An application is an enterprise resource, one or more computer programs or
software components that provides a function in direct support of a specific business process or
processes.
Before you begin
- You must have administrative permission to complete this
task.
- Log in to the IBM® Security Verify
administration console as an Administrator.
About this task
Add the applications that your users and groups needs for their day-to-day operations in
your organization. Watch videos on how users access applications and on configuring an application with Verify in the IBM Security
Learning Academy.You can perform the following tasks:
Verify supports:
- SaaS or web-based
applications
- Native mobile applications
- Applications that use Security Assertion Markup Language (SAML) based sign-on
- Applications that use OpenID Connect based
sign-on
- On-premise application such as LDAP and Active Directory that are managed through identity
adapters
Verify has a
list of predefined application templates, including an option to use a
Custom application template. The templates are available in the
Select Application Type dialog box. Use these templates to:
- Create one or more application instances that are based on the company account
subscription.
- Configure the SAML single sign-on
connection between Verify
and the target application.
- Configure OpenID Connect authentication
between Verify and the
target application.
- Define which users and groups are entitled to access and use the application.
Depending on the application template, the information in the Add
Application page varies. Each page has the General and Sign-on tabs.
When you save the
application instance, the Entitlements tab is
displayed.
Procedure
-
Select .
-
Create an application.
-
Select Add Application. The Select Application Type
dialog box lists the available application templates.
-
Select Custom Application or search for a specific application template
and select Add application.
The Add Application page is displayed.
- Optional:
If the company has more than one account subscription with the target application, specify a
unique application instance name following the application name to distinguish it from other
instances. Otherwise, use the default application name.
Note: The application name can be a maximum of 100 characters.
-
On the General tab,
specify the basic information that is described in Setting the basic application details.
-
On the Sign-on tab,
configure the connection between Verify and the target
application.
-
On the Entitlements
tab, assign users who are entitled to access and use the application instance.
Note:
- This tab is available only if you already saved the application.
- Users must be entitled to the application to view and access the
application from the Verify home page or to sign on to the
target application's web page.
-
Select Save to complete the setup.
-
Update an application.
-
Select the icon.
The Applications/Details page is displayed.
-
Edit the information in any of the available tabs.
Note: If Untagged attribute is shown for the attribute source value, it is because the
purpose of the attribute was changed. Existing applications that consume the attribute can continue
to use the application until you remap the application to use a different attribute for that
purpose. For example, if the Single sign-on (SSO) checkbox is cleared on an
existing attribute, applications that already consume that attribute for SSO can continue to use it
for SSO. The same behavior applies to the provisioning attribute mappings when the
Provisioning purpose is removed.
-
Select Save.
-
Delete an application.
When you delete an application:
- You can delete only one application instance at a time.
- You delete the instance and its entitlements only from Verify. No change on the target
application.
- You can either use Delete in the Applications or on the Edit
Application page.
-
Choose from one of the following options in the Applications page:
- Select the application instance and select the icon on the Summary pop-out.
- Select the icon and select Delete.
- Select the icon and select Delete.
-
-
Confirm that you want to permanently delete the selected application.
-
Search and view the application information.
-
Use the Search field for a filtered list of
data.
-
Select the application to view a summary of its information. The X-Force
Details is displayed.
-
Select View in X-Force Exchange to view its complete details.
Table 1. X-Force Details
Information |
Descriptions |
Categorization |
Category of the application that the organization authorizes
for use. For example, Cloud, Software as a
Service. |
Description |
Description of the application such as its purpose or
usage. |
Base URL |
The application home page URL. |
Risk Score |
Indication of the risk that a vulnerability poses to your
organization.
|
From this page, you can also go to the edit page
, link to the application usage report
, or delete the application
.
- View the application usage report.
-
- Select the application to view a summary of its information. The X-Force
Details is displayed.
- Select the icon.
-
- Select the icon and
- Select App usage.