IBM Security Verify Bridge for Provisioning
To provide access to On-Premises Identity Brokerage Provisioning, you must complete this task.
Introduction
The Verify Bridge provides capability to manage on premises targets(like Active Directory, LDAP, Oracle etc) from IBM Security Verify.
The main connection between the Verify Bridge and the IBM® Security Verify tenant employs either an HTTP or an HTTPS Long-Poll. This connection is initiated by the Verify Bridge and requires an authorized access token which the Bridge obtains during startup and refreshes periodically. After the long-poll connection is established, traffic flows from Verify to the Verify Bridge.
Component Overview
The following diagram illustrates the main components of the Verify Bridge architecture.

- The flows and boxes that are illustrated within the Verify box are conceptual only.
- Multiple instances of the Bridge Agent can be deployed for HA.
- Agents to serve requests and workloads for managing an on-premises targets.
Supported Software
- Operating Systems
-
- Windows Server 2016
- Windows Server 2019
- Windows Server 2012 R2
- Linux systems that support Docker engine 19.03.0 or higher
Installation
Installation is done on a Microsoft Server or on a Docker-enabled Linux® system. Installation also requires the configuration of an identity source and an identity agent on your tenant.