GUIDE  BOOK  REFERENCE  OTHER  DEVELOPER
Report a problem 
Evolveum Docs
  • MidPoint
  • IAM Introduction
  • Book
  • Identity Connectors
  • Talks

Navigation Tree

  • Identity and Access Management
  • Book
  • MidPoint
    • Quick Start Guide
    • Compliance
    • Installation
    • Releases
    • Roadmap
    • Features
    • Architecture
    • Security
    • Guides
    • Developer Zone
    • Exercises
    • Live Demo
    • Operations Manual
    • reference
    • MidPrivacy
    • MidScale
    • MidPoint Studio
    • Methodology
      • First steps with midPoint
        • Outline & iterative concept
        • 1. Plan your deployment
        • 2. Connect source system
        • 3. Integrate target system
        • 4. Provision to target system
        • 5. Automate provisioning
        • 6. Verify configuration behavior
          • Rectify unauthorized changes
          • Handle data updates
          • Inactivate employee accounts
          • Provision new attributes to target
          • Update existing mapping
        • 7. Rectify source data
        • Audience
        • Connect Source and Target
        • Automation
        • Handling multiple sources
      • Group synchronization
      • IGA Design Notes
    • Projects
    • Tools
    • Versioning
    • History
  • Identity Connectors
  • Support
  • Trainings
  • Why Evolveum?
  • Community
  • Library
  • Case Studies
  • Talks
  • Glossary
  • Frequently Asked Questions
  • About
  1. MidPoint
  2. Methodology
  3. First steps with midPoint
  4. 6. Verify configuration behavior

Verify the whole configuration behaves as expected

Last modified 10 Dec 2025 13:59 +01:00

The following set of modules focuses on helping you verify the behavior of the configuration you have created so far.

Was this page helpful?
YES NO
Thanks for your feedback
Evolveum public documents and files
Docs
  • Sitemap
  • About the site
  • Copyright
Evolveum
  • Services
  • About us
  • Contact us
Follow us
Copyright © 2011-2025 Evolveum s.r.o., CC BY-NC-ND