Getting Started with imper.ai

Prev Next

imper.ai protects organizations from impersonation and social engineering attacks by verifying identities during real-time interactions such as helpdesk requests, meetings, and internal communications.

This article provides a practical starting point. It explains what imper.ai does and walks you through the essential setup steps required to get your environment operational.


In this article

What you’ll accomplish

By the end of this guide, you will:

  • Understand imper.ai’s core purpose and how it reduces impersonation risk

  • Know which setup steps are required versus optional

  • Be ready to connect integrations, define protected users, and validate workflows

High-level setup flow

  1. Review imper.ai concepts and key terminology

  2. Connect the required integrations for your use case

  3. Define protected users and applicable verification policies

  4. Run a validation test to confirm verification workflows behave as expected

Note: Connecting an integration is necessary, but it does not complete setup on its own. You must also configure protected users and enable verification workflows.

Where to go next