Configuring the Verify Bridge and the identity source

You can use the IBM® Security Verify user interface to configure the identity agent for Verify Bridge.

About this task

This configuration is for an external Verify Bridge. The configuration data includes attributes that:
  • Enable a running Verify Bridge to connect to an IBM Security Verify tenant.
  • Read its Verify hosted configuration.
  • Connect to its target identity data repository.
  • Periodically post its health status back to Verify.
The Verify Bridge configuration also includes a reference to the identity source configuration to which it is related.
Note: An agent must not be related to more than one identity source.

You can create the identity agent by using LDAP or a web service. See Configuration of an identity agent for authentication.