Risk factors are either connected to the Access Evaluation node or the Start node if no Access Filters have been added to the graph. Risk factors are then connected to the Risk Evaluation node. The following figures provide examples.
Risk
Factors with no Access Filters connections
Expand the following topics to see how to configure risk factors. To see the Risk Factor settings, click the Risk Factor node.
For example, to see the Date/ Time settings:
1. Click the Date/Time node. The Date/Time settings appear on the side of the graph window.
2. Configure the settings, as required.
The Date/Time risk factor sets restrictions for authentication attempts within specific dates and times.
1. Click the Time/WeekDay tab to set the time, date, and day restrictions, as follows:
a. Click Allow or Deny to allow or deny a user access based on the Date and Time settings.
b. Select the Time Zone from the drop-down list.
c. Set the Start Time. You can enter it manually or click the icon and set it with the clock.
d. Optional. Set the End Time. You can enter it manually or click the icon and set it with the clock.
e. Click the specific Weekdays that are restricted by the Date/Time settings.
2. Click the Date Range tab, to set Date Range decision.
a. Click Allow or Deny to allow or deny a user access based on the Date Range settings.
b. Select the Time Zone from the drop-down list.
c. Set the Start Date. You can enter it manually or click the icon and set it with the calendar.
d. Optional. Set the End Date. You can enter it manually or click the icon and set it with the calendar.
The resource rule checks to ensure that the authenticating device contains a device certificate issued by a Trusted CA configured in IDaaS. There is no additional configuration required.
This setting adds External Risk Engines as a risk factor to the resource rule. You must have a risk engine configured to use this feature. See Manage external risk engines for more information.
1. Select the External Risk Engine from the drop-down list.
2. Click Add to add Rules.
3. Select the Rule from the list.
4. Repeat this step to add more rules.
5. Set a Risk Limit.
● The risk limit value must be less than the maximum risk score.
● External risk engine risk points apply if the accumulated risk score of the failed rules exceeds the risk limit.
Geolocation allows or denies authentication from a list of countries.
1. Select Allow or Deny to create an allowed or denied country list.
2. From the Build countries drop-down list, select the country to add to the allowed or denied list.
3. Repeat this step to add more countries to the list.
The resource rule checks to ensure that the IP address in the request matches a location that was used for a previous authentication request. No further configuration is required for this setting.
The Location History is determined by the settings configured for risk-based authentication. See Modify risk-based authenticator settings.
Machine authentication checks for the fingerprint mismatch risk limit.
The risk score is based on the attribute differences between a user's
Machine Authentication information and that recorded on Identity as
a Service before the condition fails. If an attribute does not match,
the attribute incurs the number of risk points shown in the Fingerprint Mismatch Risk Limit.
The Fingerprint Mismatch Risk Limit
values of each non-matching attribute are added together, resulting
in a total risk score. This score is normalized to be out of 100 as
follows:
Total Risk Score
= (Total Risk Points of Failing Attributes / Maximum Risk Points of
All Enabled Attributes) * 100
The resource rule condition fails when the number of non-matching risk
points exceeds the Machine Authentication Risk value defined in this
step. A value of 0 means that a single
attribute difference causes the Device
Fingerprint condition to fail. The default value is 3.
The value between 0-50 can be entered.
The default value is defined by the Machine Risk
Limit. To use this feature, both machine nonce and device fingerprint
must be enabled. See Manage machine authenticator
settings.
Set the Fingerprint Mismatch Risk Limit
1. Drag the rule to set the Fingerprint Mismatch Risk Limit to the maximum total number of non-matching risk points allowed before a machine authentication attempt fails. Each mismatch adds 10 risk points by default.
Resource rules can support up to two transaction contexts as part of their evaluations for Entrust Identity as a Service Authentication APIs and OIDC and OAuth applications. Transaction contexts work as follows:
● Resource rules can support up to two transaction contexts as part of their evaluations for Entrust Identity as a Service Authentication API applications.
● A transaction context is associated with one or more transaction rules with a risk score. As transaction rules are evaluated, if the accumulated risk score of the failed transaction rule is greater than a defined risk limit value for the transaction context, risk is assumed and the transaction context risk points are added to the overall risk point total.
● A transaction rule is defined as a transaction rule expression.
● A transaction rule expression is a boolean expression, using AND and OR operators, where the operands of the expression can be additional transaction rule expressions or transaction item expressions.
● A transaction item expression is a simple, single expression of a transaction item and its expected value (for example, Account = "S053541", Amount > "10000", Action = "DEPOSIT", Channel = "ATM").
● A transaction item is a transaction detail name, that is passed in transaction details during authentication, along with its type (STRING or NUMERIC), whether it must be present if a transaction rule uses it, and its default value if it is does not need to be present and is not passed as part of the transaction details during authentication.
To set transactions contexts, see Manage transactions. You need to do this first before you add Transactions to the resource rule.
1. Click the Risk Condition tab, and configure the following:
a. Enter a Name for the transaction.
b. Click Add to add a transactions rule. See Manage transactions.
c. Click Add again to add more rules.
d. Enter the Risk Limit to the maximum transaction risk points allowed before a transaction attempt fails. Transaction risk points apply if the accumulated risk score of the failed transaction exceeds the risk limit.
2. Click the Manage Transactions tab to add or edit Transaction Rules, as follows:
To add a rule
a. Under Transactions Rules, click Add. The Add Transaction Rule dialog box appears.
b. Enter a Name for the transaction rule.
c. Select the AND or OR operator for each added group expression.
d. Select the Transaction Item to which the rule applies from the drop-down list.
e. Select the Operator from the drop-down list.
f. Add a value in the Value text box.
To add another set of rules to the Transaction Rule, click Add Group.
a. Select the AND or OR operator for each added group expression.
b. Select the Transaction Item, Operator, and add a Value.
c. Click Submit when done.
To test a rule
a. Click
to test the Transaction Rule. The Test
Rule dialog box appears.
b. Click Test Rule.
c. Click Close to close the dialog box.
The resource rule checks that the travel speed (KMH) is above the value defined in the Check Travel Velocity setting of risk-based authenticators. See Modify risk-based authenticator settings.