Identity Graph Linking Rules

10 Aug 2025 » Platform

One of the most painful issues that all our Adobe Experience Platform (AEP) customers have faced is the profile collapse. The only comment I received on that post started with: “This is a giant problem.” Well, the wait is over — a solution has been implemented and is now generally available: Identity Graph Linking Rules. If you have suffered from this issue, keep reading.

Pre-Requisites

To understand the solution, you first need to understand how AEP works internally. There are two main concepts that are prerequisites to the explanation in this post. I recommend you review them if you are not familiar with these concepts before continuing.

How Identity Graph Linking Rules Work

The concept behind this feature is very simple: break links within the identity graph if more than one identity from a given namespace is present in that graph.

Let me explain with a simple scenario, where Alice and Bob share the same device. I will use the email address as an identity for illustration purposes; in general, it is not recommended to use it in real scenarios.

  1. Alice uses the shared device and logs in to your website. An ECID is generated on the landing page and, after logging in, AEP links Alice and the ECID.
    Step 1 - Alice logs in

  2. Now Bob wants to access the same website using the shared device. After he logs in, AEP links Bob to the same ECID from the previous step, resulting in a profile collapse — there is now a single graph containing both Alice and Bob.
    Step 2 - Bob logs in

  3. With identity graph linking rules enabled and configured, the oldest email address is removed from the graph, as it violates the rule of having only one email address per graph.
    Step 3 - Graph is uncollapsed

The end result is that we now have two identity graphs:

  • Alice has only her email address.
  • Bob has his email address and the ECID.

Final graph

The ECID Trade-Off

You may have noticed there is a catch with the ECID. Since the ECID is now always linked to only one profile, all anonymous events are tied to that profile. In the previous example, anything Alice did before logging in will be attributed to Bob.

Some may argue this is an issue, but I would counter that there is no guarantee that anonymous events belong to the next person who logs in. While it could be an educated guess, it could just as well be the case that Bob used the shared device anonymously, and then Alice logged in afterward. There is no reliable way to determine who was behind the device before a login.

One way to address this issue is to create a merge policy that does not stitch identities (ID stitching set to “None”) and use it as the Active-On-Edge Merge Policy. With this configuration, anonymous events will not be combined with events after login. As always, do not immediately apply such configuration changes without fully understanding their implications and testing them in a development environment.

Beyond The Basics

I strongly recommend spending time reviewing the full documentation on Identity Graph Linking Rules, including the accompanying videos. I have explained only the simplest case, with two identity namespaces. If you have more than two, and a collapse could occur in different parts of the hierarchy, you must clearly understand what happens in each scenario. The possibilities grow exponentially with each namespace and each potential identity combination, making it impossible to document every case here.

To help visualize the behavior of this functionality, Adobe provides a Graph Simulation tool. I find this tool incredibly useful — you can load different scenarios and see exactly how the graphs will behave. Use it extensively in a development sandbox, testing all options and configurations until you find the optimal setup. Only then you should replicate it in your production environment. Client feedback on this tool has been very positive.

A customer recently asked if there was a rollback mechanism to restore the state from before enabling linking rules. The short answer is no. This is another reason why the simulation tool is so important.

Exceptions

While this solution works very well for many of Adobe’s clients, it is not the solution for all cases. I have worked with customers who are hesitant to enable Identity Graph Linking Rules because of the consequences for their identity strategies. As mentioned above, my recommendation is to use the simulation tool to analyze your specific use cases before making a decision. If it creates more problems than it solves, do not use it.

Photo by Rizky Sabriansyah



Related Posts