- 12 Feb 2026
- 4 Minutes to read
- Print
- DarkLight
- PDF
Enable Axiad Confirm
- Updated on 12 Feb 2026
- 4 Minutes to read
- Print
- DarkLight
- PDF
To enable Axiad Confirm, you must complete the following steps in Axiad Conductor and the Identity Provider.
Add the properties below in the UCMS config.properties to support the Axiad confirm feature. This will be required when deploying “UCMS 4.26” and “UP 2.21” versions.
Pre-requisites
Required Access
Administrative access to UCMS Operator Portal
Domain Administrator access to Active Directory (if deploying on premise AD)
SSH/root access to UCMS server
Jumio tenant credentials (Client ID and Client Secret)
Information to Gather Before Starting
UCMS base URL (e.g.,
https://your-ucms.example.com/ucms/)User Portal URL (e.g.,
https://your-portal.example.com/user/)AD Domain Controller hostname and IP address
Jumio Authentication Token URL
Jumio Account URL
Jumio Retrieval URL
Jumio Client ID and Client Secret
Update Role Management
Update Role Management in UCMS as follows:
Grant Read and Modify privileges to screens / functionalities to the operator role
Configuration: Verification Server ListConfiguration: Verification Servers - Create/Edit Jumio Verification Server
.png?sv=2022-11-02&spr=https&st=2026-02-15T11%3A18%3A20Z&se=2026-02-15T11%3A28%3A20Z&sr=c&sp=r&sig=PKtd8KVtK8cmz38t91MLxfpfZ9GUT27oIufoiQMIXwA%3D)
Grant Allow access privileges to REST APIs to the UCMS_API role
POST /api/v2/users/{uid}/verificationThis allows UP or an external system to initiate the Identity Verification processGET /api/v2/users/{uid}/verification/statusThis allows UP or an external system to retrieve the Identity Verification statusGET /api/v3/users/IdVerification/reportsThis allows UP or an external system to display the transaction consumptionReset User ID Verification Status: allows to delete a user’s transactions in Jumio
GET /api/v2/users/{uid}/password: allows to reset AD password
Note
These privileges can also be given to a custom API role if you would like to integrate your own tool with Axiad Confirm
Upcoming
API documentation for these APIs will be part of the next Confirm release
Grant additional privileges to other actions to the required roles
IdConfirmationStatusThis enables the help desk operator to see an additional column in the Unified Portal (UP)with the ID Confirmation statusConfirmIDThis enables the help desk operator to initiate an Identity Verification for users, with the “Confirm ID” action in UPDeleteConfirmId

.png?sv=2022-11-02&spr=https&st=2026-02-15T11%3A18%3A20Z&se=2026-02-15T11%3A28%3A20Z&sr=c&sp=r&sig=PKtd8KVtK8cmz38t91MLxfpfZ9GUT27oIufoiQMIXwA%3D)
.png?sv=2022-11-02&spr=https&st=2026-02-15T11%3A18%3A20Z&se=2026-02-15T11%3A28%3A20Z&sr=c&sp=r&sig=PKtd8KVtK8cmz38t91MLxfpfZ9GUT27oIufoiQMIXwA%3D)
Integrate Identity Provider
Currently, Axiad Confirm supports only Microsoft Entra ID. Connect Entra ID to Axiad Conductor using the integration guides.
Create / Update SCIM User Source
Axiad Confirm uses a few attributes to send emails to users and to define from which country and state they are for default selection of the government-issued ID. In the next release, the onboard date will allow you to automatically send an email to the user on their first day.
Create or edit an existing SCIM User Source
Add the following as Custom Attributes:
Attribute Key | Display Name | Permission | Mandatory / Optional |
|---|---|---|---|
addresses[type eq "home"].country | Country | Read | Mandatory |
addresses[type eq "home"].region | State | Read | Optional |
emails[type eq "home"].value | Recovery Email | Read | Optional |
Update Entra ID Attribute Mapping
In the Microsoft Entra admin center, navigate to the Axiad Conductor Enterprise application
In the Manage menu, click Provision
In the Manage menu, click on Attribute mapping (Preview)
Click Provision Azure Active Directory Users
Click Show advanced options
Click Edit attribute list for <Axiad Conductor Enterprise Application>
Add the following attributes at the bottom of the page:
Name | Type | Primary Key? | Required? | Multi-value? | Exact case? | API Expression | Referenced Object Attribute |
|---|---|---|---|---|---|---|---|
addresses[type eq "home"].region | String | Unchecked | Unchecked | Unchecked | Unchecked | Empty | 0 selected |
addresses[type eq "home"].country | String | Unchecked | Unchecked | Unchecked | Unchecked | Empty | 0 selected |
emails[type eq "home"].value | String | Unchecked | Unchecked | Unchecked | Unchecked | Empty | 0 selected |
Save the settings
Click Add New Mapping
Required
Only provisioning the country attribute is mandatory, but Axiad recommends provisioning all attributes if possible
Mapping Type | Source Attribute | Default value if null (optional) | Target Attribute | Match objects using this attribute | Matching precendence | Apply this mapping |
|---|---|---|---|---|---|---|
Direct | <Attribute that contains user’s state> | Empty | addresses[type eq "home"].region | No | Empty | Always |
Direct | <Attribute that contains user’s country> | Empty | addresses[type eq "home"].country | No | Empty | Always |
Direct | <Attribute that contains user’s personal email> | Empty | emails[type eq "home"].value | No | Empty | Always |
Direct | <Attribute that contains user’s start date> | Empty | urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:onboardDate | No | Empty | Always |
Active Directory Attributes Mapping
Reset the user’s AD password once verification is successful Once verification is successful in Axiad-Confirm, the user's password will be reset in AD.
Configure UCMS to Use AD Hostname
In UCMS → AD Configuration, replace the IP address with the AD hostname.
Before | After |
|---|---|
|
|
Update UCMS Server Hosts File
a. Get the AD server hostname by running
nslookupon the AD server:
C:\Users\Administrator>nslookup Default Server: srv01dc.domain.local Address: 10.0.1.216
b. Add the hostname entry to the UCMS server:
bash
sudo nano /etc/hosts
Add the following entry:
65.0.213.35 SRV01DC.domain.local
Export and Import AD Certificate
Export the certificate from AD (run on UCMS server or any machine with OpenSSL): bash
openssl s_client -connect SRV01DC.domain.local:636 -showcerts </dev/null | \ sed -n '/-----BEGIN CERTIFICATE-----/,/-----END CERTIFICATE-----/p' > dc-cert.cerVerify the certificate was exported: bash
cat dc-cert.cer
c. Import the certificate into the Java keystore:
bash
keytool -import -trustcacerts -alias dc-cert \ -file dc-cert.cer \ -keystore /opt/java/jre/lib/security/cacertsNote: The keystore path may vary depending on your Java installation.
Restart UCMS service.
Delegate Password Reset Permissions in AD
The User Bind DN account configured in UCMS must have permission to reset user passwords in AD.
On the Domain Controller:
Open Active Directory Users and Computers
Right-click on the domain → Select Delegate Control
Select the User Bind DN account used in UCMS AD configuration
Grant the following permission:
✅ Reset user passwords and force password change at next logon
Complete the wizard
Note:
4.26/2.21 supports 3-letter country codes.
In the demo environment, when Confirm Drop1 is upgraded to Confirm Drop2, edit Confirm workflows and configure the Confirm Outcome step as per Drop2 changes.
Create Verification Server
A verification server is required to connect to the identity verification service used by Axiad Confirm. Following the configuration steps in the Create a Verification Server guide.
Create / Update Credential Workflow
Create or edit a Credential Workflow
In the Configure Workflow Steps section, select Confirm Outcome in the left-side menu
Select the Identity Provider from the dropdown
Click Done
Save the configuration

Optional: Update Notification Template
You can modify the content in the emails sent to users during the Axiad Confirm process.
In the Axiad Conductor Operator Portal, navigate to Configuration > Notifications > Notification Templates
Locate the Mail to user about Identity Verification template and click the Edit icon

Make any preferred changes and Save the template