The following table provides a brief summary of the workflows provided by RiskMinder.
Note: All these workflows, except for secondary authentication workflow, are implemented "behind the scenes" and do not change the user experience.
|
Workflow |
Sub-Type of the Workflow |
Description |
Dependant Workflows |
|---|---|---|---|
|
Enrollment |
Explicit
|
Scenario 1: Creates a user in the RiskMinder database, when you call the createUserRequest message before evaluateRisk(). In this case, the end user never gets an ALERT advice. |
|
|
Scenario 2: Creates a user in the RiskMinder database, when you call the createUserRequest message after evaluateRisk(). |
|
||
|
Implicit |
RiskMinder automatically creates a user in the RiskMinder database, without you having to make the createUserRequest message call. |
|
|
|
Risk Evaluation |
Pre-Login |
Analyzes the risk of a transaction before the user logs in to your online application system. |
None |
|
Post-Login |
Analyzes the risk of a transaction after the user logs in to your online application system. Also updates user information and device association information. |
|
|
|
In case of Secondary Authentication |
Provides the final advice in case your application performed a secondary authentication after RiskMinder recommended INCREASEAUTH. Also updates user information and device association information. |
|
|
Copyright © 2013 CA.
All rights reserved.
|
|