The RiskMinder SDK offers you multiple degrees of freedom in the available integration methods and the types of risk-based authentication flows. (See "Understanding RiskMinder Workflows" for more information on supported workflows.) This enables you to design the optimal authentication solution that best suits your organization’s requirements.
The RiskMinder flows can be integrated with your online application at the points discussed in following subsections.
In this case, your application must invoke RiskMinder’s evaluateRisk() function call from the login page (before the user specifies the login credentials) to assess the risk associated with the incoming data. For example, you can evaluate the IP address and/or the country for Negative IP and Negative Country checks.
Note: Negative IP addresses is a collection of IP addresses that have been the origin of known anonymizer proxies or fraudulent or malicious transactions in past. Similarly, Negative countries is a collection of all countries from which fraudulent or malicious transactions have been recorded in past.
In this case, you can also evaluate other RiskMinder rules that do not require user information. These include Device Velocity Check and any custom rules you might have implemented.
In this case:
In this case, your application must invoke RiskMinder’s evaluateRisk() function call by passing user, device signature (collected by using the DeviceDNA Javascript provided by RiskMinder), IP address, and transaction details for assessing the risk:
Note: You can also use CA AuthMinder for this purpose.
See http://www.ca.com/us/two-factor-authentication.aspx for more information.
Only if your application authenticates the user during the secondary authentication, then you must grant the user access to the protected resource or Web page and allow the user to continue with the transaction.
In this case, your application must invoke RiskMinder’s createUserRequest message in the ArcotUserRegistrySvc Web service by passing user details to create the user in RiskMinder database.
Important! Because RiskMinder works "behind the scene" for an end user, it is recommended that you do not change the end-user experience for this enrollment.
After RiskMinder "knows" the user after this enrollment, then you must call the evaluateRisk() function and allow the user to proceed with the transaction, if the advice is ALLOW.
See "Enrollment Workflows" for more information on the two different ways in which you can enroll users.
|
Copyright © 2013 CA.
All rights reserved.
|
|