Previous Topic: RiskMinder SDK FeaturesNext Topic: Before You Begin


Overview of the Integration Steps

The RiskMinder SDK offers you multiple degrees of freedom in the available integration methods and the types of risk-based authentication flows. (See "Understanding RiskMinder Workflows" for more information on supported workflows.) This enables you to design the optimal authentication solution that best suits your organization’s requirements.

The RiskMinder flows can be integrated with your online application at the points discussed in following subsections.

Before a User Logs in to Your Application (and Just Accesses the Login Page)

In this case, your application must invoke RiskMinder’s evaluateRisk() function call from the login page (before the user specifies the login credentials) to assess the risk associated with the incoming data. For example, you can evaluate the IP address and/or the country for Negative IP and Negative Country checks.

Note: Negative IP addresses is a collection of IP addresses that have been the origin of known anonymizer proxies or fraudulent or malicious transactions in past. Similarly, Negative countries is a collection of all countries from which fraudulent or malicious transactions have been recorded in past.

In this case, you can also evaluate other RiskMinder rules that do not require user information. These include Device Velocity Check and any custom rules you might have implemented.

After a User Logs in to Your Online Application (By Specifying the User Name and Password to Access Their Account or the Protected Resource)

In this case:

  1. Your application must invoke RiskMinder from the main page of your application that appears after successful login. The following scenarios are possible:
  2. Your application invokes RiskMinder’s postEvaluate() function after the evaluateRisk() function. RiskMinder Server determines whether to create a user-device association and update the attributes based on the results of this function.