Must be no longer than X characters
• Combinations, Examples, Specifics Pros,
• Must only contain alphanumeric characters
Cons, Risks
• Must not be a value used to access other
• Convention B
systems w/o a password
• Combinations, Examples, Specifics Pros,
• Should provide at least X number of unique
Cons, Risks
combinations
• Must mitigate risk of vulgarity and other
offensive values
• Must begin with an alpha character (a-z)
• Must be lowercase alpha characters
• Must never be reused by another person
• Should never change
Identity Automation’s RapidIdentity is the smart choice for companies looking to replace
outdated, legacy and home-grown identity tools with a proven and highly scalable modern
IAM solution. RapidIdentity is available for deployment on premise or in the cloud.
Deployments take weeks, rather than months or years, and RapidIdentity offers
the broadest set of out-of-the-box and configurable capabilities, including:
REATE POSITION
CREATE
Univers 55 Roman POSITION width of “I” Depth is width of “I”
Standard IA Light Gray
Univers 55 Roman Depth is 2x wid
Standard IA Light Gray “I” “I” Space between TM and logo is 0.5 x “I”
0.5x “I”
1x “I”
Align with top o
of ribbon.