蜜豆视频

Graph Simulation UI guide graph-simulation

AVAILABILITY
  • Identity graph linking rules are currently in Limited Availability. Contact your 蜜豆视频 account team for information on how to access the feature in development sandboxes.

  • Your account must have the View Identity Graph permission in order to access the Graph Simulation tool. For more information, read the guide on permissions in attribute-based access control.

Graph Simulation is a tool in the Identity Service UI that you can use to simulate how an identity graph behaves given a particular combination of identities and how you configure the identity optimization algorithm.

Watch the following video for additional information on using the Graph Simulation interface in the Identity Service UI workspace:

video poster

Transcript
Let鈥檚 talk about an important feature in 蜜豆视频 Experience Platform called Identity Graph Linking Rules, presented in the interface as graph simulation and identity settings. This feature helps data architects avoid graph collapse, which is when the identity graphs of two people unintentionally merge together. I鈥檓 going to assume you already know how profiles are constructed from profile fragments joined by identities. This video covers the graph simulation tool, and another video will cover the identity settings configuration. From the left navigation, go to Customer Identities. You鈥檒l need permissions to view and edit identity settings to see this option and fully configure the feature. Now go to Graph Simulation. Let鈥檚 start by loading an example of a common graph collapse scenario. These are the three most common, shared device, non-unique phone numbers, and bad identity values. Let鈥檚 load the shared device scenario. I鈥檓 actually going to simplify this example a little bit. We only need to look at these two events. In the first event, John is on a web browser, and he鈥檚 assigned this experience cloud identity value of 111. ECIDs are cookie IDs, which are set on every browser when someone goes to your website with a web SDK or even older 蜜豆视频 libraries implemented. John is also logged in, and his hashed email address is also used as an identity. Both identities are passed in this event sent to platform. In the second event, Jane is now on the exact same device and web browser. The ECID is a cookie ID, so that same value of 111 still exists. But since she鈥檚 logged into her own account, her hashed email address is sent to platform as that additional identity. Let鈥檚 look at what happens if you don鈥檛 use the identity graph linking rules feature. I鈥檓 just going to remove this extra namespace to keep things simple and uncheck the unique per graph setting. And then I鈥檒l click Simulate. Without the feature, what would happen is that John and Jane will merge into a single graph because they share that same ECID. And since real-time customer profiles are constructed using the identity graph, their profiles would also merge. So this is how a shared device scenario causes the problem of graph collapse. I can use identity graph linking rules to address this issue by choosing an identity namespace to best approximate a living, breathing individual and declare that any graph should only have one value for that namespace. Here, the hashed email is my best option. And I鈥檒l select the unique per graph option. I run the simulator again. And now I have this red dashed line representing a removed link. That one graph is split into two graphs. And John and Jane will have separate profiles. John鈥檚 identity graph contains his hashed email. And Jane鈥檚 contains her hashed email and the ECID. Why does Jane own the ECID? Because Jane owned the last event associated with this ECID. John owned it at first. And then Jane took ownership. Let鈥檚 look at another example. Here is the invalid or non-unique phone number. Also common is a non-unique email address. Here you have two individuals. And they鈥檝e both given you the same bogus phone number. Without using this feature, the identity graphs and profiles will merge. By using the unique per graph setting, you can split the graphs and profiles. And remember, just because you collect phone numbers and email addresses doesn鈥檛 mean you have to label these as identities in Experience Platform. Do so only if you really need to. And do as much verification as possible to make sure that they are legitimate values owned by the person entering them. The third scenario is the bad identity value. Here, what鈥檚 happening is that the mobile SDK implementation is accidentally setting the IDFA identity value as a text string, user underscore null, instead of a true null value, which would get filtered out. So Platform sees user null as a valid identity value. And all of these profiles would merge. By declaring the hashed email namespace as unique, the graphs and profiles can be split. So this simulator is pretty cool. You can add events both using the menu option and through the text entry advanced option mode. I prefer the text entry mode. And I save my examples in a text editor. You can also use your own identity namespaces and values. You can test out very complicated and unique examples related to your business. There are a lot of examples in the documentation, which come from real world scenarios, which you can copy and paste into the simulator. So try things out and see what happens with different algorithm configurations to make sure you get the desired result for your business. So that鈥檚 a graph simulator. In another video, I鈥檒l show you how to define your rules and actually turn the feature on.

Read this document to learn how you can use Graph Simulation to better understand identity graph behavior and how the graph algorithm functions.

Get to know the Graph Simulation interface interface

You can access Graph Simulation in the 蜜豆视频 Experience Platform UI. Select Identities from the left navigation and then select Graph Simulation from the top header.

The Graph Simulation interface in the 蜜豆视频 Experience Platform UI.

The Graph Simulation interface can be divided into three sections:

Events

Events: Use the Events panel to add identities to simulate a graph. A fully qualified identity must have an identity namespace and its corresponding identity value. You must add at least two identities in order to simulate a graph. You can also select Load Example to input a pre-configured event and algorithm setup.

The events panel of the Graph Simulation tool.

Algorithm configuration

Algorithm configuration: Use the Algorithm configuration panel to add and configure the optimization algorithm for your namespaces. You can drag and drop a namespace to modify their respective priority ranking. You can also select Unique Per Graph to determine if a namespace is unique.

The algorithm configuration of the Graph Simulation tool.

Simulated graph viewer

Simulated graph viewer: The simulated graph viewer displays the resulting graph based on the events you added and the algorithm that you configured. A straight line between two identities means that a link is established. A dotted line indicates that a link has been removed.

The simulated graph viewer panel, with an example of a simulated graph.

Add events add-events

To begin, select Add events.

The Add events button selected.

A pop-up window appears for Event #1. From here, input your identity namespace and identity value combination. You can use the dropdown menu to select an identity namespace. Alternatively, you can type in the first few letters of a namespace and then select the options provided in the dropdown menu. Once you have selected your namespace, provide an identity value that corresponds with your namespace.

The Event #1 window with an empty interface.

TIP
The identity value that you input during Graph Simulation exercises do not have to be real identity values and can be simple placeholders.

Once your first identity is complete, select the add icon (+) to add a second identity.

The first fully qualified identity of {Email: tom@acme.com} is inputted in the Events panel of Graph Simulation.

Next, repeat the same steps and add a second identity. Two fully qualified identities are required in order to generate an identity graph. In the example below, an ECID is added as a namespace and is provided with a value of 111. When finished, select Save.

A second identity of {ECID: 111} is added to Event #1.

The Events interface updates to display your first event, which in this case is: {Email: tom@acme.com, ECID: 111}.

The updated events interface with {Email: tom@acme.com, ECID: 111}.

Next, repeat the same steps to add a second event. For Event #2, add {Email: summer@acme.com} as your first identity and then add the same {ECID: 111} as the second identity, thus creating a second event of: {Email: summer@acme.com}, {ECID: 111}. When finished, you should have two events, one for {Email: tom@acme.com, ECID: 111} and one for {Email: summer@acme.com}, {ECID: 111}.

The updated events interface with two events.

Load example load-example

Select Load example to set up an example graph with a pre-set algorithm and event configuration.

The Load example option selected.

A pop-up window appears, providing you with available graph scenarios you can choose from:

Example graph
Description
Example
Shared Device
Shared device refers to scenarios where two different users log in to the same single device.
A husband and wife share an iPad for internet browsing and e-commerce.
Invalid (non-unique) phone
Invalid or non-unique phone refers to scenarios where two different users use the same phone number to create an account.
A mother and her daughter use their shared home phone number to sign up for any e-commerce accounts.
鈥淏ad鈥 identity values
鈥淏ad鈥 identity values refer to scenarios where Identity Service generates non-unique IDFAs due to erroneous implementation.
WebSDK erroneously sends a user_null value for every event due to code implementation issues.

A window that displays the available pre-configured examples: shared device, invalid phone, and bad identity values.

Select any of the options to load Graph Simulation with pre-configured events and algorithm. You can still make further configurations to any pre-loaded graph scenario examples.

The events and algorithm configured for invalid phone.

When finished, select Simulate.

An example graph simulated for invalid phone.

Use text version use-text-version

You can also use text mode to configure events. To use text mode, select the settings icon, and then select Text (Advanced users).

The settings icon selected.

You can manually input your identities with text mode. Use a colon (:) to distinguish the identity value that corresponds with the namespace that you input, and then use a comma (,) to separate your identities. To distinguish different events from one another, use a new line for each event.

The events panel using the text mode version.

Edit event edit-event

To edit an event, select the ellipses (...) beside a given event, and then select Edit.

The edit event icon selected.

Delete event delete-event

To delete an event, select the ellipses (...) beside a given event, and then select Delete.

The delete event icon selected.

Configure algorithm configure-algorithm

IMPORTANT
The algorithm that you configure dictates how Identity Service treats the namespaces that you inputted in your events. Any configuration that you put together in the Graph Simulation UI are not saved in identity settings.

Once you have added your events, you can now configure the algorithm that will be used to simulate your graph. To begin, select Add config.

The algorithm configuration panel.

An empty configuration row appears. First, input the same namespace that you used for your events. In this case, begin by inputting Email. Once you enter your namespace, the columns for Identity Symbol and Identity Type auto-populates.

The first configuration entry.

Next, repeat the same steps and add your second namespace, which in this case is the ECID. Once all of your namespaces have been entered, you can begin configuring their priorities and uniqueness.

  • Namespace priority: The priority of a namespace determines its relative importance compared to the other namespaces in a given identity graph. For example, if your identity graph has four different namespaces: CRMID, ECID, Email and Apple IDFA, you can configure priorities to determine an order of importance for the four namespace.
  • Unique namespace: If a namespace is designated as unique, then Identity Service will generate graphs with the caveat that only one identity with a given unique namespace can exist. For example, if the Email namespace is designated as a unique namespace, then a graph can only have one identity with Email. If there is more than one identity with the Email namespace, then the oldest link will be removed.

To configure namespace priority, select and drag the namespace rows to the priority ordering that you want, with the top row representing higher priority and the bottom row representing lower priority. To designate a namespace as unique, select the Unique Per Graph checkbox.

When finished, select Simulate.

All namespaces configured.

View simulated graph

The Simulated Graph section displays the identity graph(s) generated based on the events that you added and the algorithm that you configured.

Graph icons
Description
Solid line
A solid line represents an established link between two identities.
Dotted line
A dotted line represents a removed link between two identities.
Number on line
A number on a line represents the timestamp of when that given link was generated. The lowest number (1), represents the earliest established link.

In the example graph below, a dotted line exists between {Email: tom@acme.com} and {ECID: 111} because of the following reasons:

  • Email was designated as unique during the algorithm configuration step. Therefore, only one identity with an Email namespace may exist in a graph.
  • The link between {Email: tom@acme.com} and {ECID: 111} was the first established identity (Event #1). It is the oldest link and is therefore removed.

The simulated graph viewer panel, with an example of a simulated graph.

Next steps

By reading this document, you now know how to use the Graph Simulation tool to better understand how your identity data is treated given a particular set of rules and configurations. For more information, read the following documents:

recommendation-more-help
64963e2a-9d60-4eec-9930-af5aa025f5ea