with This guide will help you quickly set up your imper.ai environment, connect your identity systems, and start protecting your organization from identity-based threats.
Follow the steps below to get started.
Overview
Log in to the imper.ai Admin Console
Connect Your Identity Provider (Microsoft Entra or Google Workspace)
Connect Systems for Automated Actions (such as CyberArk or Active Directory)
Connect Additional Data Sources (Optional)
Configure Verification Questions (Optional)
Connect Your ITSM Platform (Recommended)
1. Log in to the imper.ai Admin Console
Access the imper.ai Admin Console using your administrator credentials.
From the console, you will be able to configure integrations, configure your setup and enable workflows automations.
2. Connect Your Identity Provider
Connect your primary identity provider so imper.ai can begin verifying users and detecting identity-related risks.
Common identity providers include:
Microsoft Entra ID
Google Workspace
Other supported identity platforms
Once connected, imper.ai analyzes the active user base and evaluates the coverage of available verification questions to ensure sufficient data is available for identity verification.
3. Connect Additional Data Sources (Optional)
To improve verification accuracy, connect additional enterprise systems.
These integrations allow imper.ai to expand the pool of verification questions used during identity validation.
Examples may include:
HR systems
Employee directories
internal knowledge sources
The more data sources connected, the more reliable and secure the identity verification process becomes.
4. Configure Verification Questions (Optional)
imper.ai uses step-up verification to confirm user identity when sensitive requests are made.
You can either:
Manually configure verification questions or
Allow imper.ai to automatically optimize question selection based on available data sources.
Automatic optimization is recommended for most environments.
5. Connect Systems for Automated Actions
imper.ai can perform automated remediation actions after successful identity verification.
For example, users may request actions such as:
Password resets
Account unlocks
Access updates
To enable these actions, connect the relevant systems, such as:
Active Directory
CyberArk
other identity management platforms
6. Connect Your ITSM Platform
Integrate your IT Service Management (ITSM) platform to automatically log requests and actions performed through Imper.ai.
Supported platforms may include:
ServiceNow
other ticketing systems
This ensures that all identity-related requests are properly documented and tracked.
You're Ready to Go
After completing these steps, imper.ai will be ready to:
Verify user identity
Detect identity-based threats
Automate secure helpdesk actions
Log activity in your ITSM platform