Skip to Main Content
Cloud Management and AIOps


This is an IBM Automation portal for Cloud Management, Technology Cost Management, Network Automation and AIOps products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).

Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.

Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Submitted
Workspace Targetprocess
Categories User Experience
Created by Guest
Created on Feb 24, 2026

Enhancement Request: Preserve Multi-Token First/Last Names in Front Door ↔ Targetprocess Sync

Description of the Problem

We are experiencing a recurring identity-data issue for users whose first or last names consist of multiple tokens

In our environment:

Users authenticate to Apptio Targetprocess via Front Door SSO backed by Corporate Active Directory (AD).

We also run a daily ADM import (“WFM – ADM Import – PDOS Labor”) that updates user data in Targetprocess.

For affected users, the first and last name fields in Targetprocess are being overwritten back and forth depending on which integration last wrote the data:

After the ADM import, the user is correctly stored as:

First name: First First

Last name: Last

After the user logs in via Front Door SSO, the same account is changed to:

First name: First

Last name: First Last

This cycle repeats daily: the morning ADM import fixes the name, and the next Front Door login breaks it again.

We have reproduced the pattern with several users that have a space in their first name, so this appears to be a general parsing/formatting limitation rather than a single bad record.

Verified Source Data (AD)

In Active Directory, the data for a representative affected user is correct and clearly separated:

DisplayName: First First Last

GivenName: First First

Surname: Last

UserPrincipalName: FirstFirst.Last@…

So the root issue is not incorrect AD attributes; rather, it is how the name is parsed and mapped between Front Door and Targetprocess.

Current Behavior / Limitation in Targetprocess & Front Door

Through support, we have confirmed the following:

The background sync between Targetprocess and Front Door does not truly differentiate between first and last name in a way that supports multi-token names.

In the Authentication & Security settings, the “full name format” for Front Door users can only be configured as:

"First Last" or

"Last, First"

There is no way to distinguish between:

First First Last (multi-token first name)

First Last Last (multi-token last name)

As a result, whenever a user logs in through Front Door, the sync logic effectively splits on the space and reassigns name components in a way that is incompatible with our AD structure and with real-world names.

We attempted to mitigate this inside Targetprocess by creating an automation rule to detect and revert incorrect name changes during business hours (when most logins occur). However, due to how rule execution works, this caused an infinite loop of updates and was not a viable workaround.

Business Impact

This is not purely cosmetic. We have multiple downstream processes and scripts that rely on stable, predictable user first/last names in Apptio Targetprocess. Because the names oscillate:

Scripts and automations fail intermittently when the name format changes.

We incur manual rework and additional troubleshooting effort to reconcile which name variant is currently stored.

It creates data integrity issues when correlating users across systems that correctly store multi-token first names.

As our user base includes many individuals with spaces in their first or last names, this issue is systemic and impacts data quality across our environment.

Requested Enhancement

We request an enhancement to the Front Door ↔ Targetprocess identity synchronization and/or Authentication & Security configuration to properly support multi-token first and last names. Specifically, we are looking for one or more of the following capabilities:

Configurable Field Mapping Using AD Attributes

Allow mapping Targetprocess FirstName and LastName directly from specific AD attributes (e.g., GivenName, Surname) rather than relying on a simple “full name” string and splitting logic.

Ensure that multi-token values in GivenName and Surname are preserved as-is and not re-parsed or re-split by Front Door.

Enhanced Full Name Parsing Options

Extend the “Full name format” options beyond just "First Last" and "Last, First" to support multi-token names such as:

First First Last

First Last Last

Provide explicit configuration to indicate which side (first or last name) may legitimately contain spaces, and ensure those tokens are not automatically moved across the boundary.

Preserve Existing Targetprocess Name When Ambiguous

When the sync cannot confidently parse the full name into first and last components, provide an option to:

Not overwrite existing Targetprocess first/last name values; or

Only update name fields when they are empty or known to be incorrect, instead of always forcing the split result from Front Door.

Administrative Override / Protection for Specific Users

Optionally, allow administrators to “lock” first/last name values for specific users in Targetprocess so that SSO sync does not override them, particularly when AD is already the source of truth and the current Targetprocess values are correct.

Why This Needs Platform Support (and Cannot Be Solved Locally)

AD already stores the name correctly and distinctly (GivenName vs. Surname).

The current Front Door + Targetprocess configuration model does not allow a reliable way to:

Preserve multi-token first names, or

Respect AD attributes as the authoritative first/last name split.

Attempts to fix it purely through imports or automations in Targetprocess lead to conflicts with the SSO sync and, in our case, infinite update loops.

Given these constraints, we believe this requires a platform-level enhancement to the name handling logic in Front Door / Targetprocess.

Summary

We are asking IBM to:

Enhance the Front Door ↔ Targetprocess identity sync so that multi-token first/last names are correctly supported, preferably via:

Direct AD attribute-based mapping (e.g., GivenName → FirstName, Surname → LastName), and/or

More flexible and explicit full-name parsing and overwrite rules.

Provide a configuration path that allows customers to avoid the constant “tug-of-war” on user names between imports and SSO logins, which is currently causing real failures in downstream automation.

We would be happy to provide concrete examples, logs, and configuration screenshots to help validate and design the enhancement.


Idea priority Low