diff --git a/app/serializers/lfs_file_lock_entity.rb b/app/serializers/lfs_file_lock_entity.rb
index 787d201d0a1af99ca942eb9e62607e1ac486f300..dd109cba0155332a5ab9036dd656b296b81732f6 100644
--- a/app/serializers/lfs_file_lock_entity.rb
+++ b/app/serializers/lfs_file_lock_entity.rb
@@ -8,6 +8,6 @@ class LfsFileLockEntity < Grape::Entity
   expose(:created_at, as: :locked_at) { |entity| entity.created_at.to_fs(:iso8601) }
 
   expose :owner do
-    expose(:name) { |entity| entity.user&.name }
+    expose(:name) { |entity| entity.user&.username }
   end
 end
diff --git a/ee/app/helpers/path_locks_helper.rb b/ee/app/helpers/path_locks_helper.rb
index f9ade343c2c90e1f9a4497d793f94eb40d35f664..b3e6cdee55b85a1c10299cf48ee7357427bc8914 100644
--- a/ee/app/helpers/path_locks_helper.rb
+++ b/ee/app/helpers/path_locks_helper.rb
@@ -7,10 +7,10 @@ def can_unlock?(path_lock, current_user = @current_user)
 
   def text_label_for_lock(file_lock, path)
     if file_lock.path == path
-      "Locked by #{file_lock.user.name}"
+      "Locked by #{file_lock.user.username}"
     else
       # Nested lock
-      "#{file_lock.user.name} has a lock on \"#{file_lock.path}\""
+      "#{file_lock.user.username} has a lock on \"#{file_lock.path}\""
     end
   end
 end
diff --git a/ee/spec/helpers/path_locks_helper_spec.rb b/ee/spec/helpers/path_locks_helper_spec.rb
index cfa570d5478cce5fa54eed4c3f674d5c20b174eb..6055dbb78cfd923a5c23df78b7e28eedd55daceb 100644
--- a/ee/spec/helpers/path_locks_helper_spec.rb
+++ b/ee/spec/helpers/path_locks_helper_spec.rb
@@ -23,11 +23,11 @@
 
   describe '#text_label_for_lock' do
     it "return correct string for non-nested locks" do
-      expect(text_label_for_lock(path_lock, 'app')).to eq('Locked by John')
+      expect(text_label_for_lock(path_lock, 'app')).to eq("Locked by #{user.username}")
     end
 
     it "return correct string for nested locks" do
-      expect(text_label_for_lock(path_lock, 'app/models')).to eq('John has a lock on "app"')
+      expect(text_label_for_lock(path_lock, 'app/models')).to eq("#{user.username} has a lock on \"app\"")
     end
   end
 end
diff --git a/ee/spec/lib/gitlab/tree_summary_spec.rb b/ee/spec/lib/gitlab/tree_summary_spec.rb
index abd1455fb2e880d1e3e4f0981d7f8657f5666da8..28a8044ad50c113cc9c46b7db3d376ab1036a58b 100644
--- a/ee/spec/lib/gitlab/tree_summary_spec.rb
+++ b/ee/spec/lib/gitlab/tree_summary_spec.rb
@@ -14,7 +14,7 @@
   describe '#summarize (entries)' do
     it 'includes path locks in entries' do
       is_expected.to contain_exactly(
-        a_hash_including(file_name: 'a.txt', lock_label: "Locked by #{path_lock.user.name}")
+        a_hash_including(file_name: 'a.txt', lock_label: "Locked by #{path_lock.user.username}")
       )
     end
   end
diff --git a/lib/gitlab/checks/diff_check.rb b/lib/gitlab/checks/diff_check.rb
index 1186b532baff83acfa973fa355c367834dcd351c..bce4f969284a86b517f2b5ea0b1dc4d9150735cd 100644
--- a/lib/gitlab/checks/diff_check.rb
+++ b/lib/gitlab/checks/diff_check.rb
@@ -74,7 +74,7 @@ def lfs_file_locks_validation
           lfs_lock = project.lfs_file_locks.where(path: paths).where.not(user_id: user_access.user.id).take
 
           if lfs_lock
-            return "The path '#{lfs_lock.path}' is locked in Git LFS by #{lfs_lock.user.name}"
+            return "The path '#{lfs_lock.path}' is locked in Git LFS by #{lfs_lock.user.username}"
           end
         end
       end
diff --git a/spec/lib/gitlab/checks/diff_check_spec.rb b/spec/lib/gitlab/checks/diff_check_spec.rb
index dd467537a4f7713a3ddc58660b48f8eb1b12b715..20c6ad8a6e899685c3947a329d8a1c396e7e3bf7 100644
--- a/spec/lib/gitlab/checks/diff_check_spec.rb
+++ b/spec/lib/gitlab/checks/diff_check_spec.rb
@@ -94,7 +94,7 @@
 
         context 'when change is sent by a different user' do
           it 'raises an error if the user is not allowed to update the file' do
-            expect { subject.validate! }.to raise_error(Gitlab::GitAccess::ForbiddenError, "The path 'README' is locked in Git LFS by #{lock.user.name}")
+            expect { subject.validate! }.to raise_error(Gitlab::GitAccess::ForbiddenError, "The path 'README' is locked in Git LFS by #{lock.user.username}")
           end
         end
 
@@ -148,7 +148,7 @@
           end
 
           it "does raise an error" do
-            expect { subject.validate! }.to raise_error(Gitlab::GitAccess::ForbiddenError, "The path 'files/locked/baz.lfs' is locked in Git LFS by #{owner.name}")
+            expect { subject.validate! }.to raise_error(Gitlab::GitAccess::ForbiddenError, "The path 'files/locked/baz.lfs' is locked in Git LFS by #{owner.username}")
           end
         end
       end
diff --git a/spec/serializers/lfs_file_lock_entity_spec.rb b/spec/serializers/lfs_file_lock_entity_spec.rb
index 5869941c9201f1f38ce9d45cbecfdec9cdc52ecb..d0ff6fb60af0cf5514f3dae303f0110cc24e6b12 100644
--- a/spec/serializers/lfs_file_lock_entity_spec.rb
+++ b/spec/serializers/lfs_file_lock_entity_spec.rb
@@ -16,6 +16,6 @@
 
   it 'exposes the owner info' do
     expect(subject).to include(:owner)
-    expect(subject[:owner][:name]).to eq(user.name)
+    expect(subject[:owner][:name]).to eq(user.username)
   end
 end