New Articles

  1. Notes, Tips & Warnings

    Learn about the symbols for notes, tips, and warnings in the Resolver Security Risk Management User's Guide.
  2. Important Notes About the Security Risk Management Guide

    Learn more about the Resolver Security Risk Management User's Guide.
  3. Who Should Use the Security Risk Management Guide

    Learn about the intended audience of the Security Risk Management User's Guide.
  4. Data Region

    Find out where your Resolver Security Risk Management data is stored.
  5. Edit Form Template

    More information about the Edit Form Template option, which allows admins to quickly access a form's settings.
  6. Security Risk Management Introduction Overview

    An overview of Resolver's Security Risk Management application.
  7. Update Policies

    How to update a policy as a member of the Policy Owners user group.
  8. API Keys

  9. Renew a Session Token

    To maintain the current session: From Swagger, scroll down to the  authenticate  endpoint. Click  GET /user/authenticate (Renew token) . Enter the bearer token that's about to expire in the authorization header. Click  Try it out!  to return a ...
  10. Impersonation with an API Key

    API keys can be used to authenticate requests in Core while impersonating another user; however, note the following: Impersonation can only be enabled by a member of Resolver Support at the time the key was created. Should you wish to enable impe...