TJ Hoag

It's Just a Password Reset - Until It Isn't

TJ
Timothy J. Hoag
IAM & IT Operations Specialist

I got a ticket once from a university employee on a work trip for a contract with the government. They were on the road, laptop in hand, totally locked out of their machine.

The issue wasn't that they forgot their password. They had changed it. But their laptop never synced with Active Directory before they left the office, so the device was still holding onto the old credentials. No VPN, no line of sight to the domain, no way to log in.

Result: a fully capable professional, with all the right approvals, totally blocked from doing their job because identity failed at the most basic layer. Device and directory didn't agree on who they were.

This Isn't an Edge Case

In hybrid environments, this isn't a one-off bug. It's a pattern. And once you start looking for it, you see it everywhere:

  • Devices that haven't checked in for days or weeks - laptops sitting on home Wi-Fi, never connecting to the corporate network or VPN long enough to sync
  • Password changes done off-network with no sync - user changes their password through a web portal, but the device still has the old cached credentials
  • "We'll fix it when you're back on campus" as the unofficial policy - kicking the problem down the road because there's no remote remediation path

In higher ed, this hits differently. Faculty travel for conferences. Researchers work from field sites. Staff split time between campuses. These aren't remote workers by choice - they're mobile by necessity. And the identity infrastructure wasn't always designed for that.

Where It Gets Dangerous

When access doesn't work, people get creative. And "creative" in an identity context usually means insecure:

  • Shared accounts - "Just use mine until yours works"
  • Unsafe local copies - downloading sensitive files to personal devices "just in case"
  • "Just email it to my personal inbox so I can keep working" - FERPA-protected student data leaving the institutional boundary

That's where data breaches start, especially in higher ed and healthcare, where access failures carry real compliance weight. A HIPAA violation doesn't care that your AD sync was delayed. A FERPA audit doesn't accept "the VPN was down" as an excuse for why student records ended up in a personal Gmail.

The Real Problem

The technical fix for that original ticket was straightforward. But the real problem wasn't the ticket - it was that we were treating a systemic gap as an individual incident.

Every one of these tickets is a signal. When you see the same pattern across multiple users, multiple campuses, multiple months, you're not looking at a help desk problem. You're looking at an architecture problem.

IAM isn't just SSO dashboards and architecture slides. It's the difference between "I can do my job from anywhere" and "I'm stranded in an airport with a brick."

Questions Worth Asking

If you own an identity environment, especially in higher ed or healthcare, these are the questions that matter:

  • How many of our devices could board a plane today without a recent sync? If you can't answer that, you don't have visibility into your own attack surface.
  • What's our playbook for password changes when users are off-network? If the answer is "call the help desk," you've got a single point of failure that doesn't scale.
  • Do we treat these as edge cases or as first-class scenarios in our design? Because your users are already living in these scenarios. The only question is whether your infrastructure is keeping up.

The Cost of Access Failure

The cost of access failure isn't just an annoying ticket. It's lost time - a professional grounded for a day or more while waiting for IT to catch up. It's bad workarounds - the shadow IT that fills the gap when official channels fail. And it's real risk to the data we're supposed to protect.

Every "just a password reset" ticket is worth a second look. Because sometimes it's not about the password at all. It's about whether your identity layer can actually support the way people work.


This post is based on real incidents from my work supporting 30+ higher education institutions. Details have been generalized to protect institutional privacy.

Opportunities
Open to Remote Roles

IAM Analyst, Junior Systems Administrator, or IT Operations Analyst - ideally in healthcare or higher education. Direct hire, W-2.

Discuss opportunities