User launchpadEdit online If you are a Verify non-administrative user such as an application owner or end user, start here. Getting started with IBM VerifyFor users, getting started involves gaining access to IBM® Verify and obtaining permission to sign in to use the application. You just submitted the form for an application that you want to use and that application uses IBM® Verify for login and access control. What do you do next?Accessing IBM VerifySign in to IBM® Verify to access the applications that you are entitled or to perform tasks that you are authorized.Signing inAfter you complete your initial login and password change, you can register devices to provide sign-in options. Recovering your usernameIf you forgot your IBM® Verify username on the tenant, use this information to recover it.Resetting your forgotten passwordIf you forget your IBM® Verify account password, you can use this information to reset it.Requesting accessUse these tasks to request access to the applications you need.Viewing your access requestsView the status of your access requests.Managing access requestsView and manage requests that have been assigned to you.Managing access certification requestsAs a reviewer, you can approve, reject, or redirect the access requests of an access certification campaign.Supervising campaignsAs a supervisor, you can monitor the progress of an access certification campaign.Delegating your certification campaign rolesDelegate all your work items that are based on your roles as a campaign reviewer or supervisor.Granting user consentIf user consent is enabled on your application, when you launch the application, you can choose what scopes and API access entitlements the application can use on your behalf when it accesses the resource.Viewing your profileYou can view the information such as name, user name, phone number, and email address that are contained in your profile. Updating your profileYou can update the information such as name, user name, and email address that are contained in your profile. You can also view your privacy and verification settings.Deleting your user profileRemove a profile that is no longer needed.Changing your passwordChange your password to make it personal, easy to remember, and secure.Managing your IBM Verify authenticatorsConfigure and manage authentication factors for two-step verification (2FA) to secure your IBM® Verify account. Two-step verification (2FA) enhances account security by requiring a second authentication method to verify your identity when your access your IBM® Verify account on a computer or mobile device.Managing application entitlements (by Application Owner)As an application owner, set or modify who is entitled to access the application based on the necessity and relevance of the application to the user or group. Users must be entitled to the application to view and access the application from the Verify home page or to sign on to the target application's web page.