User Control with the Passive Identity Agent

The following topics discuss how to configure and use the passive identity agent.