ThreatMetrix Integration Kit

Integrating device profiling

Depending on your authentication mode and preferences, complete one of the steps below to capture the device profile.

About this task

For description of each method, see Device profiling methods.

Steps

  1. Do one of the following:

    Method Steps

    Built-in (basic)

    No extra steps are needed. Continue to Configuring an adapter instance.

    Web app (basic)

    Web app (enhanced)

    Mobile or native app (enhanced)