BLOG

Who Owns the Contractor? The IAM Blind Spot You Can’t Afford to Ignore

Struggling with how to manage contractor and vendor access in higher ed IAM? You're not alone. Non-employee identities often fall outside HR and SIS systems—creating security gaps, compliance risks, and governance blind spots. In this blog, we explore why this issue matters more than ever and how to build sustainable, policy-driven strategies for third-party access. Don’t let unmanaged accounts put your institution at risk.
Mark Cox, CIDPRO™

Mark Cox, CIDPRO™

AVP, Strategic IAM Advisory Services

If you work in Identity and Access Management (IAM) in higher ed, you’ve likely had this moment:

“Hey, can we get an account for a vendor rep who needs access to Banner for a couple of weeks?”

“Sure… who’s their supervisor? Are they cleared for this? What is their full name, DOB, SSN, etc.? When should the access start and end? What exactly do they need access to besides Banner, such as email?”

Silence.

Welcome to the third-party identity problem—one of the messiest, least-owned corners of Identity Management.

In a perfect world, every digital identity would originate cleanly from a source such as HR or the student system. But our institutions don’t run on perfect worlds—they run on adjuncts, contractors, visiting researchers, community affiliates, volunteers, vendors, etc. And these people need access. Often immediately.

The problem is, they don’t neatly exist in our source systems. There’s no employee ID, no clean separation of duties, no built-in onboarding/offboarding event. And that’s where it gets dangerous.

The Hidden Cost of “Just Give Them an Account”

In many institutions, non-employees get manually entered into various directories or IAM platforms—sometimes with elevated access, often without governance, and usually without an expiration date. Then they stay active, long after the contract ends, the project wraps, or the person disappears.

I’ve seen universities with thousands of orphaned accounts belonging to “temporary” persons. It’s not just messy—it’s a compliance risk, a security risk, and a breakdown in institutional trust.

Why This Matters Now

As higher ed becomes more connected—with federated environments, third-party integrations, and cross-institutional collaboration—this gray area is only growing.

If your IAM strategy doesn’t have a thoughtful plan for non-employees, then it’s incomplete. And this isn’t just about access—it’s about governance, accountability, and protecting the mission.

A Conversation Worth Having

During our upcoming HESS Consortium Quarterly Webinar, I’ll be leading a session on how to design real-world, sustainable identity governance strategies for non-employees. Not just the theory—actual practices that institutions are using right now to bring structure to this part of the identity lifecycle.

We’ll cover:

  • Why HR and SIS can’t solve this for you
  • How to build policy-driven IAM workflows that include contractors, adjuncts, and affiliates
  • Tools and techniques for delegating ownership, setting expiration dates, and reducing audit risk
  • And how to make all this work without turning IT into the bottleneck

We’ll also talk about how we’re approaching this challenge at Fischer Identity.

Why This Topic Deserves a Closer Look

Third-party identities may not always have a clear system owner—but they absolutely represent a shared risk. If we’re serious about governance, compliance, and operational security, we can’t afford to let this population sit unmanaged on the sidelines of our IAM strategies.

This presentation will make the case for bringing non-employee identities into the center of your identity governance framework. It’s a chance to step back from reactive account requests and look at how we can build more sustainable, policy-driven practices that serve our institutions over the long term.

Whether you’re just beginning to think about this challenge or already knee-deep in exceptions and workarounds, this session will offer a practical path forward—rooted in real use cases, sector-specific complexity, and the lessons learned from institutions already leading the way.

HESS Consortium Quarterly Webinar Details

Webinar Title: Beyond the Directory: Governance Strategies for Managing Non-Employee Identities in Higher Education IAM

Presented by: Mark Cox, CIDPRO, AVP of IAM Strategic Advisory Services at Fischer Identity

Date/Time: September 25, 2025 | 11:00 AM (EST)

more blog posts

Interested in Learning More? Let's Connect!

Ready to Get Started?

We’ll tailor your demo to meet your specific needs, showcasing how the Fischer Identity solution:

 

  • Provides full life cycle management and a complete compliance framework.
  • Utilizes configuration-based setups with pre-built workflows and integrations.
  • Reduces help desk calls by utilizing an intuitive and user-friendly interface.
  • Handles complex IAM requirements without custom coding.

“We’ve been able to achieve our security and IAM-related goals and SLAs, plus accelerate the introduction of new services to our constituents due to the operational efficiencies afforded by Fischer.”

Jon Allen
CIO & CISO at Baylor University