Managing your applications

An application is an enterprise resource, one or more computer programs or software components that provides a function in direct support of a specific business process or processes.

Before you begin

  • You must have administrative permission to complete this task.
  • Log in to the IBM® Verify administration console as an Administrator.

Procedure

  1. Select Applications > Applications.
  2. Create an application.
    1. Select Add Application. The Select Application Type dialog box lists the available application templates.
    2. Select Custom Application or search for a specific application template and select Add application.
      Note: If the application is not found, select Request this app. You are taken to the IBM Verify - Ideas community, where you can request to add the application to Verify. See How to request new features in IBM Verify.
      The Add Application page is displayed.
    3. Optional: If the company has more than one account subscription with the target application, specify a unique application instance name following the application name to distinguish it from other instances. Otherwise, use the default application name.
      Note: The application name can be a maximum of 100 characters.
    4. On the General tab, specify the basic information that is described in Setting the basic application details.
    5. On the Sign-on tab, configure the connection between Verify and the target application.
    6. On the Entitlements tab, assign users who are entitled to access and use the application instance.
      Note:
      • This tab is available only if you already saved the application.
      • Users must be entitled to the application to view and access the application from the Verify home page or to sign on to the target application's web page.
    7. Select the level of privacy that you want to attach to the application.
      • For OIDC applications, use the Privacy tab to select the purposes and EULAs that you want to attach to the application.
      • For SAML applications, use the Privacy tab to select the privacy profile that you want to attach to the application. To customize consent collection page, see Modify consent collection page.
      For more information, see Managing data privacy and consent.
    8. Select Save to complete the setup.
  3. Update an application.
    1. Select the Edit icon.
      The Applications/Details page is displayed.
    2. Edit the information in any of the available tabs.
      Note: If Untagged attribute is shown for the attribute source value, it is because the purpose of the attribute was changed. Existing applications that consume the attribute can continue to use the application until you remap the application to use a different attribute for that purpose. For example, if the Single sign-on (SSO) checkbox is cleared on an existing attribute, applications that already consume that attribute for SSO can continue to use it for SSO. The same behavior applies to the provisioning attribute mappings when the Provisioning purpose is removed.
    3. Select Save.
  4. Delete an application.
    When you delete an application:
    • You can delete only one application instance at a time.
    • You delete the instance and its entitlements only from Verify. No change on the target application.
    • You can either use Delete in the Applications or on the Edit Application page.
    1. Choose from one of the following options in the Applications page:
      • Select the application instance and select the Delete icon on the Summary pop-out.
      • Select the Edit icon and select Delete.
      • Select the menu icon and select Delete.

    2. Confirm that you want to permanently delete the selected application.
  5. Search and view the application information.
    1. Use the Search field for a filtered list of data.
    2. Select the application to view a summary of its information. The X-Force Details is displayed.
    3. Select View in X-Force Exchange to view its complete details.
      Table 1. X-Force Details
      Information Descriptions
      Categorization Category of the application that the organization authorizes for use. For example, Cloud, Software as a Service.
      Description Description of the application such as its purpose or usage.
      Base URL The application home page URL.
      Risk Score Indication of the risk that a vulnerability poses to your organization.
    From this page, you can also go to the edit page Edit, link to the application usage report Link, or delete the application Delete.
  6. View the application usage report.
      1. Select the application to view a summary of its information. The X-Force Details is displayed.
      2. Select the Link icon.
      1. Select the menu icon and
      2. Select App usage.