Settings

Prev Next

1. Introduction

Use the Settings menu to manage users, license, and proxy settings.


2. General

The General settings let you configure data retention policies and perform software updates.

Data retention

Select for how long data is retained. The default retention period is forever.

Version

The version settings display the current version. If a new version is available, Verax will display it on this page. Click Download update to update to the newest version.


3. User Management

The User Management page lets you add, delete, and edit users.

Add a New User

Add a new user under Settings > User Management.

To add a new user, click Add user on the top right.

The Add New User dialog appears. Fill out the fields and then click Save. Click Save and add another to add multiple users. You can only add one user at a time.

  • Email

  • First Name

  • Last Name

  • Password

    • The password must abide by the following guidelines:

      • At least 8 characters

      • 1 lower case character

      • 1 upper case character

      • 1 special character

      • 1 number

Edit Existing Users

To edit an existing user, click the three dots to the right of the user.    

Currently the only option available is Reset password but more options will be added in the future.

To reset a users’s password, click Reset password. Enter the New password and click Reset password.

Delete a User

To delete an existing user, click the three dots to the right of the user and choose Delete.  

The user will be removed from the system and will no longer have access to Verax Protect. Click Delete.

 


4.License

The License page shows your license details, including time remaining and the license expiration date. Learn more about License.


5. Traffic redirect

The Proxy tab lets you edit existing proxy settings and view ICAP integration settings.

Edit Existing Proxy Settings

To edit existing proxy settings to connect to Verax via a proxy, click Edit proxy settings.

Upload new Certificate and Key data files. Click Save.

Note: This operation can take a minute, during that time our proxy will not receive requests.


6. Identity Provider

The Identity Provider tab lets you connect tingsConnect your organization's identity provider to enable user authentication and identity-aware AI policies in Verax.

Follow these steps to configure Entra ID for Verax:

  1. In the Azure portal, go to Entra ID > App registrations and click New registration.

  2. Enter an application name, select Accounts in this organizational directory only (Single tenant), and add a Redirect URI:
https://verax.internal/oidc/callback

  3. After the app is created, go to API permissions and add Microsoft Graph permissions:

    • User.Read

    • Groups.Read.All

  4. Click Grant admin consent for the tenant.

  5. Go to Token configuration, add a Groups claim, and include Security groups.

  6. Go to Certificates & secrets, create a Client secret, and copy its value.

  7. Copy the Tenant ID and Application (Client) ID, then paste the Tenant ID, Client ID, and Client Secret into Verax to complete the connection.

Follow these steps to configure Okta for Verax:

  1. Register the application

    1. In the Okta Admin Console, go to Applications > Applications > Create App Integrations

      1. Choose OIDC — Open ID Connect

      2. Select Web Application

      3. Click Next

    2. Enter:

      1. Application name: Verax

      2. Sign-in redirect URI: https://verax.internal/oidc/callback

      3. Under Assignments / Controlled access:

        1. Select Allow everyone in your organization

        2. Enable Immediate access

    3. Click Save

    4. After the app is created, copy the Client ID and Client Secret

  2. Add API permissions

    1. In the Okta Admin Console, go to Applications > Verax > Okta API Scopes

    2. Add the following scopes:

      1. okta.users.read

      2. okta.groups.read

    3. Click Save

  3. Get the Issuer URL

    1. In the Admin Console, go to Security > API > Authorization Servers

    2. Choose the authorization server you’ll use (usually default) and copy the Issuer URI, for example: https://{yourOktaDomain}/oauth2/default

  4. Configure an access policy for the app

    1. In the Admin Console, go to Security > API > Authorization Servers

    2. Select the authorization server you’re using and create a policy.

      1. Click Add Policy

      2. Name: Allow OIDC for Verax

      3. Assign to the Verax application

    3. Create rule under the policy:

      1. Click Add Rule

      2. Name: Allow Authorization Code

      3. Grant types:

        1. Authorization Code

        2. Client Credentials

      4. Apply to: Any user

      5. Access: Allow

    4. Save the rule and policy.

  5. Complete the connection in Verax

    1. From Okta, copy:

      1. Issuer URL

      2. Client ID

      3. Client Secret

    2. Paste these values into Verax to complete the Okta connection.

Once connected, you can enable Identity enforcement under Protect > Global settings.


7. LLM Integration

LLM Integration in Verax

Verax allows you to connect your own large language model (LLM) to enable specific AI-assisted features within the platform. This integration is optional and fully controlled by your organization.

This article explains what the LLM integration is used for, how it works, and what data is and is not shared with the model.

What is the LLM Integration?

The LLM integration allows Verax to use your organization’s LLM provider to assist with selected configuration workflows.

Currently, the LLM is used to support policy and rule configuration, such as:

  • Extracting topics and entities for Topic Similarity conditions

  • Helping structure rule conditions based on administrator-provided input

The LLM is not used to process or analyze end-user AI interactions.

Bring You Own LLM

Verax follows a bring-your-own-LLM model.

This means:

  • You choose which LLM provider to connect

  • You provide and manage the API credentials

  • Verax does not use a shared or managed model on your behalf

All LLM interactions occur using your configured provider and credentials.

What Data is Sent to the LLM

Verax sends only configuration-related input to the LLM.

Specifically, this includes:

  • Text entered by administrators when defining rule conditions, such as topic descriptions

  • Metadata required to extract topics or entities from that text

This data is sent only when an administrator explicitly triggers an LLM-assisted action, such as generating topics and entities.

What Data is NOT Sent to the LLM

Verax does not send the following data to the LLM:

  • End-user prompts or responses

  • AI chat conversations

  • Customer or employee content

  • Sensitive or regulated data detected during enforcement

  • Logs, alerts, or traffic data

  • Any runtime AI interactions

The LLM is never used in the real-time enforcement path.

Enforcement Without an LLM

Connecting an LLM is not required to enforce rules in Verax.

If no LLM is connected:

  • Rules continue to be enforced normally

  • Topic similarity conditions can be configured manually

  • All other condition types remain fully functional

The LLM integration is designed to assist configuration, not to gate security enforcement.

Connecting an LLM

To connect an LLM:

  1. Navigate to Settings → LLM Integration

  2. Select your LLM provider

  3. Provide the required API credentials

  4. Save the configuration

Once connected, LLM-assisted features become available in supported configuration workflows.

Summary

The LLM integration in Verax is designed to provide optional, controlled assistance during policy configuration while maintaining strict data boundaries.

  • You control the LLM provider

  • Only configuration input is shared

  • No end-user or sensitive data is sent

  • Enforcement does not depend on the LLM

This approach allows organizations to benefit from AI-assisted configuration without compromising security or data governance.