ThreatMetrix Integration Kit

Integrating device profiling

Depending on your authentication mode and preferences, complete one of the following steps to capture the device profile. You can find a description of each method in Device profiling methods.

Steps

  1. Do one of the following:

    Method Steps

    Built-in (basic)

    No extra steps are necessary. Continue to Configuring an adapter instance.

    Web app (basic)

    Web app (enhanced)

    Mobile or native app (enhanced)