Case USA80: How a National Digital Identity Program Repackaged Onboarding UX as Enterprise Architecture Readiness
- Sunil Dutt Jha

- Jul 29
- 2 min read
Overview:
This case is part of a 100-diagnostic series revealing how US government digital transformation programs have mislabeled front-end improvements as “Enterprise Architecture progress.”
In national digital identity programs, a recurring pattern is treating a smooth citizen onboarding experience as proof of architectural readiness.
Citizens could register quickly, verify identity online, and receive instant confirmation — yet the enterprise structure linking identity lifecycle management, policy enforcement, integration with public services, and security governance was never modeled.
P1–P6 Insight Preview:
These six perspectives define how an enterprise connects intent to execution
— P1: Strategy, P2: Business Processes, P3: System Behaviors, P4: Component Governance, P5: Implementation, P6: Business & Technology Operations.
P1 (Strategy): Onboarding improvements were tied to adoption KPIs but not to long-term identity trust, cross-service usability, or fraud reduction goals.
P2 (Process): Registration was streamlined, but revocation, renewal, and cross-agency authentication processes remained inconsistent.
P3 (System): Identity systems weren’t behaviorally integrated with service access platforms, law enforcement, or financial verification networks.
P4 (Component): Identity verification modules, databases, and API gateways were governed separately, creating inconsistent rules enforcement.
P5 (Implementation): Development prioritized visible onboarding features, while integration with high-risk services was delayed.
P6 (Operations): Business ops could register citizens faster, but tech ops dealt with rising integration issues and patchwork security monitoring.
Stakeholder Impact Summary:
CEO/Program Director – responsible for trust, security, and adoption: Limited by weak P1 Strategy — adoption grows, but the program cannot guarantee long-term identity integrity across services.
CIO – oversees technology integration and platform stability: Impacted by P3 System Behaviors and P4 Component Governance — identity data and access rules vary by system, increasing complexity.
Sales Head (Public & Agency Engagement) – drives agency adoption and citizen participation: Affected by P2 Processes and P5 Implementation — can promote quick sign-ups but struggles to onboard high-value services securely.
Chief Enterprise Architect – ensures enterprise-wide integration and security alignment: Faces P1–P6 issues — onboarding is well-designed, but the underlying identity architecture is incomplete.
Head of Identity Operations – manages day-to-day issuance, updates, and enforcement: Feels P2, P3, & P6 — must manually coordinate with agencies to handle revocations, fraud cases, and renewals.

