The risk evaluation workflows enable your online application to determine if the incoming user request is potentially risky or not:
If the user fails this additional authentication, then it is recommended that you do not allow the user to access the protected resource(s).
You can implement RiskMinder’s risk analysis capability either before the user logs in to your online application or after they have successfully logged in and are performing a transaction. Depending on when you call RiskMinder’s evaluateRisk() function, the following workflows are possible:
|
Copyright © 2013 CA.
All rights reserved.
|
|