- 30 Jun 2025
- 2 Minutes to read
- Print
- DarkLight
- PDF
Enable Axiad Confirm
- Updated on 30 Jun 2025
- 2 Minutes to read
- Print
- DarkLight
- PDF
To enable Axiad Confirm, you must complete the following steps in Axiad Conductor and the Identity Provider (currently only Microsoft Entra ID).
Update config.properties File
Update the UCMS config.properties file with the following information:
jumio.baseURL=<UCMS URL>
, replacing<UCMS URL>
with your environment’s URLjumio.successUrl=<UP URL>
, replacing<UP URL>
with your environment’s URL
Update Role Management
Update Role Management in UCMS as follows:
Grant Read and Modify privileges to screens / functionalities to the operator role
Configuration: Verification Server List
Configuration: Verification Servers - Create/Edit Jumio Verification Server
Grant Allow access privileges to REST APIs to the UCMS_API role
POST /api/v2/users/{uid}/verification
This allows UP or an external system to initiate the Identity Verification processGET /api/v2/users/{uid}/verification/status
This allows UP or an external system to retrieve the Identity Verification statusGET /api/v3/users/IdVerification/reports
This allows UP or an external system to display the transaction consumption
Note
These privileges can also be given to a custom API role if you would like to integrate your own tool with Axiad Confirm
Upcoming
API documentation for these APIs will be part of the next Confirm release
Grant additional privileges to other actions to the required roles
IdConfirmationStatus
This enables the help desk operator to see an additional column in the Unified Portal (UP)with the ID Confirmation statusConfirmID
This enables the help desk operator to initiate an Identity Verification for users, with the “Confirm ID” action in UP
Integrate Identity Provider
Currently, Axiad Confirm supports only Microsoft Entra ID. Connect Entra ID to Axiad Conductor using the integration guides.
Create / Update SCIM User Source
Axiad Confirm uses a few attributes to send emails to users and to define from which country and state they are for default selection of the government-issued ID. In the next release, the onboard date will allow you to automatically send an email to the user on their first day.
Create or edit an existing SCIM User Source
Add the following as Custom Attributes:
Attribute Key | Display Name | Permission | Mandatory / Optional |
---|---|---|---|
addresses[type eq "home"].country | Country | Read | Mandatory |
addresses[type eq "home"].region | State | Read | Optional |
emails[type eq "home"].value | Personal Email | Read | Optional |
urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:onboardDate | onboardDate | Read | Optional |
Update Entra ID Attribute Mapping
In the Microsoft Entra admin center, navigate to the Axiad Conductor Enterprise application
In the Manage menu, click Provision
In the Manage menu, click on Attribute mapping (Preview)
Click Provision Azure Active Directory Users
Click Show advanced options
Click Edit attribute list for <Axiad Conductor Enterprise Application>
Add the following attributes at the bottom of the page:
Name | Type | Primary Key? | Required? | Multi-value? | Exact case? | API Expression | Referenced Object Attribute |
---|---|---|---|---|---|---|---|
addresses[type eq "home"].region | String | Unchecked | Unchecked | Unchecked | Unchecked | Empty | 0 selected |
addresses[type eq "home"].country | String | Unchecked | Unchecked | Unchecked | Unchecked | Empty | 0 selected |
emails[type eq "home"].value | String | Unchecked | Unchecked | Unchecked | Unchecked | Empty | 0 selected |
urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:onboardDate | dateTime | Unchecked | Unchecked | Unchecked | Unchecked | Empty | 0 selected |
Save the settings
Click Add New Mapping
Required
Only provisioning the country attribute is mandatory, but Axiad recommends provisioning all attributes if possible
Mapping Type | Source Attribute | Default value if null (optional) | Target Attribute | Match objects using this attribute | Matching precendence | Apply this mapping |
---|---|---|---|---|---|---|
Direct | <Attribute that contains user’s state> | Empty | addresses[type eq "home"].region | No | Empty | Always |
Direct | <Attribute that contains user’s country> | Empty | addresses[type eq "home"].country | No | Empty | Always |
Direct | <Attribute that contains user’s personal email> | Empty | emails[type eq "home"].value | No | Empty | Always |
Direct | <Attribute that contains user’s start date> | Empty | urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:onboardDate | No | Empty | Always |
Create Verification Server
A verification server is required to connect to the identity verification service used by Axiad Confirm. Following the configuration steps in the Create a Verification Server guide.
Create / Update Credential Workflow
Create or edit a Credential Workflow
In the Configure Workflow Steps section, select Confirm Outcome in the left-side menu
Select the Identity Provider from the dropdown
Click Done
Save the configuration
Optional: Update Notification Template
You can modify the content in the emails sent to users during the Axiad Confirm process.
In the Axiad Conductor Operator Portal, navigate to Configuration > Notifications > Notification Templates
Locate the Mail to user about Identity Verification template and click the Edit icon
Make any preferred changes and Save the template