Getting Started with imper.ai

Prev Next

imper.ai provides Workforce Identity Verification (IDV) controls for high-risk identity lifecycle workflows. This guide outlines the minimum configuration steps required to make the platform operational in your environment.

This section focuses on implementation sequencing and required configuration decisions.


In this article

What you’ll accomplish

By the end of this guide, you will:

  • Understand imper.ai’s core purpose and how it secures the workforce

  • Know which setup steps are required versus optional

  • Be ready to connect integrations, define protected users, and validate workflows

High-level setup flow

  1. Review imper.ai concepts and key terminology

  2. Connect the required integrations for your use case

  3. Define protected users and applicable verification policies

  4. Run a validation test to confirm verification workflows behave as expected

Note: Connecting an integration is necessary, but it does not complete setup on its own. You must also configure protected users and enable verification workflows.

Where to go next