PER-005: David Murphy — Organization Administrator
Draft UERQ-PLANS-59 Operator Application
“I need to ensure our company’s flight operations are strictly isolated from others, and that I have total control over who represents our organization in the eyes of the Authority.”
1. Identity
| Field | Value |
|---|---|
| Persona ID | PER-005 |
| Name | David Murphy |
| Age | 41 |
| Job Title | Director of IT & Compliance / Organization Administrator |
| Organization Type | Mid-size commercial drone services company (60 employees) providing infrastructure inspection, utility corridor mapping, and emergency response operations across four states. Operates a fleet of 20 aircraft under Part 107 with active BVLOS waiver applications. Has a centralized IT department managing corporate identity (Azure AD), device management, and regulatory compliance tooling. |
| Persona Type | Secondary (Operator Application — Administrative) |
2. Professional Context
Responsibilities
- Creates and maintains the organization’s digital identity on the ATOMx platform: legal name, organization type, entitlements, and billing configuration.
- Manages the organization’s identity realm: determines whether users authenticate via local accounts, corporate SSO (Azure AD), or SCIM-based provisioning.
- Invites users into the organization, assigns roles (Pilot/Operator, Fleet Manager, Organization Viewer, Billing Administrator), and removes departing employees.
- Controls which entitlements the organization applies for (Operator, Authority, OEM) and ensures the organization’s credentials and verification status remain current.
- Defines and enforces the organization’s authentication policy: MFA requirements, session timeout, concurrent session limits, and step-up authentication for high-risk functions.
Team & Reporting
- Reports to the VP of Operations.
- Works alongside the IT Security Manager (who manages the corporate Azure AD tenant) and the Fleet Operations Manager (who manages day-to-day flight operations).
- Coordinates with a Legal/Compliance Officer on regulatory data retention and audit requirements.
- Does not manage pilots or field personnel directly — his users are the people who manage those users.
Operational Environment
- Primary: Corporate office with dual-monitor workstation. Standard enterprise IT infrastructure with Azure AD, Okta, or equivalent corporate identity provider.
- Secondary: Occasional remote access from home via VPN for urgent user provisioning or access revocation (e.g., when an employee is terminated and must be removed from the platform immediately).
- Does not use mobile devices for ATOMx administration.
Technical Proficiency
- Highly proficient with enterprise identity platforms: Azure Active Directory, Okta, SAML/OIDC federation concepts, and SCIM provisioning.
- Understands claims mapping, group-to-role mapping, and SSO configuration at a practitioner level. Not a software developer; cannot write custom integrations or troubleshoot API-level federation errors without vendor support documentation.
- Comfortable with web-based admin consoles, directory management tools, and compliance dashboards. Uses Jira, Confluence, and Microsoft 365 daily.
- Familiar with FedRAMP access control requirements from prior government contracting work.
Decision Authority
- Can independently create the organization on ATOMx, configure its identity integration model, and manage all user lifecycle operations (invite, role assignment, removal, deactivation).
- Can select and configure the organization’s authentication method: local accounts, federated SSO (OIDC/SAML), SCIM provisioning, or JIT provisioning.
[UERQ-SYS-1996]Can claim the organization’s email domain to route new registrations.[UERQ-SYS-1978] - Can configure organization-level policies: session timeout, concurrent session limits, MFA requirements, registration fee settings, and audit log retention.
- Must escalate to VP of Operations for: requesting new entitlements (Authority, OEM), authorizing organization consolidation (merging duplicate organizations), and approving changes that affect active flight authorization capability.
- Cannot modify platform-level configurations, tenant infrastructure settings, or another organization’s data.
Regulatory Context
- Organization operates under Part 107 with BVLOS waiver applications pending.
- Subject to client-mandated NDAA compliance and FedRAMP-aligned access control requirements (NIST SP 800-53 AC-2, AC-3, IA-2, IA-5). Must maintain auditable records of all user provisioning, role changes, and access revocations for regulatory review.
- Company security policy requires federated SSO for all enterprise platforms — local password-based accounts are acceptable only as an interim measure during initial onboarding.
3. Goals
Life Goals
- Establish the company as a model for secure, well-governed drone operations that authorities trust implicitly.
- Advance to a CISO or VP of IT role as the company scales.
- Be recognized internally as the person who eliminated “identity friction” — the gap between corporate identity and platform-specific credentials.
Experience Goals
- Feel confident that no one outside his organization can see, access, or modify his organization’s data — strict tenant isolation is not just a claim but a verifiable architectural guarantee.
[UERQ-SYS-1919, UERQ-SYS-1511] - Feel in control of who represents his organization on the platform: every user is invited, every role is intentional, and no one can self-claim membership without his approval.
[UERQ-SYS-1988] - Not feel like he is maintaining two identity systems: the corporate IdP and a separate ATOMx password. The login experience for his users should be seamless corporate SSO.
- Trust that when he removes a user from the organization, that user’s access is terminated completely and immediately — no orphaned sessions, no lingering permissions.
End Goals
- Complete initial organization setup (registration, identity integration, first user invitations) within one business day.
- Transition the organization from local accounts to federated SSO (Azure AD via OIDC) without interrupting any active flight authorizations or forcing pilots to re-register.
- Configure SCIM provisioning so that user onboarding and offboarding in Azure AD automatically creates and deactivates ATOMx identities within the organization’s realm.
[UERQ-SYS-1982] - Verify at any time that the organization’s data isolation is intact: no cross-organization data leakage, no shared identity linkage.
[UERQ-SYS-1986] - Generate an audit report of all user provisioning, role changes, and access events within the organization for quarterly compliance review.
[UERQ-SYS-1968, UERQ-SYS-1994]
4. Frustrations & Pain Points
Current Pain Points
- “Identity Friction” — pilots and field staff must manage a platform-specific username and password in addition to their corporate login. This creates password fatigue, support tickets for forgotten credentials, and a security gap where departed employees retain platform access until someone remembers to revoke it manually.
- No visibility into whether the platform’s tenant isolation actually separates his organization’s data from others, or whether it’s just application-layer filtering that could be bypassed.
- Entitlement management is opaque: after applying for Operator entitlement, there is no self-service way to check application status, understand what capabilities the entitlement unlocks, or see which roles become available.
- User provisioning is manual and does not sync with corporate directory: every new hire requires a separate ATOMx invitation, and every departure requires a separate ATOMx deactivation. These fall out of sync.
- No way to test an SSO configuration change (e.g., switching from local accounts to Azure AD) in a staging or preview mode before it affects production users.
Workarounds
- Maintains a spreadsheet mapping employee names to ATOMx user accounts because there is no directory sync.
- Relies on a manual “offboarding checklist” that includes “revoke ATOMx access” as a line item — but this depends on HR notifying IT promptly.
- Has created a shared service account for initial testing because he cannot test the login flow as a different user without a second identity.
- Sends calendar reminders to himself to check credential expirations and attribute renewal deadlines because the platform’s notification system does not alert organization administrators proactively.
Unmet Needs
- Seamless federation: the ability to configure OIDC or SAML SSO so that his users authenticate with corporate credentials and never see a ATOMx-specific login page.
[UERQ-SYS-1954, UERQ-SYS-1955] - Automated lifecycle sync: SCIM or JIT provisioning that creates, updates, and deactivates ATOMx identities automatically when Azure AD directory changes occur.
[UERQ-SYS-1982, UERQ-SYS-1957] - Domain claiming: the ability to claim his organization’s email domain so that any employee who registers independently is routed into his organization’s realm rather than creating a separate, unmanaged organization.
[UERQ-SYS-1978] - Organization consolidation: if employees have already self-registered before David set up the corporate organization, he needs to merge those orphaned single-user organizations into the corporate org without losing their authorization history.
[UERQ-SYS-1979] - An organization admin dashboard showing: active users, role distribution, authentication method, last login, credential expiration dates, and audit log access.
5. Safety & Operational Context
Safety-Critical Decisions — errors in authentication configuration, user deprovisioning, or role assignment can result in platform lockouts during active flights, unauthorized access, or unqualified users holding safety-critical roles.
Safety-Critical Decisions
- Configuring the organization’s authentication policy. An incorrectly configured SSO federation could lock out all pilots from the platform, preventing them from confirming authorization status or receiving rescind notifications during active flights.
[UERQ-SYS-1692, UERQ-SYS-1996] - Removing a user from the organization. If a user with active flight authorizations is removed, their session must be terminated and the FAS must be aware that the operator’s organizational affiliation has changed. Improper deprovisioning could leave an unauthorized person with an active flight authorization.
[UERQ-SYS-1937, UERQ-SYS-1917(c)] - Assigning roles. Granting a user the Authorizer or Rule Administrator role (if the organization holds the Authority entitlement) gives that user safety-critical decision authority. An incorrect role assignment could allow an unqualified person to approve or deny flight authorizations.
[UERQ-SYS-1918] - Transitioning authentication methods. Moving from local accounts to federated SSO during active operations. If the transition invalidates existing sessions or credentials, pilots in the field may lose access to their authorization status.
[UERQ-SYS-1996]
Time Pressure
| Context | Time Budget | Notes |
|---|---|---|
| Normal operations (setup, SSO, user mgmt) | Days | Strategic tasks; low time pressure |
| Employee termination | Minutes | Revoke access immediately; deprovisioning must be fast and complete |
| Authentication emergency (IdP outage) | Minutes | Understand fallback behavior; potentially enable temporary local auth without disrupting active flights |
| Credential expiration cascade | Hours | Bulk renewal window missed; multiple operators lose eligibility simultaneously |
Information Needs During Stress
Are any of my users currently in active flight? Can they still see their authorization status? Does ATOMx cache their session, or are they locked out? Which users were last authenticated, and when?
[UERQ-SYS-1933]David does not need during stress: flight planning details, traffic data, rule configurations, jurisdiction boundaries, or billing information.
Failure Tolerance
- Corporate IdP outage: If Azure AD is unavailable, David’s users cannot authenticate via SSO. The system should either maintain existing authenticated sessions (no forced re-auth during active flights) or support an emergency fallback authentication method. David needs clear status indication: “Federation unavailable — existing sessions preserved.”
[UERQ-SYS-1692] - SCIM sync failure: If the SCIM provisioning pipeline fails, user creates and deactivations in Azure AD are not reflected in ATOMx. David needs an alert and a manual reconciliation interface. Departed employees may retain active ATOMx accounts during the sync gap.
- Organization state transition error: If the organization enters Suspended state unexpectedly
[UERQ-SYS-1998(c)], all user sessions are terminated and new authentication is denied. David needs immediate notification and a clear escalation path to restore Active state.
Consequence of Error
- Incorrect SSO configuration: All users locked out of the platform. Pilots in the field cannot confirm authorization status, cannot receive rescind notifications, and cannot close out active flights. Active flights continue under cached authorization
[UERQ-SYS-1531], but the organization is operationally blind. - Failure to revoke departed employee: A terminated pilot retains platform access and could submit flight authorization requests on behalf of the organization, creating unauthorized operations and regulatory liability.
- Role assignment error: Granting Authority-level roles (Authorizer, Rule Administrator) to a user who should only have Pilot/Operator access could allow that user to approve or deny flights, rescind authorizations, or modify airspace rules — all safety-critical actions.
- Domain claiming error: Failing to claim the corporate email domain allows employees to self-register and create independent, unmanaged organizations. Their flight operations are not visible to the corporate organization and are not governed by corporate security policies.
Training & Certification
- No FAA pilot certificate required (David is not an operator).
- Enterprise identity management certification (e.g., Microsoft Identity and Access Administrator, Okta Certified Professional) or equivalent experience.
- Company requires completion of ATOMx Organization Administrator onboarding before production configuration changes.
- Expects detailed documentation for SSO federation setup, SCIM integration, and claims mapping — not a wizard-only experience that hides the underlying configuration.
- Familiar with NIST 800-53 access control framework, FedRAMP identity requirements, and SAML/OIDC protocol mechanics.
6. Key Scenarios
Scenarios are documented as individual pages under the Key Scenarios section.
| Scenario | Status | Summary |
|---|---|---|
| SC-01: Organization Setup | Routine | Initial registration, identity config, and first user invitations |
| SC-02: SSO Migration | Exception | Transitioning 15 users from local accounts to Azure AD federation |
| SC-03: Emergency Offboarding | Emergency | Revoking access for a terminated pilot with an active flight |
| SC-04: Domain Claiming | Exception | Claiming the corporate domain and consolidating orphaned organizations |
| SC-05: Compliance Audit | Routine | Quarterly audit report preparation for access governance review |
7. System Interaction Profile
Corporate office — dual-monitor setup. Organization admin dashboard for identity, user lifecycle, and compliance.
Emergency remote access for user deactivation, SSO troubleshooting, or IdP outage response.
Session Pattern
| Phase | Platform | Duration | Activity |
|---|---|---|---|
| Steady-state | Office workstation | 30–60 min, 1–2x/week | User management, credential monitoring, audit review |
| Setup / migration | Office workstation | 1–3 hours | Organization setup, SSO configuration, SCIM integration |
| Emergency | Office or laptop | Minutes | Employee offboarding, IdP outage response |
Session inactivity timeout
[UERQ-SYS-1964] should not disrupt David during a multi-step SSO configuration workflow: the system should preserve draft state.Data Volume
- Manages 15–60 user accounts within the organization.
- Typical role distribution: 1–2 Organization Administrators, 1–2 Fleet Managers, 1 Billing Administrator, 10–50 Pilots/Operators, 2–5 Organization Viewers.
- Needs access to the organization’s full audit history (up to 7 years) for compliance reporting.
- User management operations: 1–5 per week during steady state; 10–20 during onboarding waves.
Notification Needs
| Priority | Delivery | Examples |
|---|---|---|
| Critical | Immediate, audible | Organization state change (Active→Suspended), federation/IdP connectivity failure, SCIM sync failure, break-glass access triggered |
| High | Banner, within 30 sec | User invitation accepted/declined, user deactivation confirmed, credential expiration warning, domain claim verification pending |
| Normal | Queue/digest | Audit log export complete, SCIM sync summary (daily), login activity summary (weekly), entitlement renewal reminders |
Collaboration Needs
- Coordinates with the Fleet Manager on user access needs: which pilots need Pilot/Operator role, which need elevated permissions.
- Coordinates with the IT Security Manager on Azure AD group-to-role mapping and SCIM provisioning configuration.
- Does NOT interact with authorities, other organizations, or the platform administration team through the ATOMx interface — those interactions happen through support channels.
- May need to coordinate with the Billing Administrator (or hold that role himself) on subscription and payment configuration.
8. Traceability
| Field | Value |
|---|---|
| ConOps Actor(s) | Organization Administrator, Identity & Access Architect |
| IAM Role(s) | Organization Administrator (UERQ-SYS-1917): manage organization identity realm, user lifecycle, role assignments, authentication policy, and entitlement configuration. |
Linked Requirements — IAM (Organization & Identity)
- UERQ-SYS-1898–1901: Organization Registration and Operator Entitlement
- UERQ-SYS-1916: Organization Registration
- UERQ-SYS-1917: Organization User Management (invite, assign, remove)
- UERQ-SYS-1918: Organization Roles (entitlement-gated)
- UERQ-SYS-1919: Organization Data Isolation
- UERQ-SYS-1933: Session Management
- UERQ-SYS-1935–1937: Operator Lifecycle (profile, audit, deactivation)
- UERQ-SYS-1954–1957: Federation (OIDC, SAML, Claims Mapping, JIT Provisioning)
- UERQ-SYS-1964: Session Inactivity Timeout
- UERQ-SYS-1968: Audit Log Retention
- UERQ-SYS-1976: Organization-First Registration
- UERQ-SYS-1978: Domain Claiming
- UERQ-SYS-1979: Organization Consolidation
- UERQ-SYS-1982: SCIM 2.0 Provisioning
- UERQ-SYS-1985–1986: Organization-Isolated Identity, No Cross-Org Identity Sharing
- UERQ-SYS-1988: Controlled User Provisioning
- UERQ-SYS-1994: Audit Log Export and SIEM Integration
- UERQ-SYS-1996: Per-Organization Identity Integration
- UERQ-SYS-1998: Organization Lifecycle States
Linked Requirements — IAM (Access Control)
- UERQ-SYS-1510: Role-Based Access Control
- UERQ-SYS-1511: Tenant Isolation
- UERQ-SYS-1608: Audit Data Access Control — Authority Scope
- UERQ-SYS-1692: Federation Failure Handling
Linked Outcomes
To be populated during Outcome Registry development. Expected: Organization setup completion time, SSO migration success rate (zero-downtime), User deprovisioning latency, SCIM sync reliability, Audit report generation time, Orphaned organization detection rate.
Application Screens
To be populated after Information Architecture is complete. Expected: Organization Admin Dashboard, User Roster & Role Management, Identity Integration Settings (SSO/SCIM), Domain Management, Organization Consolidation Wizard, Audit Log Viewer & Export, Entitlement Management, Credential & Attribute Monitoring.
9. Revision History
This persona is hypothesis-based. It will be validated and revised when customer access becomes available per Section 3.3 of the Persona Template & Guidance document.
| Version | Date | Author | Changes |
|---|---|---|---|
| 0.2 | Apr 2026 | — | Imported from Jama (was PER-002 in source). Reassigned to PER-005. Reformatted with Hextra shortcodes, scenarios extracted to sub-pages, corrected OCR artifacts, renamed ATOMx→ATOMx. |
| 0.1 | Feb 2026 | — | Created from internal knowledge extraction and Organization Administrator persona snapshot. Full template compliance. Pending customer validation. |
Last updated on