Case study · Access control · Regulated onboarding

Controlled Access System for Minors

Allowing minors into an online platform is a legal and operational control problem. A system that enforces rules by design, without human intervention, at scale.

01

816+ users processed

Zero manual onboarding steps. Every user progressed through the same gates, same sequence, same validation.

02

100% legal enforcement

Access control works through system logic, not human memory. Policy is executable, not aspirational.

03

Multi-tool synchronization

Four external systems stay in sync via a single source of truth. No contradictions. One state to trust.

Minors accessing the platform without completing legal requirements ends with compliance violation

At low volume, manual processes worked. At scale, they break down.

Legal compliance risk

Parental consent enforcement. Data protection. Every step had to be auditable and non-negotiable.

Scale without people

No manual review capacity. The system had to enforce rules on its own, processing 816+ users consistently.

Core constraint

How do you enforce policy at scale without human intervention, when every mistake ends with legal liability?

From linear flow to state-driven access control

Each step is not a task to execute. Each step is a condition that must be verified. Only when a condition is satisfied does the system permit progression.

The redesign shifted ownership from people—who forget, leave, interpret differently—to system logic, which enforces consistently at any volume.

Users move through explicit states. Access is only granted when every required state is completed. If any step fails, the user stops there until the condition is resolved.

Before — linear task flow

Form Submit
Validate
Send Consent
Grant Access?

If validation fails, consent still gets sent. No clarity on readiness.

After — state-driven access control

Condition met?
Yes ↓ No → Blocked
Advance state
Next condition

No condition verified → no progression. No exceptions.

Six explicit states, one source of truth

Airtable becomes the operational backbone. All other tools (ActiveCampaign, PandaDoc, Skool) read state from Airtable and write confirmation back. One authority. No contradictions.

User progression flow

Registered
Opt-In Confirmed
Qualified (Age OK)
Pending Signature
Signed
Invited

Registered

Form submitted with tutor and minor data. Stored in Airtable, awaiting validation.

Opt-In Confirmed

Email confirmed and response received. User qualifies for consent request.

Qualified

Age validated as 13–17. Parental consent form generated and sent.

Pending Signature

Consent form with tutor. System waits for signature completion via PandaDoc.

Signed

Parental consent signed and confirmed. Platform access can now be granted.

Invited

All prior states complete. Access created in Skool. User ready to begin.

Why it was built this way

01

Airtable as backbone

Single source of truth for all user states. All external systems read and write to Airtable. Prevents data drift.

02

Removed manual review

Manual validation doesn't scale. The system enforces conditions automatically through rules, not human judgment.

03

Double opt-in as filter

Early filtering reduces downstream load. Users who aren't serious drop before consuming resources like consent requests.

04

Zero document storage

Only identification numbers collected. Reduces legal exposure. PandaDoc handles secure signature management.

What this delivered

816+

Users processed without manual intervention

0

Manual onboarding steps required

100%

Legal requirements enforced by system

Compliance by design

Access controlled by system logic, not human memory. Policy becomes executable logic.

Operational scalability

No additional human capacity needed as volume increased. Logic scales, people don't need to.

Cost efficiency

Early filtering eliminated unnecessary consent requests and platform invitations. Lower cost per valid user.

Known limitations

The system enforces technical access control, not behavioral rules inside the platform. Once someone's invited, what they do in Skool is outside this system's responsibility.

Building this required trade-offs: scalability over identity assurance, automation over flexibility. Those trades were made consciously and they paid off.

What could break

Third-party dependency

System relies on Airtable, ActiveCampaign, PandaDoc, Skool. If one fails, users get stuck.

Identity depth

Age validated by field only, not document verification. Lower assurance, but higher completion rate.

No automated recovery

Stuck users need manual intervention. No retry layer or dead letter channel yet.

To increase reliability and assurance

01

State monitoring dashboard

Real-time visibility of where users are stuck and why. Airtable-native analytics.

02

Reconciliation layer

Catches when tools fall out of sync and fixes them automatically. No manual triage.

03

Retry orchestration

Failed steps retry with exponential backoff. Stuck users move to dead letter queue for recovery.

04

Audit logging

Complete history of every state transition: who triggered it, when, and what changed.

05

Identity verification API

If compliance requirements tighten, plug in external identity verification. Age confirmation beyond self-report.

06

Template reusability

Generalize the state model so other teams can fork it for their access policies: onboarding, knowledge tiers, feature gates.

State-driven access works beyond user onboarding

This architecture isn't specific to minors. It applies wherever policy-driven decisions need to happen at scale.

1 Define states
2 Define conditions for transitions
3 Make Airtable the authority
4 Let systems subscribe to state changes
5 Monitor for stuck users

Knowledge access tiers

User level → tier → content recommendations → scope.

Team enablement

Employee level → training readiness → material access → certification gate.

Feature rollout

Customer plan → feature state → feature access.

Support routing

Ticket type + user tier + urgency → correct team + right knowledge article.

Translating legal requirements into explicit, enforceable, auditable systems.
Problem-first thinking

Identified this as an access control problem, not a workflow automation problem.

System design

Architected a state machine that scales without human intervention.

Cross-functional translation

Took regulatory requirements and made them executable logic.

Multi-tool orchestration

Kept four external systems synchronized around one source of truth.

Honest trade-offs

Made conscious decisions about assurance vs. friction, automation vs. flexibility.

Operational thinking

Designed for failure modes and recovery strategies upfront.

If you're trying to scale operations without breaking everything in the process, let's talk.