Dynamic NPI 3.0 is not one epic—it is a coordinated program. The sequencing matters: first put the foundation
in place (shared statuses, clear origin labels, role-based access control (RBAC), feature flags) so teams do not
build on shifting ground. Then ship what clients actually see and feel (the pre-go-live file pass, alias matching,
conflict handling, honest monitoring alerts). Finally, nail down how named lifecycle packages show up in the public
API after Product answers how a caller should ask for initial credentialing versus ongoing monitoring
versus re-credentialing.
Now — roughly zero to four weeks
Phase 0 — Decisions
Finish the open calls on minimum viable product (MVP) scope, how lifecycle requests should look on the wire,
alias reuse and cross-client policy, what happens when file uploads change shape, how “origin” shifts when a
credential moves from client-supplied to DNPI-led, how today’s internal statuses map to the new vocabulary,
cutover strategy, and the internal role model. Each topic has one directly responsible individual (DRI) who drives
the answer.
Once those calls are closed (or explicitly deferred with risk written down),
engineering can treat the design as stable enough to build on—instead of freezing scope every time a definition moves.
Milestone 1 — Foundation
Trustworthy internals
One canonical status list, clear attribution for where each fact came from, a small bridge of about five fields from
the verification application (VAP) into Monitor so production paths stay coherent, pilot feature flags, an early
ProviderTrust-admin audit experience, the RBAC design intent, and a mapping table from legacy internal states to the
new client-facing words.
With the foundation in place, the team can ship what clients actually touch
without constantly revisiting invisible state definitions.
Milestone 2 — Core minimum viable product
Client-visible value
The end-to-end onboarding file pass; alias triangulation; conflict screens and workflows; monitoring alerts that
treat seriousness seriously and never time out real human work; honest handling of deactivated credentials, manual
steps, and paid-board fees; and verification that runs on production data—staging-only checks cannot be the only
place problems surface.
In parallel from Milestone 1 through Milestone 2
Cross-cutting
RBAC, flags, and audit
We set RBAC direction in Milestone 1 and carry enforcement through Epics 1–9. Pilot and cohort feature flags limit
how many clients see a change at once. The audit experience is thin in Milestone 1 and stronger in Milestone 2.
When Decision 2 (lifecycle request shape) is firm, Milestone 3 can move from
draft to predictable API contracts—until then, packaging language stays a program risk, not a delivery commitment.
Milestone 3 — Conditional
Lifecycle packaging
Named packages for initial, ongoing, and re-credentialing moments, each with predictable fields in the response
only after Decision 2 (lifecycle request shape) closes. If that decision slips, Milestone 3 stays a draft
and Epic 6 on lifecycle may need its own engineering requirements document (ERD).
Cutover is how the story lands in production: one pilot at a time, measured,
and reversible—rather than assuming a single flip for the whole company.
Pilot first
Cutover
Move one pilot client at a time with a written runbook, before-and-after counts of subjects and alerts, and a clear
rollback switch. Retiring the legacy experience for the whole company in a single “big bang” is a long-term hope, not
a commitment in the 3.0 plan.