Risk-based authentication (RBA) identifies the level of risk associated with every user who attempts to authenticate to your Identity as a Service account. This feature is useful when you want your users who access Identity as a Service to be
● Immediately accepted
● Given an extra authentication challenge
● Denied access based on their apparent level of risk
The RBA settings and the resource rules for the application work together to define the level of authentication required to access the application. See Create and manage resource rules for more information.
Note: Risk-based authentication cannot be used for RADIUS applications.
When a user needs to be authenticated using RBA, Identity as a Service runs two preliminary IP address checks that determine which (if any) of the IP/Geolocation tests are performed. The preliminary checks are:
Based on the results of the expected locations and private IP address checks, the following IP/Geolocation tests are run:
● Velocity
Based on the results of these tests and other resource rule conditions, such as transaction context conditions, the user authenticating is assigned a low, medium, or high-risk score. That score defines the level of authentication required from the user when authenticating to an application as defined by the application resource rule. See Create resource rules for more information.
The Expected Locations list contains recognized locations that your Identity as a Service users are expected to log in from. Identity as a Service provides two expected location lists:
● System-wide expected locations list (defined in the Risk-based authentication settings).
● A user's personal expected location list, which overrides the system-wide list when the two conflict (defined in the user's risk-based authentication settings)
– For example, if a user authenticates from a location that is not on the system-wide list, but is on the user's personal expected location list, the location is accepted.
– When a user logs in from a location on the Expected Location list (the system-wide list or user list), the Source IP, Geolocation and Location History / Known Location risk-based authentication tests are skipped. The tests related to the Date / Time, Machine ID, Travel Velocity, and potentially Transactions Items resource rule conditions are still performed.
The expected location list can include public and private locations.
Each entry for a public address in an expected location list can include one or more of:
– Country
– City Name
– ISP name
– IP Address
Note: You do not need all of these for a useful comparison. If any of these fields are missing, comparisons are performed using the information provided. For example, if the expected location list contains an entry with just the country, it matches any location within that country. If the list contains an entry with the country and region, it matches any location within that region of the country.
The following are used to determine a user's level of risk when they log into Identity as a Service:
● Device Data (see Manage machine authenticator settings)
Topics in this section:
● Modify risk-based authenticator settings
● Manage user risk-based authenticator settings
● Manage external risk engines