Contact me
Suralink

reducing Workflow Interruptions Through an Impersonation Feature

overview

In the world of audit and accounting, timing and precision are critical. This project aimed to strengthen Suralink's secure file-sharing platform by adding an impersonation feature, allowing firms to maintain consistent workflow even when key team members are unavailable. This feature empowered users on PTO or temporarily unavailable to delegate secure access to colleagues, ensuring uninterrupted file exchange and smooth project progression.

Note: I-Plan, is a custom digital tool launched a year before this project. It helps students map out their academic path to graduation. By 2019, all students were required to pre-plan their courses using I-Plan all the way through graduation.

MY ROLE
Product Design Lead
User Research
Visual Design
TEAM
Miguel Perez, VPP
Jordan Nalaui, PM
TIMELINE
2022
2 months
TOOLS
Figma
Miro
Jira

Problem statement

When team members took PTO or were otherwise unavailable, secure document exchanges were often delayed, disrupting project timelines and creating potential risks around missed deadlines. In an industry where timeliness and continuity are critical, firms needed a reliable way to keep projects moving without compromising the security of sensitive information. Our task was to explore solutions that would enable teams to handle file access gaps seamlessly during absences, ensuring uninterrupted workflows.

Hypothesis

Our hypothesis was that by creating a secure way for users to temporarily delegate access to colleagues, we could eliminate workflow disruptions while maintaining the highest standards of security and transparency. To validate this, we focused on understanding the intricacies of existing workflows during PTO and the user expectations surrounding delegation and security.

Key Challenges

To test our hypothesis, we conducted interviews with 15 users (accountants, auditors, and administrative staff) to understand their challenges around PTO workflows and document exchange. These interviews revealed critical insights:

Timing is Everything

Audit and tax deadlines are rigid, and any delay due to personnel absence can have serious consequences. Firms reported that missed deadlines due to unavailability directly impacted client trust and project outcomes.

Approval Workflows

In large firms, PTO usually follows a formal approval process, where a manager must first authorize the absence, and then an administrator assigns temporary access rights to a trusted colleague.

Transparency and Accountability

Users highlighted the need for transparency when delegating access. They wanted assurance that colleagues could manage files seamlessly on their behalf while providing clients visibility into who was handling sensitive data.

Ideation and Solution Exploration

With the insights in mind, we explored several design directions for a solution:

  • Delegated Access RequestsWe considered a system where absent users could manually delegate file access. However, this option introduced complexities for users on extended leave, as it required pre-emptive planning and frequent access adjustments.
  • Role-Based Permissions AdjustmentsAnother approach was dynamically adjusting role permissions during absences, but this would involve substantial administrative work to track and remove permissions accurately post-PTO.
  • Impersonation as a Secure SolutionFinally, we arrived at the concept of an impersonation feature. This approach would allow a designated colleague to temporarily "impersonate" the absent user, enabling seamless file access without needing additional client-facing actions. This solution met our primary criteria of being easy to set up, secure, and transparent.

Solution Design: The Impersonation Feature

Once we confirmed the potential for an impersonation feature, we defined the design requirements based on our research findings:
Seamless Administrator Setup

Administrators can assign impersonation permissions by selecting an absent user, designating a colleague as the replacement, and specifying the duration of coverage. This streamlined scheduling ensured clear start and end dates, reducing the risk of unauthorized access.

Transparent User Notification

Both the absent user and the designated impersonator receive notifications detailing the impersonation period, ensuring visibility and accountability. Clients are also notified, allowing for full transparency around who is managing their files.

Tracking and Auditing for Compliance

We included a tracking dashboard to log all impersonation activity, enabling administrators to review permission histories for compliance purposes. This added visibility ensured that firms could maintain an audit trail, reinforcing trust and data integrity.

Validation and Iteration

To test the impersonation feature, we conducted usability testing sessions with pilot users, focusing on the administrator setup and transparency notifications.

Feedback Highlights

  • Ease of Setup: Users appreciated the simple setup flow, reporting that it took less than two minutes to assign and schedule impersonation.
  • Transparency:Notifications helped maintain client confidence, as clients felt informed about who accessed their files.
  • Compliance Tracking:Administrators valued the tracking dashboard, highlighting its utility in managing and reviewing access permissions, especially for internal audits..
Iteration Based on Testing
Based on feedback, we fine-tuned the notification system to include a confirmation message when impersonation started and ended, further reinforcing client trust. We also improved the dashboard layout, making it easier for administrators to view and adjust impersonation permissions.

Outcomes and Impact

The launch of the impersonation feature significantly enhanced workflow continuity and user satisfaction.

Reduction in Workflow Delays

Teams reported fewer delays in document exchange, directly improving project timelines and overall client satisfaction.

Increased User Satisfaction

Customer feedback was overwhelmingly positive, with users noting the balance of accessibility and security, especially appreciating the transparent notifications.

Boosted Compliance Confidence

By logging impersonation activities and ensuring an audit trail, the feature increased firms' confidence in their ability to meet compliance standards, further reinforcing trust with their clients.

Increased Administrative Efficiency

Administrators spent significantly less time managing impersonation permissions, freeing them to focus on other priorities.

Conclusion

By beginning with a clear problem, workflow disruptions during absences, and approaching it through iterative research and user validation, we developed a tailored solution that was both secure and user-centered. The impersonation feature not only addressed PTO-related challenges but also reinforced client trust, enhanced operational resilience, and set a new standard for continuity in secure document exchange.

This case study highlights the value of a problem-first approach and the impact of user-centered design in delivering features that balance usability, security, and transparency.