User Control with the Passive Identity Agent The following topics discuss how to configure and use the passive identity agent. The Passive Identity Agent Identity SourceDeploy the Passive Identity AgentHow to Create a Passive Identity Agent Identity SourceConfigure the Passive Identity AgentMonitor the Passive Identity AgentManage the Passive Identity AgentTroubleshoot the Passive Identity AgentSecurity Requirements for the Passive Identity AgentInternet Access Requirements for the Passive Identity AgentHistory for the Passive Identity Agent