Definition

OC4IDS

Open Contracting for Infrastructure Data Standard, standard.open-contracting.org/infrastructure/

Infrastructure transparency portals collect data from multiple government systems: e-procurement platforms, integrated financial management systems (IFMIS), project management databases, and beneficiary registration systems. Connecting these systems to an OC4IDS (Open Contracting for Infrastructure Data Standard, standard.open-contracting.org/infrastructure/) portal is the technical problem that determines whether a transparency initiative succeeds or fails. Based on implementations across Uganda, Kenya, and Nigeria, five integration patterns emerge. Each has different maintenance requirements, data quality outcomes, and failure modes.

Pattern 1: Direct Database Query

The simplest integration: the OC4IDS portal queries the source database directly via a read-only connection, transforming raw records to OC4IDS schema at query time. This pattern works when the source database has a stable, documented schema and a DBA can grant a read-only service account. The Uganda PPDA portal (gpp.ppda.go.ug) uses a variant of this pattern for its IFMIS integration: a scheduled ETL (extract-transform-load) job pulls contract award records from IFMIS nightly and maps them to OCDS fields, which then feed into the broader OC4IDS project record.

Five OC4IDS Integration Patterns: Trade-offs Summary
PatternTechnical ComplexityMaintenance RiskBest For
1. Direct database query (ETL)Low–MediumMedium, schema changes break itStable IFMIS with documented schema
2. API-to-API (source system API)MediumLow, API versioning protects consumerModern e-procurement systems (e.g. PPDA API)
3. CSV/file drop (scheduled export)LowHigh, manual step in the chainLegacy systems with no API or DB access
4. Middleware brokerHighLow, decoupled from source systemMultiple heterogeneous source systems
5. Manual data entry (last resort)NoneVery High, human compliance requiredOnly where no other option exists

Pattern 2: API-to-API Integration

The source system exposes a REST API; the OC4IDS portal polls it on a schedule, transforms responses to OC4IDS schema, and persists records. This is the most maintainable pattern when the source system has a versioned API. The Open Contracting Partnership's OCDS tools (standard.open-contracting.org/latest/en/guidance/build/) provide reference implementations for consuming procurement APIs and mapping to OCDS format, which then feeds the OC4IDS procurement phase. The Kaduna State Infrastructure Data Portal (ipdata.kdsg.gov.ng) uses API polling from the state's procurement system to populate its OC4IDS project records.

Pattern 3: Scheduled File Drop

File Drop Integration: Risk Factors and Mitigations
Risk FactorObserved Failure ModeMitigation
Manual export dependencyExport skipped when officer changes, CoST Uganda 2019 patternAutomate export via cron job if system permits
File format driftColumn names change silently between exportsSchema validation step in the ingestion pipeline
No delivery confirmationFailed drops are invisible until data auditMonitoring alert on file age in SFTP endpoint
Staff turnoverNamed data steward leaves; no backupEmbed in civil service job description, not project role

When a source system cannot expose a database connection or API, a scheduled CSV export, dropped to an SFTP endpoint or shared drive, is the fallback. The OC4IDS portal picks up the file on a schedule, validates the structure, and transforms it. This pattern introduces a manual step: a civil servant must run the export. CoST Uganda's 2019 Synthesis Report (infrastructuretransparency.org/programmes/uganda/) documented the predictable outcome of this dependency: file drops became irregular when the responsible officer changed. File drop integrations require a named, backed-up data steward role, not a project position.

Pattern 4: Middleware Broker

A middleware layer sits between source systems and the OC4IDS portal, normalising data from multiple heterogeneous sources into a common schema. The World Bank GovTech Maturity Index 2022 (worldbank.org/en/programs/govtech) documents this pattern as common in low-income country implementations where procurement, financial, and project management systems run on incompatible platforms. The middleware layer accepts outputs in whatever format the source system can produce, database dump, CSV, XML, proprietary API, and emits standardised OC4IDS-compatible records. This architectural decoupling means source system upgrades or replacements do not break the portal.

Pattern 5: Manual Entry (Last Resort)

Manual Entry Compliance: Observed Patterns Over Time
Time PeriodTypical Compliance RateTrigger
Launch (0–3 months)High, motivated team, donor visibilityInitial project energy
Mid-project (3–12 months)Declining, officers prioritise other dutiesNo enforcement mechanism
Audit periodTemporary spike, retroactive entryExternal pressure
Post-projectNear-zero, no dedicated resourceProject team disbanded

When no automated integration is technically feasible, a manual entry form is the only option. OC4IDS portals built on this pattern always fail eventually. CoST Uganda's assurance reports consistently documented the same pattern: manual entry compliance dropped within months of launch, recovered during audit periods, and declined again between audits. Manual entry is not a transparency system, it is a compliance theatre that produces unreliable data. If a government agency cannot automate any of the first four patterns, the correct answer is to document why and set a deadline for automation rather than to build a manual portal.

Counterargument

The Counterargument: Automation Creates Brittleness

Critics argue that automated integrations create a different failure mode: brittleness. When the source system upgrades its schema or the API changes version, the automated pipeline silently breaks. Manual entry at least fails visibly, an officer who stops entering data is noticeable. A broken ETL job that inserts stale data undetected is worse than no data at all. The Uganda PPDA example, critics note, works because PPDA has institutional continuity. Most governments do not.

This objection is valid but mislocated. Brittleness is not a property of automation, it is a property of undocumented automation. The World Bank GovTech Maturity Index 2022 (worldbank.org/en/programs/govtech) documents that e-transparency implementations with the longest operational lives shared a common feature: schema change management built into the integration layer, not the source system. A middleware broker (Pattern 4) absorbs source system changes precisely because it decouples the portal from the source. ETL jobs that run against a documented, stable schema (Pattern 1) are no more brittle than the database they query. The real risk is not automation itself, it is the project-team assumption that the integration will maintain itself. OC4IDS implementations built on the Uganda PPDA model institutionalise the integration as infrastructure, not as a project deliverable. That distinction, not the choice between manual and automated entry, determines whether the system survives its first budget cycle.

Choosing the Right Pattern

Definition

data stewardship model

is there a dedicated data officer, or will the integration depend on a project team?

The decision depends on three factors: the source system's technical capabilities (database access, API availability), the IT capacity of the implementing team (can they maintain a middleware broker?), and the data stewardship model (is there a dedicated data officer, or will the integration depend on a project team?). A direct database query with a single dedicated DBA is more reliable in practice than a sophisticated middleware broker maintained by a rotating project team. Automation solves the technical barrier. Institutional design, dedicated roles with budget lines, solves the maintenance barrier. Both are required for any pattern to function beyond the initial project cycle.

Playbook

Decision Table
OptionWhen to UseTradeoff
Adopt immediately Low-risk process and clear team ownership Fast progress, limited validation runway
Pilot first Uncertain data quality or mixed institutional capacity Slower scale-up, higher confidence
Defer pending controls Missing governance, QA, or monitoring guardrails Lower short-term output, better long-term durability
Execution Checklist
Failure Modes
  • Skipping the section "Pattern 1: Direct Database Query" during implementation.
  • Skipping the section "Pattern 2: API-to-API Integration" during implementation.
  • Skipping the section "Pattern 3: Scheduled File Drop" during implementation.

Continue Reading

Designing a CoST Assurance Process That Produces Real Findings

Most CoST Assurance exercises produce compliance rates, not findings. This guide explains the design differences that determine whether an exercise identifies real discrepancies — including when physical site visits are essential and how to use a tiered verification approach.

Beneficial Ownership in OC4IDS: How to Build It Right From Day One

Most infrastructure portals treat beneficial ownership as an afterthought. By the time investigators need the data, it is missing or unlinked. This guide covers the technical architecture that makes beneficial ownership disclosure work from day one, with reference to Uganda PPDA and Kaduna IPDATA implementations.

What 100,000 Contracts Taught Me About Procurement Transparency

After processing 100,000 procurement contracts in Uganda, I learned that disclosure isn't transparency. Here are the patterns the data revealed and what I'd build differently today.

Found this useful?

I write about open data systems, transparency, and implementation.

Read more articles →