Previous Topic: Secondary Authentication WorkflowNext Topic: Before You Begin


Workflow Summary

The following table provides a brief summary of the workflows provided by RiskMinder.

Note: All these workflows, except for secondary authentication workflow, are implemented "behind the scenes" and do not change the user experience.

Workflow

Sub-Type of the Workflow

Description

Dependant Workflows

 

Enrollment

Explicit

 

Scenario 1: Creates a user in the RiskMinder database, when you call the createUserRequest message before evaluateRisk().

In this case, the end user never gets an ALERT advice.

  • Post-Login Risk Evaluation

Scenario 2: Creates a user in the RiskMinder database, when you call the createUserRequest message after evaluateRisk().

  • Post-Login Risk Evaluation

 

Implicit

RiskMinder automatically creates a user in the RiskMinder database, without you having to make the createUserRequest message call.

  • Post-Login Risk Evaluation

 

 

 

 

Risk Evaluation

Pre-Login

Analyzes the risk of a transaction before the user logs in to your online application system.

None

Post-Login

Analyzes the risk of a transaction after the user logs in to your online application system.

Also updates user information and device association information.

  • Enrollment
  • Secondary Authentication

In case of Secondary Authentication

Provides the final advice in case your application performed a secondary authentication after RiskMinder recommended INCREASEAUTH.

Also updates user information and device association information.

  • Post-Login Risk Evaluation