Portfolio — restricted access
Incorrect password — please try again
UX Case Study

N3C
Research
Access System

What began as a registration redesign became a full enterprise system — governing how researchers, institutions, legal representatives, and federal administrators gain, manage, and relinquish access to one of the largest COVID-19 clinical datasets in the United States.

RoleUX/UI Design Lead
DurationMay 2025 – Dec 2025
Cadence2× weekly prototype reviews
ToolsFigma · Lucidchart · PowerPoint · ChatGPT
ClientNCATS / N3C via Axle Informatics

A Registration Problem That Revealed a System Problem

The National COVID Cohort Collaborative (N3C) is an NIH-funded program providing researchers with access to one of the largest harmonized COVID-19 clinical datasets in the United States — housed within a secure Palantir Foundry enclave managed by NCATS. Getting access requires navigating a multi-step process: institutional data agreements, identity verification, security training, enclave selection, and role-based approvals at the institutional and federal level.

The existing system had been built incrementally over years and showed it — a registration portal with redundant navigation, no sequential structure, no status visibility, and an agreement submission process that relied entirely on email with no timestamps, no confirmations, and no admin visibility. Researchers stalled. Administrators had no way to know why.

The brief started as a registration redesign. As prototype reviews drew in NCATS technical leadership, governance stakeholders, and policy requirements from the incoming CADR federal framework, the scope expanded into a full enterprise access management system covering six user roles, lifecycle management, institutional governance, a DAR review committee, and an admin dashboard with reporting.

6
Distinct user roles, each with a tailored flow and dashboard
Weekly prototype review sessions driving project decisions
7 mo.
Discovery through stakeholder-approved prototype
Before Existing N3C landing page
After↕ Scroll to view full page
Redesigned N3C landing page
Enclave-first → researcher-first — the landing page came last, rebuilt to match a registration system that had already been rethought from the ground up
Before — Nav & Auth Existing N3C navigation and login
After — Nav & Auth Redesigned N3C navigation and login
Three competing nav bars and fragmented auth links collapsed into a single rationalized header — login, registration, and enclave access given clear hierarchy for the first time

Sole Designer on a System Built for Scientists

🔬

UX/UI Design Lead — Axle Informatics for NCATS

I was the only designer on the project, embedded within an Axle Informatics team contracted to NCATS. My primary working relationship was with the N3C Program Lead — a research scientist who served as both product owner and subject matter expert, translating federal policy requirements, CADR governance mandates, and stakeholder feedback into PowerPoint briefs and structured check-in sessions. I translated these into clickable Figma prototypes reviewed by the NCATS Technical Lead and presented to NIH senior leadership.

What I Owned

Walking Through a System That Was Working Against Its Users

Discovery began with the N3C Program Lead screen-sharing the existing registration system and walking through it as a new user would encounter it. What emerged was a catalogue of compounding friction — each individual issue manageable in isolation, but together creating a process that routinely stopped researchers before they reached the enclave.

What the Existing System Was Doing Wrong

No sequential path

Users were presented with a list of required steps in no particular order — no dependencies surfaced, no indication of what to do when a step was blocked, no way back to the same state after leaving a page.

Redundant, confusing navigation

"Create Account," "Login," "Enclave Sign In," and "Profile" all occupied the same nav bar — pointing to different systems with no explanation of which to use, or when.

No status visibility

After submitting a profile, researchers had no way to know where their application stood. Approvals could take weeks with no indicator, no estimated timeline, and no contact path.

DUA black box

Institutions submitted Data Use Agreements by emailing NCATS partners directly. N3C had no visibility, no timestamp, and no notification — agreements sat unprocessed for weeks with no one aware.

Silent blockers

Missing required fields like an ORCID ID were only surfaced after submission. Users who hadn't completed them couldn't progress but received no clear instruction on how to resolve the block.

Layout working against comprehension

The landing page split onboarding instructions and the registration button across two visually disconnected columns. Dense disclaimer copy sat above the fold where no one read it.

Policy Context — CADR Governance

Layered over the UX problems was a significant shift in federal policy. The CADR (Controlled Access Data Repository) framework introduced new requirements that directly shaped the information architecture — mandatory institutional affiliations, required signing officials on data access requests, and a role structure distinguishing who could initiate requests from who could approve them. These weren't constraints to work around; they drove the role-based architecture from the ground up.

The Brief That Became a System

The engagement started with a single mandate: fix the registration experience. The existing process had been built incrementally across years of feature additions and was comprehensively broken — not in one way, but in every way a registration flow can fail simultaneously. The first working session on May 23, 2025 was a live walkthrough of the existing system with the N3C Program Lead. What followed was a documented audit of compounding failure.

"Registration will be a feature. Reporting will be a feature in this... it's going to be a system."

— N3C Program Lead, May 23, 2025 — first working session

That shift — from "fix registration" to "this is a system" — happened in the first hour of the first call. It set the direction for everything that followed.

What the Existing Registration Was Doing Wrong

Three entry points, no hierarchy

"Create Account," "Profile," and "Enclave Sign In" appeared as equal-weight nav items — two went to the same place, one went somewhere else entirely. After completing registration, "Create Account" persisted on screen. "I don't understand that. It would be nice if it would disappear."

No sequential path

The process was a numbered checklist with no enforced order, no way back once you left it, and no mechanism to surface what was missing. "I found it once and took a screenshot, but you can't easily get back to it."

Help that offered no help

Guidance links were present but non-functional in practice. "There's a spot where it says if you'd like help or guidance — click here — and it takes you to something that offers neither help nor guidance."

DUA submission was a black box

Agreement submissions were handled entirely by email with no system visibility. "It can sit there for 2–3, four weeks and we have no visibility that they've submitted their DUA. And then somebody's like, hey, I sent that two weeks ago."

Silent failures

When registration stalled — missing ORCID ID, no DUA on file, unqualified email address — nothing happened. No notification, no prompt, no path forward. The Program Lead received the follow-ups manually by email: "Oh, you don't have your ORC ID. Let me give you the instruction... It doesn't do that."

No qualification gate

Gmail and non-institutional addresses were accepted, allowing users through who didn't meet the access criteria. "The current system just let people move in." CADR requirements mandated that everyone be affiliated with a verified institution — the system had no mechanism to enforce this.

First Session Finding — May 23, 2025

"I know the website pretty well and I couldn't find it really easily this morning when I was looking about how would I renew." — N3C Program Lead, on attempting to locate the registration checklist

This wasn't a usability edge case — it was the person who built the process being unable to navigate it. The checklist was structurally inaccessible: reachable once, nearly impossible to return to, with no persistent status or re-entry point.

What the Redesign Addressed

The redesign replaced every broken pattern with a direct structural counterpart. A single consolidated login and registration entry point replaced the three competing nav items. A sequential progress bar with explicit state feedback — complete, in progress, pending admin action, locked — replaced the unstructured checklist. DUA checking moved in-system, with an automatic lookup on institution name entry returning a green confirmation or routing to a decision tree. Agreement submission moved from email to a drag-and-drop upload with submission timestamps and status visibility. And crucially, the model became explicitly parallel: training, identity verification, and DUA processing could all proceed simultaneously, so researchers weren't blocked on institutional timelines to complete steps within their own control.

How Registration Became a System

The scope expansion wasn't gradual — it happened in the same session where the registration problems were first audited. While describing what registration needed, the Program Lead described an admin interface with differentiated role views, an agreements management layer, and a reporting function. Each subsequent session introduced a new requirement that registration alone couldn't contain: CADR governance mandated institutional signing officials, which required an ISO role and dashboard. DUA management required tracking across agreement types and amendments. Parallel completion surfaced the need for admin-side visibility into why researchers were stalled. The registration redesign was the entry point — everything else was revealed by taking it seriously.

The Prototype Wasn't Just Showing the Work — It Was Driving the Project

Twice-weekly review sessions with the NCATS Technical Lead and Program Lead ran on a consistent loop: a new or updated Figma prototype would be shared, walked through screen by screen, and the resulting discussion would produce decisions that shaped not just the UX but the system's requirements, role definitions, and policy implementation. The prototype wasn't documentation of decisions already made — it was frequently the mechanism by which decisions got made at all.

Role naming — Dec 11 DAME Review

"Sure. Yeah, yeah, they can be 'Data Contributor Reviewer' — I want to clarify the distinction..." — NCATS Technical Lead, reviewing the role selection screen

While walking through the role selection screen, the N3C Program Lead proposed "Data Contributor Reviewer" as an alternative title. The Technical Lead agreed on the call. The role name — and the distinction it encoded between CADR-governed access approval and Dynamic Workspace data contribution review — was settled in the meeting, not before it.

CADR terminology removed from public UI — Dec 11 DAME Review

"Explicitly, you don't want CADR in anything public user-facing?" / "That would be yes — I don't think we should." — Governance stakeholder and NCATS Technical Lead, reviewing prototype screens

Looking directly at the prototype, a governance stakeholder asked whether "CADR" should appear in user-facing UI. The Technical Lead confirmed it should not. A policy decision about public-facing terminology — made while looking at the screens.

ISO must always manually enter name and email — July 28 Presentation Review

"My preference would be, even if it's on file, they always do it — because these individuals change and I don't want to assume whomever is managing the organization will go in and update names." — N3C Program Lead, reviewing the DUA request flow

An early design pre-populated the ISO's contact fields from system records. Reviewing the prototype, the Program Lead made the call to require manual entry every time — based on observed patterns of staff turnover at research institutions. A system behavior decision triggered by a specific design choice visible in the prototype.

Agreement cards must be separate, not grouped — July 28 Presentation Review

The prototype showed a single "Upload Agreements" progress item. Walking through it together, it became clear in real time that DUA, DTA, and LHBA have different optionality — some institutions upload all three, some only one. Grouping them implied equal requirement. The decision to separate them into distinct upload cards with independent status tracking was made during that walkthrough, not in a requirements document beforehand.

Admin persona deferred by design — Aug 21 Check-in

While reviewing the prototype, the Program Lead made an explicit sequencing decision: the OpsAdmin persona would not be designed until all user-facing flows were finalized. The reasoning — arrived at while looking at the screens — was that the admin's capabilities would be entirely determined by what the other roles needed. The prototype review was the forum in which that project management decision was made and confirmed.

"This looks fairly straightforward and pretty clear to me — nothing immediately jumps to mind, which is a good thing. No comments is a good thing."

— NCATS Technical Lead, Dec 11 DAME Review, on the Contractual Representative flow

The Patterns That Held the System Together

With six distinct role types and dozens of screens, the system needed a consistent set of design patterns that could be applied across every flow — reducing cognitive load for users who might occupy more than one role, and making the system legible to administrators managing it from above.

Sequential Progress Bar

The single highest-impact structural change was replacing the unordered checklist with a task-based progress bar showing users exactly where they were, what they needed to do, and what was waiting on someone else. Task cards divided into two types: actions the user takes, and steps pending administrative review. The bar adapted per role — same pattern, different content.

Task list — initial state, tasks pending Task list on first login — enclave selected, tasks pending
My Registration tab — progress bar mid-flow My Registration tab — sequential progress bar showing completed steps, outstanding tasks, and pending admin review

Persistent Alert Banner

An early design used a modal on login to surface outstanding tasks. Feedback from the NCATS Technical Lead was direct: make it something users can't miss. The solution was a persistent orange banner at the top of every authenticated page — dismissible per session, but reappearing on every login until all required tasks are complete — showing an outstanding task count.

Persistent alert banner — outstanding task
Persistent banner — one outstanding task remaining. Dismissible, but returns on every login until complete.

Institutional Accountability — PI Attestation

The CADR framework requires institutions to take explicit responsibility for the researchers they sponsor. This was surfaced as a Principal Investigator Attestation modal — triggered at profile submission — requiring the researcher to formally attest their eligibility at their named institution. The checkbox is required before Submit activates.

PI Attestation modal — confirmed state
PI Attestation confirmed — checkbox checked, Submit button active

Parallel Completion

DUA processing can take 4–6 weeks. NIH security training takes hours. The original system's implied sequential structure caused researchers to wait on the DUA before doing anything else. The redesign made parallel completion explicit — users could work through every other required step while their DUA was in process, arriving at full approval with everything else already done.

Six Roles. Six Tailored Experiences.

One of the core architectural decisions was separating the registration experience by role type from the outset. Each role has distinct responsibilities, distinct required actions, and a distinct view of the system. Mixing them was one of the root causes of the original system's confusion.

Researcher / Principal Investigator

Primary user type CADR-governed

The researcher flow is the system's primary journey — from the public landing page through identity verification, institutional authentication, profile completion with PI attestation, enclave selection, and the task list. The institution DUA auto-check sits at the point of profile completion, triggering the decision tree if no agreement is found. Parallel completion of training and DUA processing is surfaced explicitly at the task list stage.

Account type selection modal Step 1 — Account type selection, triggered by "Request Access" CTA
Researcher Profile Creation modal Step 2 — Researcher Profile form, launched on role confirmation
Profile setup complete — email verification sent Step 3 — Email verification triggered on profile submission
Email verification complete Step 4 — Verification confirmed, researcher directed to their N3C profile

Stakeholder Requirement — Registration Status Visibility

A consistent ask in early stakeholder sessions: researchers had no way to know where they stood in the registration process after submitting. The My Registration tab was a direct response — a persistent progress tracker showing every required step, its completion state, and its timestamp, accessible from first login through to full activation. Not a new idea, but one that had never been implemented in the previous system.

My Registration tab — full step sequence with timestamps
My Registration tab — full step sequence with timestamps, accessible at any point during the process
Interactive Prototype — Researcher Registration Flow Open prototype →

Researcher — Adding an Enclave

Post-onboarding lifecycle ISO pre-population

Researchers who register for the COVID enclave may later want to add the Clinical or Tenant enclave. The "Add Enclave" flow triggers a new DUA check and surfaces a pre-populated contact card for the Signing Official already on file at their institution. The researcher confirms or updates the ISO contact, submits, and the request routes automatically — no need to re-navigate the full registration experience.

Completed COVID enclave registration — starting point Step 1 — Existing registration complete, new enclave requested via + button
Enclave selection modal Step 2 — Enclave selection modal, Clinical Enclave chosen
Request Enclave Access — ISO pre-populated Step 3 — Signing Official pre-populated from institution record, researcher confirms or updates
Tenant Enclave registration in progress Step 4 — New enclave registration underway, abbreviated progress bar reflects only remaining steps
Interactive Prototype — Researcher Adding an Enclave Open prototype →

Researcher — Offboarding

Full lifecycle Graceful exit

Offboarding is accessible at any point in a researcher's account lifecycle — not gated behind a completed registration or active enclave membership. The flow is designed to be informative rather than bureaucratic: a researcher initiating an exit is shown exactly what access they hold and what will be relinquished, then asked to confirm deliberately. Clean, unambiguous, and available whenever it's needed.

Offboarding confirmation prompt Step 1 — Deliberate confirmation required before any action is taken
Offboarding request submitted Step 2 — Request submitted, pending administrative review
Profile showing offboard pending status Step 3 — Profile reflects pending status, access remains until admin approval
Account offboard pending modal Step 4 — Returning users informed of pending review, no duplicate requests possible
Interactive Prototype — Researcher Offboarding Open prototype →

Legal Representative

Institutional role Agreement management

The Legal Representative handles all agreement uploads for their institution — a responsibility separated from the ISO Approver role, which early iterations had conflated. Their primary view is "My Agreements," structured around three distinct upload cards: COVID DUA, Data Transfer Agreement, and Linkage Honest Broker Agreement. The role selection screen was one of the most iterated in the system, because the two roles are institutionally distinct but often occupied by the same person.

Institutional role selection Unlike researchers, institutional roles are explicitly selected — the system needs to know what authority this person holds before routing them correctly
Legal Representative role attestation Institutional authority must be attested before proceeding — a step with no equivalent in researcher registration
Interactive Prototype — Legal Representative Registration Open prototype →

ISO DAR Approval

CADR-mandated role DAR review queue

The Institutional Signing Official is a CADR-mandated role responsible for reviewing and approving Data Access Requests submitted by researchers at their institution — authorising specific projects to access N3C data. The ISO view surfaces pending DARs in a structured review queue with review, approve, and send-back-for-revision actions. The DAR revision flow creates a clear communication loop without requiring off-platform email exchange. In practice, the Legal Representative and ISO are often the same person — the prototype below shows that combined DAR approval experience.

ISO DAR list view DAR list — ISO's view of all submitted access requests, filterable by status
ISO DAR review detail DAR review detail — full application context before the ISO takes action
ISO DAR revision notes Revision request — ISO sends structured notes back to the researcher without leaving the queue
ISO DAR approved state Approval confirmed — DAR status updated, researcher notified
Interactive Prototype — Legal Rep DAR Approval Open prototype →

Data Contributor Reviewer

N3C Dynamic Workspace Named during prototype review

The Data Contributor Reviewer is an N3C-specific role — distinct from the CADR-governed ISO — responsible for reviewing access requests that touch data contributed by their institution to the Dynamic Workspace. Where the ISO approves general enclave access, the Data Contributor Reviewer specifically governs whether their institution's contributed data may be used in a given research project. The role name itself was finalised during a DAME prototype review session.

DC Reviewer queue DC request queue — pending contributions awaiting review
Data Contributor Review modal Contribution review modal — dataset detail, compliance context, and approve/deny actions
Contribution denied state Denial confirmed — reviewer required to supply notes before submission
Contribution approved state Approval confirmed — contributing institution notified, DC status updated
Interactive Prototype — Legal Rep DC Approval Open prototype →

Contractual Partner

Narrowest scope Single core task

Contractual Partners upload Linkage Honest Broker Agreements on behalf of institutions. The interface was intentionally minimal — no banner, no multi-step progress bar, no extraneous information. A single drag-and-drop upload card, a submit action, and a confirmation. Complexity should match responsibility: a role with one core task should have one core screen. The NCATS Technical Lead reviewed this flow and offered no revisions.

Contractual Partner dashboard Step 1 — Dashboard showing pending LHBA uploads by institution and agreement type
LHBA upload modal Step 2 — Upload modal launched from queue, institution pre-filled
LHBA upload confirmed Step 3 — Both a file and an execution date must be provided before Submit becomes active
LHBA upload ready to submit Step 4 — Upload confirmed — institution's LHBA successfully submitted
Interactive Prototype — Contract Rep Registration Open prototype →

What the System Looks Like From the Top

The OpsAdmin Dashboard and Org Pages were the last major surface designed — deliberately. As the Program Lead noted during an August check-in: the admin's capabilities needed to be determined by what all other roles required, not defined in advance and retrofitted. The result is a dashboard that reflects the full system — surfacing every pending action, every agreement in flight, every DAR requiring committee review, and every institution's compliance status in a single view.

OpsAdmin Dashboard

The dashboard opens to a personalised welcome with a live count of pending actions across four categories: agreements requiring attention, account and permission reviews, users requiring manual review, and offboarding requests. A Recent Activity feed surfaces the most recent system events. Tabs provide access to the full committee review workflow, institution management, reporting, and user administration.

OpsAdmin dashboard
OpsAdmin Dashboard — pending action counts, recent activity, and module navigation
DAR committee queue Committee Dashboard — DAR Feedback Review queue with project titles, institutions, and submission dates
Admin History — Accounts Admin History — full account audit log across all roles, institutions, and access decisions
Institution Dashboard — Data Access Requests Institution Dashboard — DAR status across all requests associated with a given institution
Generate Reports Generate Reports — filterable by agreement type, user role, and date range across all system activity
Interactive Prototype — OpsAdmin Dashboard Open prototype →

Org Pages — Same Surface, Two Experiences

Each institution has a dedicated Org Page — a single URL resolving to fundamentally different content depending on who's looking at it. The distinction isn't cosmetic. Researchers see a read-only window into their institution's status: active agreements, enclave memberships, and the DARs they're associated with. Admins see a full institutional control panel. Same page architecture, role-filtered at the content level.

Researcher View — Read-Only

For researchers, the Org Page is informational. It surfaces the institution's active agreements relevant to their access tier, their own associated DARs, and the contacts at their institution they may need to reach. No controls, no editing — visibility only. Designed to answer the question a researcher actually has: what's my institution's status and what does it mean for my access?

Org page — researcher read-only view Institution overview — active agreements and enclave memberships. Read-only.
Org page — researcher DARs view DARs view — associated Data Access Requests and current status, visible but not editable.

Admin View — Institutional Control

For OpsAdmins, the same page becomes a full institutional management surface. All agreements (DUA, DTA, LHBA) with status and expiry, assigned ISOs and Legal Representatives, enclave memberships, full DAR history, and direct management actions — edit, reassign, flag, remove. The admin view is the authoritative record for an institution's standing within the system.

Admin org page — institution profile Institution Profile — active agreements across all enclave types with management controls
DTA Extension modal DTA Extension — document preview with execution date and ISO assignment before completion
Upload Agreement — details tab Upload Agreement — agreement details tab with enclave type, agreement type, and file upload
Upload Agreement — contacts tab Upload Agreement — contacts tab capturing Scientific Point of Contact and Signatory before submission
DTA contacts modal DTA Contacts — signatory and Scientific Point of Contact editable directly from the org page
Agreement Notes modal Agreement Notes — internal notes attached to agreements, surfacing institutional context for admins
Interactive Prototype — Researcher Org Page Open prototype → Interactive Prototype — OpsAdmin Org Page Experience Open prototype →

What Seven Months of Twice-Weekly Reviews Taught Me

Federal Research Systems Enterprise UX Role-Based Architecture Figma Prototyping Policy-Driven IA Lifecycle Design NCATS / NIH Solo Design Lead CADR Governance