⏱ 25 min read
Most cross-organisation process diagrams fail.
Not because BPMN is flawed. Not because people cannot read the notation. And not even because the process itself is unusually complex, though in insurance it often is. They fail for a simpler, more awkward reason: they create the illusion of agreement where no real agreement exists. Boxes line up, arrows connect cleanly, swimlanes look reassuringly tidy, and everyone walks out of the workshop feeling the process has been “mapped.” Then delivery begins, interfaces get designed, partner onboarding starts, and the first operational delay exposes what was never actually settled: nobody really decided who owns what between organisations.
I have seen this play out more than once on insurance programmes. The insurer team comes in thinking about policy administration states and claims platform transitions. The broker is thinking about customer conversations and the promises made during renewal. The claims handler focuses on handoffs. The third-party loss adjuster thinks in appointment windows, evidence packs, and SLA clocks. The repair partner is usually worried about intake quality and estimate approval turnaround. Put all of them in a room and they can produce something that looks complete in an afternoon. In my experience, it is often close to useless by the time the first integration design review starts.
That is the uncomfortable truth.
A BPMN collaboration diagram, when it is used properly, is not just a documentation artifact. It is a negotiation tool. Its real value is in helping people align while they still disagree. Frankly, if nobody argues while you are drawing it, the model is probably too vague to be useful.
So the practical question is not really, “how do I document a cross-enterprise process in BPMN?” A better question is this: when is a BPMN collaboration diagram the right modeling device for cross-organisation work, and what should an integration architecture lead insist on capturing before that diagram gets anywhere near governance? BPMN training
That is what this article is about.
What collaboration diagrams are actually good for
Teams often expect too much from a single picture.
A BPMN collaboration diagram is good at surfacing a very specific category of architecture decisions:
- where responsibility boundaries sit
- what business-significant messages move across those boundaries
- where synchronisation matters
- who owns timeout handling
- who can see a delay and who cannot
- where a process can stall without a clear owner
That last one matters more than most teams admit. In cross-organisation insurance programmes, the biggest value is not “process mapping.” It is exposing the places where no party owns the waiting time. TOGAF roadmap template
That is usually where operations fail.
Take a simple example. A broker submits a commercial property claim after severe water damage. The insurer asks for additional evidence. The customer assumes the broker is collecting it. The broker assumes the insurer’s document request service is contacting the customer directly. The adjuster is waiting for site photos before scheduling the inspection. Nothing is technically broken. Nobody has failed at their local task. But the claim sits still for six business days because nobody owns the gap.
A collaboration diagram can make that visible very quickly.
What it does not do well on its own matters just as much:
- it will not give you a canonical data model
- it will not replace API contracts
- it will not describe internal workflow implementation in delivery-ready detail
- it is not a legal accountability document, even though lawyers will sometimes try to treat it like one
I tend to be fairly firm about this. If a workshop drifts into debating field-level payload schemas while you are trying to define message ownership between insurer and broker, you are working at the wrong layer. Park it. Use a schema model, an interface spec, an event catalog, whatever suits the delivery stack. Keep the BPMN at the level where business commitments become architecture. BPMN and UML together
There are some classic insurance decisions where the collaboration view pays for itself almost immediately:
- Does the broker chase missing underwriting or claims evidence, or does the insurer?
- Who initiates claim status updates to the customer?
- If fraud review is triggered, does the visible process pause, or does it branch privately inside the carrier while the external status remains “under review”?
- Is a technical receipt from an API enough to tell the broker “claim lodged,” or does registration only happen later after policy and coverage validation?
These are not notation questions. They are operating model questions dressed up as integration design.
A concrete scenario: commercial property claim across multiple organisations
Let’s anchor this in a scenario that is familiar enough to be realistic, but broad enough to expose the harder edges.
A policyholder suffers severe water damage to a commercial property and contacts their broker. The broker submits a first notification of loss. From there, several parties become involved:
- Policyholder
- Broker
- Insurer
- Third-party loss adjuster
- Repair network partner
- Payment provider
This is a strong collaboration scenario because it contains all the usual troublemakers:
- separate legal entities
- asynchronous exchanges
- evidence collection
- manual and automated decision points
- disputed ownership of customer communication
- hidden internal work that affects external promises
For scope, I would model from first notification of loss through settlement authorisation. I would explicitly exclude deep internal claims assessment workflow unless it changes an inter-party commitment. That sounds obvious, but teams miss it constantly. They pull reserve calculations, document classification, fraud scoring, subrogation review, and internal approval chains into the same view. The result is a giant insurer-centric map with a few external arrows hanging off the sides.
That is not a collaboration diagram. It is an internal process model with guests.
Before drawing anything, define the modeling contract
This is the bit most teams skip because it feels bureaucratic. In practice, it is what stops six stakeholders from each carrying a different idea of what the same diagram is for.
Before you draw, settle four questions.
First: who is the audience? Architecture review board, delivery teams, partner onboarding, operations, audit? Those audiences overlap, but not neatly. A diagram intended for architecture governance can tolerate a level of abstraction that would frustrate an implementation squad. A partner onboarding view may need clearer SLA annotations and less internal insurer detail.
Second: is the model descriptive or prescriptive? Are you documenting the current state, however messy, or defining a target state? Mixing the two is a reliable way to create passive-aggressive workshops where everyone politely nods at a future-state diagram and then quietly keeps running the old process.
Third: are you modeling business responsibility or executable orchestration candidates? That distinction matters. A choreography-level view is about commitments and interactions. An orchestration view is about who invokes what task in what sequence. They can be related, but they should not be blended casually.
Fourth: what level of message detail belongs in the diagram?
My usual enterprise modeling contract for cross-organisation work is fairly simple:
- one pool per organisation, not per system
- message flows represent business-significant exchanges
- internal tasks appear only when they explain an external dependency
- service-level expectations are annotated on the diagram, not buried in workshop notes
- technical acknowledgements are shown separately, if at all, from business commitments
That “one pool per organisation” guideline saves a lot of pain. One of the most common anti-patterns I see is every internal platform getting its own pool—claims platform, broker portal, document service, payment engine, CRM—and someone calling the result a collaboration diagram. At that point it becomes an application topology with BPMN shapes. Sometimes interesting. Usually not the thing you need when the goal is to decide cross-organisation process ownership.
Participant boundaries are rarely as obvious as they look
Insurance organisations love to say “that’s part of the insurer process” right up until a delay, breach, or customer complaint appears. Then suddenly everyone discovers there were actually multiple parties involved, each with different obligations and different systems of record.
Choosing participant boundaries is not a legal exercise, and it is not an application decomposition exercise either. It sits somewhere between the two. You need boundaries that reflect contractual separation, independent process ownership, trust boundaries, and materially different SLA or compliance obligations.
A few examples make this clearer.
If an insurer has internal claims, underwriting, and finance teams, I would usually model them as lanes within the insurer pool only if that distinction matters to an external dependency. If not, leave them out. The outside world generally does not care which internal team moved the claim from triage to reserve review.
But if a delegated claims administrator or a TPA is handling a defined part of the process, that often deserves its own pool. The same goes for a managing general agent operating under delegated authority. Customers may experience the MGA as “the insurer,” but architecture should not accept that simplification if the MGA has independent process ownership, separate systems, or different timing obligations.
This matters in real delivery. On one programme I worked on, the insurer insisted on a single participant for “Carrier Operations” because broker-facing communications were branded under the carrier name. In reality, underwriting decisions sat with an MGA, claims registration sat with the carrier, and endorsements were managed in yet another delegated platform. The one-pool simplification looked neat. It also made it almost impossible to reason about where delays actually originated or which interfaces were required across trust boundaries. We ended up unwinding it later, at greater cost than if we had modeled it honestly from the start.
Another mistake is collapsing broker and insurer into one participant because “they work closely together.” They do not. They may collaborate tightly, but they do not share ownership, visibility, data rights, or, quite often, incentives. If there is a message crossing a trust boundary and either side can block or delay the process independently, that is a participant boundary.
That is my rule of thumb, and it has held up well.
Message flows are where the real architecture lives
Tasks get most of the visual attention in BPMN.
They should not.
In cross-organisation design, message flows are usually the thing that matters most. They define where commitments cross boundaries, where systems and teams need evidence, where latency appears, and where misunderstanding turns into operational failure.
A message flow is meaningful when it has:
- an explicit trigger
- an expected payload class
- a response or follow-up expectation
- timing or deadline implications
- an architecturally relevant channel, if the channel changes control or latency
In the property claim scenario, some obvious message flows include:
- Claim submitted
- Claim receipt acknowledged
- Claim registered
- Request for additional evidence
- Inspection appointment request
- Coverage confirmation
- Repair estimate returned
- Repair estimate approved
- Settlement instruction
- Settlement outcome communicated
Notice the distinction between “receipt acknowledged” and “claim registered.” In insurance, those are not the same thing, and treating them as equivalent is one of the easiest ways to create false status promises. An API 200 tells you the payload arrived. It does not mean the business has accepted responsibility for the next step.
That sounds basic. It still gets missed all the time.
If an insurer receives a claim submission via API from a broker platform, you may get:
- technical receipt from the gateway
- acceptance into intake queue
- successful policy lookup and claim registration
- assignment to handler or triage segment
Only one of these may justify telling the broker “your claim is now registered.” Sometimes none of them should trigger a customer-facing message until further checks are complete.
A practical rule I use is this: if an API response is not a business commitment, do not model it as though it closes the business step.
Another common problem is drawing interactions as neat synchronous request-response exchanges when, operationally, they are asynchronous. The diagram says “broker requests status / insurer returns status” as though that happens in one tidy transaction. In reality, the broker triggers a query, the insurer’s status service reflects only the last-known workflow state, and a meaningful response may depend on an external adjuster update that has not yet arrived. The API call may be synchronous. The business interaction is not.
If you model that the wrong way, you create the wrong expectation about control.
Here’s a small sketch of the kind of thin collaboration view I mean:
That is not full BPMN notation, obviously. But it makes the point: the architecture lives in those exchanges, and in the waiting states between them.
What belongs in the collaboration diagram, and what does not
Teams need a practical filter or they drown the model.
I would emphasise two rows in particular.
First, SLA timers and waiting states absolutely belong in the collaboration model. Without them, the diagram becomes decorative. In claims operations, the process is often governed less by what people do than by periods of silence.
Second, internal system calls usually do not belong unless they directly explain an external dependency. If internal Kafka events among insurer services are necessary to explain why “claim registered” cannot yet be emitted, then perhaps annotate the dependency. But do not turn the insurer pool into a distributed systems whiteboard just because the platform happens to be event-driven.
Walking the claim scenario from left to right
Let’s make this more concrete.
The process starts with the policyholder contacting the broker to report water damage. Immediately you face a decision: does the broker simply relay the first notification of loss, or does the broker validate completeness before forwarding it?
That choice matters. If the broker adds value by checking policy number, incident date, photos, emergency mitigation status, and occupancy impact, model that explicitly. Otherwise the insurer will assume intake quality at a level the broker may not be delivering consistently. I have seen entire triage SLAs built on that false assumption.
The broker sends FNOL to the insurer.
Then comes the first common modeling trap: insurer acknowledgment. Is this a technical receipt, a business acceptance, or a registered claim? Those are different states. If the insurer’s intake service sends an immediate acknowledgement but registration only happens after policy validation and duplicate checking, the collaboration diagram should say so. Otherwise broker operations will treat receipt as authority to tell the customer “your claim has been opened.”
Next, the insurer requests a loss adjuster assignment. Depending on the operating model, this may be direct insurer-to-adjuster or routed through a TPA. If the TPA exists and owns assignment SLAs, it belongs in the diagram. Hiding it because the insurer wants a cleaner picture is exactly how the main source of delay disappears from architecture review.
The loss adjuster then requests evidence. From whom? It is one of those deceptively awkward questions. Directly from the policyholder? Through the broker? Through a document intake service? Each option changes privacy handling, timing, and customer experience.
Then you have internal insurer work such as coverage assessment and reserve setting. Show only the points that affect external commitments. If reserve approval internally delays settlement authorisation, the model should reflect that waiting state or approval dependency. If it does not alter any external promise, leave it in the insurer’s internal workflow model.
The repair partner returns an estimate.
The insurer approves or rejects it.
Settlement is authorised and a payment instruction is sent to the payment provider.
Finally, the outcome notification goes to the broker and perhaps directly to the policyholder, depending on channel strategy and regulatory position.
Where teams usually get this wrong is not in the major tasks. It is in the empty spaces between them:
- no waiting state after evidence request
- no owner for evidence rework loops
- hidden manual triage that changes SLA outcomes
- broker copied on everything in practice, but absent from the model
- payment provider shown as instantaneous when settlement batches are only released twice daily
Those omissions are not cosmetic. They materially change architecture decisions.
Time, silence, and escalation are not side notes
This is the part architects under-model most often.
Cross-organisation processes are governed by delays. Not only by activities. By delays.
A decent collaboration diagram should use BPMN timer events, message events, and escalation paths carefully enough to answer a simple question: what happens if the expected thing does not arrive?
Insurance examples are easy to find:
- no evidence received within 5 business days
- adjuster misses inspection scheduling window
- repair estimate not returned before temporary accommodation limit expires
- payment provider rejects account validation
- broker does not confirm customer contact details after a fraud-sensitive request
If you omit these, steering committees see a happy path and conclude the process is straightforward. Delivery then discovers that the real architecture challenge is state management around absence, not around activity.
My view is fairly strong here: if the diagram does not show where the process can legally or operationally stall, it is not architecture-grade.
At minimum, model the top three delay scenarios that change external behavior.
Something like this, in simplified form:
Again, not pure BPMN syntax, but enough to illustrate the principle. Time and silence need to be visible.
Do not mix internal orchestration and external choreography casually
This is where enterprise architecture has to hold the line a bit.
Delivery teams often want executable detail. That is understandable; they are trying to build something real. Enterprise stakeholders need interaction clarity across organisations. Also understandable. Problems begin when one diagram is asked to do both jobs.
The cleaner approach is layered:
- a collaboration diagram for external choreography
- internal BPMN or workflow model per organisation
- sequence diagrams, API specs, and event models for implementation detail
That layered approach only works if the views are linked by clear business states and message definitions. Otherwise you end up with contradictory models, which is worse than having none.
Take a simple example. The insurer exposes a “claim registered” event to the broker portal. Internally, that may require document classification, fraud scoring, policy lookup, reserve creation, IAM checks for broker delegation rights, and several Kafka-mediated service interactions across the claims platform. Fine. Necessary, even. But none of that belongs in the collaboration view unless it affects the external promise of when “claim registered” can be asserted.
I have seen insurer pools packed with microservice choreography, event buses, and internal retries until the external story disappears. It impresses engineers for about ten minutes and helps nobody decide partner commitments.
The collaboration view should answer: who owes the next move?
The implementation view should answer: how do we make that move happen reliably?
Different questions. They deserve different artifacts.
Security, trust, and evidence change the process shape
Cross-organisation BPMN in insurance sits inside a trust model whether teams like it or not.
That means some security and evidentiary concerns do belong in the process view, not as low-level controls but as shaping constraints:
- identity of sender
- delegated authority
- customer consent for data sharing
- non-repudiation for submitted claim documents
- audit trail for payment authorisation
- least-privilege data exposure to partners
For example, a broker may submit a claim on behalf of a customer, but the insurer may still require direct customer consent before sensitive disclosures are sent to a repair or legal partner. Or a repair partner may receive a work order and damage scope, but not full policy details. Those constraints affect message ownership and routing, so they should be annotated.
This is where IAM becomes relevant in a practical sense. If broker users act under delegated access in the insurer portal, that trust arrangement can affect whether the broker is modeled as sender of a business message or as an operator inside an insurer-controlled channel. That distinction matters for audit and evidence.
Likewise, in cloud-native programmes, the technical implementation may use API gateways, event streaming, and secure document stores, but the collaboration diagram only needs to surface that when it changes timing, trust, or permissible data exchange. Kafka matters if event publication timing defines what another party can see. IAM matters if delegated identity changes who is legally or operationally recognised as submitting or approving something.
Do not turn BPMN into a security architecture diagram.
But do not pretend trust boundaries are invisible either.
Failure patterns from real programmes
A blunt section is healthy.
Mistake 1: modeling the legal process, not the operational process.
Contracts say one thing. Service desks do another. If the contract says the insurer communicates only via the broker but the loss adjuster routinely contacts the customer directly to arrange inspection, your operational model needs to show that reality or your timing assumptions will be fiction.
Mistake 2: assuming one shared status means the same thing to everyone.
“Under review” means almost nothing unless you define whose review it is and what external expectation it carries. Broker, insurer, customer, and adjuster often attach different meanings to the same phrase.
Mistake 3: no distinction between received, registered, accepted, and approved.
This one is endemic. It breaks reporting, SLAs, and customer communication in a single move.
Mistake 4: omitting the third parties that create most of the delay.
Assessors, repair networks, payment providers, medical reviewers. If they affect timing materially, they belong in scope.
Mistake 5: drawing message flows that no system or team can actually emit.
A model says “automatic status update every 48 hours.” Fine. Which platform emits it? Based on what event? With what fallback if no new external event has occurred? If nobody can answer that, the flow is fiction.
Mistake 6: using the collaboration diagram to hide unresolved ownership disputes.
This happens more often than people like to admit. Teams draw a neutral-looking box labelled “follow up on missing documents” without assigning it. Everyone knows the dispute exists. The diagram suppresses it instead of resolving it. TOGAF roadmap template
One war story still sticks with me. A claims programme promised updates every 48 hours across broker-submitted property claims. The process model looked elegant. The issue was simple: no participant actually owned generating outbound updates when the adjuster had not yet responded. The insurer assumed the adjuster would trigger movement. The adjuster only reported on material progress. The broker expected a status feed regardless. Operations failed in week one because the architecture had modeled movement, not silence.
That kind of failure is avoidable.
Model for decisions, not decoration
If I were running the workshop as integration architecture lead, I would keep a small checklist visible.
For each message flow, ask:
- who sends it
- what business state it represents
- who depends on it
- what happens if it never arrives
- whether the receiver is waiting, polling, or event-driven
- what evidence proves it occurred
For each participant boundary, ask:
- does this party have independent obligations
- can it delay the process without others seeing it immediately
- does it maintain a different system of record
- does trust or compliance change across this boundary
For each exception, ask:
- is this a business exception
- an operational delay
- or a technical failure
That last distinction is underrated. A failed API call and a missing engineer inspection are both “problems,” but they belong to different remediation models and should not be mashed into one vague exception path.
My advice from practice is simple: if a workshop cannot answer these questions, the diagram should remain provisional. Do not bless it just because the deadline is close.
A thin-slice example: broker-submitted claim with asynchronous evidence collection
Sometimes a focused slice is more useful than a huge end-to-end monster.
Imagine four participants:
- broker
- insurer
- document service provider
- customer
The broker initiates the claim. The insurer creates the case. Then, instead of collecting evidence through the broker, the insurer requests documents through an external document service. The customer uploads evidence directly. The insurer updates the broker on completeness status without exposing sensitive document contents.
This pattern shows several useful realities at once.
One business interaction spans multiple channels: API for claim initiation, portal upload for documents, event or API callback for status updates. Privacy rules mean the broker may know that evidence is complete without being able to see the evidence itself. Status harmonisation becomes harder than transport integration. You can usually wire the APIs quickly enough; getting everyone to agree on what “complete” means is the real challenge.
Technically, this may involve cloud object storage, signed upload links, event notifications over Kafka inside the insurer domain, and an external broker-facing API. None of that needs to pollute the collaboration diagram unless it changes the externally visible timing or responsibilities.
That is the trick: one visible BPMN exchange may hide several technical integrations underneath.
Governance matters more than people expect
A lot of collaboration diagrams die right after the workshop.
Nobody owns them. Delivery changes the interface behavior. A partner is onboarded differently than expected. Current state and target state blur. Six months later the diagram is still sitting in the architecture repository, confidently wrong.
A workable governance model is not complicated:
- architecture owns the modeling standard
- the domain process owner owns business semantics
- the partner manager validates external commitments
- the delivery lead confirms implementability
Version current state and target state separately. Please. Do not keep one “living” diagram that quietly drifts. Track externally visible change points especially carefully—new TPA onboarding, a shift from email broker notifications to API or event integration, changed delegated authority rules, introduction of straight-through triage. Those are architecture-significant changes and should trigger review.
Silent edits are poison here. If a message flow changes, the diagram is not just prettier or uglier. It is making a different operational promise.
When not to use a BPMN collaboration diagram
Sometimes BPMN is the wrong tool. It is better to say that early and save everyone time.
If the problem is pure system-to-system interaction inside one organisation, sequence diagrams or event flow diagrams may be better. If stakeholders really want payload schemas, OpenAPI definitions, or event contracts, a collaboration diagram will frustrate them. If the challenge is legal responsibility mapping, use a RACI or legal operating model artifact. If the focus is customer journey, use journey mapping.
Signs the team is forcing BPMN include:
- no clear business messages
- everything important happens within one organisation
- stakeholders keep asking for field-level schema detail
- the process has no meaningful responsibility split across trust boundaries
In those situations, a capability map plus a few sequence diagrams is often more useful than a bloated BPMN model pretending to be strategic. UML modeling best practices
The point of the whole thing
The best collaboration diagrams are not elegant. Or at least elegance is not the goal.
They are useful because they make accountability visible.
For insurance integration leaders, that means the diagram should reveal:
- where commitments cross company boundaries
- where latency accumulates
- where customer communication can break down
- where implementation choices create or remove operational risk
If the model helps you decide who chases missing evidence, whether a broker can rely on “claim registered,” how a loss adjuster delay becomes visible, and what event or message proves the next business state, then it is doing real architecture work.
If it cannot tell you who owes the next meaningful move, it is unfinished.
That is the standard I would hold.
FAQ: the hard questions teams usually ask late
Should the customer be a pool in an insurance collaboration diagram?
Usually yes, if customer actions or waiting periods materially affect the process. If the customer is only implied through broker interaction, you can sometimes omit them, but be careful not to hide evidence delays or consent steps.
Do we model email messages if they are still operationally critical?
Absolutely. If email is a genuine business-significant exchange, model it. Do not sanitize the architecture because the channel feels inelegant.
How much internal insurer detail is too much?
As soon as internal detail starts obscuring external commitments, you have gone too far. Show internal tasks only when they explain an external dependency or delay.
Can one collaboration diagram cover both broker and direct channels?
Sometimes, but usually not well. If the message ownership, timing, or customer communication model differs materially, split the views or create a common backbone with channel-specific variants.
What is the minimum exception modeling needed before architecture sign-off?
At least the top few delay or failure scenarios that alter external behavior: missing evidence, missed inspection window, delayed estimate, failed payment, disputed coverage hold. Happy path alone is not enough.
In the end, BPMN collaboration diagrams earn their keep when they force decisions that organisations would otherwise postpone. That is why I still use them. Not because they are perfect. They are not. But in cross-enterprise insurance work, a good collaboration diagram exposes the exact places where handoffs, silence, and blurred ownership become delivery risk.
And that is worth modeling.
Frequently Asked Questions
What is BPMN used for?
BPMN (Business Process Model and Notation) is used to document and communicate business processes. It provides a standardised visual notation for process flows, decisions, events, and roles — used by both business analysts and systems architects.
What are the most important BPMN elements to learn first?
Start with: Tasks (what happens), Gateways (decisions and parallelism), Events (start, intermediate, end), Sequence Flows (order), and Pools/Lanes (responsibility boundaries). These cover 90% of real-world process models.
How does BPMN relate to ArchiMate?
BPMN models the detail of individual business processes; ArchiMate models the broader enterprise context — capabilities, applications supporting processes, and technology infrastructure. In Sparx EA, BPMN processes can be linked to ArchiMate elements for full traceability.