Connector-based risk engines support configuration of the IDaaS API to support third-party risk engines without the need to do development. Before you begin, review the information about placeholders. Placeholders are optional and can be used in the HTTP Connector to further define the data requested from the external risk engine.
Connector-based risk engine configuration supports the use of placeholders. A placeholder is a symbol to mark a place and name when configuring connectors for the dynamic data and you do not have the values when composing the API call. The values are populated in when the call is made to the connector.
Placeholders are supported for the following:
● URL path (not in hostname/domain section)
● Authorization header (not name)
● Request Body
The following describes placeholder restrictions:
● Placeholders are marked by {{}}
● Placeholder must start with any of these prefixes:
– REQ.—The placeholder's value comes from the Request body. The rest of placeholder after prefix REQ. must match one of the names in the transactionDetails of the request.
– USER.—The value from a user's attributes.
– ENV.—The environment data. Only clientIp is supported.
– AUTH—The authentication information gathered from the Authentication Method used in the risk engine configuration.
● Placeholders prefixed by REQ., USER., or ENV. include dynamic data that interacts with the user's inputs. The name after the prefix must match. In contrast, AUTH is a special type of placeholder.
● Domain and subdomain in the URL are static—no placeholders are allowed.
● Placeholders cannot use delimiter symbols. The placeholders and resultItems used in the same HTTP Connector must be unique.
● A placeholder, once configured, must have its values, in one of the following:
– AUTH—HTTP Connector configuration
– REQ. and ENV.—Request payload in the transactionDetails and usage must be RBA.
– The UI input.
– USER.—User attribute configuration
● All the values are mandatory. If any placeholder cannot find its matching values, the connector call will fail.
Configure Connector-based external risk engine
1. Click
> Configuration > External
Risk Engines. The External Risk Engines page
appears.
2. Click Add and then select Connector-based Risk Engines from the drop-down list. The Add External Risk Engine page appears.
3. Enter a Name field for the external risk engine.
4. Select Enabled to enable the external risk engine.
Note: You can also enable or disable the external risk engine after you add it from the External Risk Engines page.
5. From the Authentication Request drop-down list, select how IDaaS authenticates to the risk engine to make a risk request. Options include:
● Authentication Request. The risk engine returns an authentication token. IDaaS uses the authentication token to make the authentication risk calls. If you select this option, you must add an Add Authentication Connector to configure how IDaaS makes the request to the risk engine to obtain the authentication token.
Add
an Authentication Connector.
● Basic Authentication. You are prompted to enter the username and password defined by the risk engine and include it in the risk request.
● Mutual TLS. You are prompted to upload the certificate file that is shared with the risk engine server.
● API key. You are prompted to enter the API key defined by the risk engine.
6. Add
a Risk Score Connector.
The Risk Score Connector returns the risk score from the external risk
engine.
7. Add Rules used to assess the risk score. You must add at least one rule. Follow these steps:
a. Click Add. The Add Rule dialog box appears.
b. Enter a Name for the rule that defines the risk factor.
c. From the Risk Item drop-down list, select The risk items available are based on the Result Items for the risk connector you created in step 7.
d. Select the required Operator from the drop-down list.
e. Add a value in the Value text box.
f. Optional.
Add multiple rules to the rule by creating a Group.
g. Click Save.
h. Repeat these steps to add more rule.
8. Click Save to save the external risk engine and return to the External Risk Engines page.