Getting Started with imper.ai for Helpdesk

Prev Next

with This guide will help you quickly set up your imper.ai environment, connect your identity systems, and start protecting your organization from identity-based threats.

Follow the steps below to get started.


Overview

  1. Log in to the imper.ai Admin Console

  2. Connect Your Identity Provider (Microsoft Entra or Google Workspace)

  3. Connect Systems for Automated Actions (such as CyberArk or Active Directory)

  4. Connect Additional Data Sources (Optional)

  5. Configure Verification Questions (Optional)

  6. Connect Your ITSM Platform (Recommended)

1. Log in to the imper.ai Admin Console

Access the imper.ai Admin Console using your administrator credentials.

From the console, you will be able to configure integrations, configure your setup and enable workflows automations.


2. Connect Your Identity Provider

Connect your primary identity provider so imper.ai can begin verifying users and detecting identity-related risks.

Common identity providers include:

  • Microsoft Entra ID

  • Google Workspace

  • Other supported identity platforms

Once connected, imper.ai analyzes the active user base and evaluates the coverage of available verification questions to ensure sufficient data is available for identity verification.


3. Connect Additional Data Sources (Optional)

To improve verification accuracy, connect additional enterprise systems.

These integrations allow imper.ai to expand the pool of verification questions used during identity validation.

Examples may include:

  • HR systems

  • Employee directories

  • internal knowledge sources

The more data sources connected, the more reliable and secure the identity verification process becomes.


4. Configure Verification Questions (Optional)

imper.ai uses step-up verification to confirm user identity when sensitive requests are made.

You can either:

  • Manually configure verification questions or

  • Allow imper.ai to automatically optimize question selection based on available data sources.

Automatic optimization is recommended for most environments.


5. Connect Systems for Automated Actions

imper.ai can perform automated remediation actions after successful identity verification.

For example, users may request actions such as:

  • Password resets

  • Account unlocks

  • Access updates

To enable these actions, connect the relevant systems, such as:

  • Active Directory

  • CyberArk

  • other identity management platforms


6. Connect Your ITSM Platform

Integrate your IT Service Management (ITSM) platform to automatically log requests and actions performed through Imper.ai.

Supported platforms may include:

  • ServiceNow

  • other ticketing systems

This ensures that all identity-related requests are properly documented and tracked.


You're Ready to Go

After completing these steps, imper.ai will be ready to:

  • Verify user identity

  • Detect identity-based threats

  • Automate secure helpdesk actions

  • Log activity in your ITSM platform