imper.ai provides Workforce Identity Verification (IDV) controls for high-risk identity lifecycle workflows. This guide outlines the minimum configuration steps required to make the platform operational in your environment.
This section focuses on implementation sequencing and required configuration decisions.
In this article
What you’ll accomplish
By the end of this guide, you will:
Understand imper.ai’s core purpose and how it secures the workforce
Know which setup steps are required versus optional
Be ready to connect integrations, define protected users, and validate workflows
High-level setup flow
Review imper.ai concepts and key terminology
Connect the required integrations for your use case
Define protected users and applicable verification policies
Run a validation test to confirm verification workflows behave as expected
Note: Connecting an integration is necessary, but it does not complete setup on its own. You must also configure protected users and enable verification workflows.