Collect information about the requestor and find the appropriate user profile, if it exists. User profile information is in
user identities, which is maintained by both Security Management and Workforce Management. If a user profile already
exists, validate that the information is correct. |