When RiskMinder generates the INCREASEAUTH advice, it transfers the control back to your application temporarily for secondary authentication. In this case, your application must implement some mechanism for performing additional authentication. For example, your application can display industry-standard security (or challenge) questions to the user (such as mother’s maiden name and date of birth) or make them undergo out-of-band phone authentication.
After you determine whether the user authenticated successfully or not, you must forward the result to RiskMinder, which uses this feedback to generate the final advice, update device information, create association information, and store the feedback to use for risk analysis of future transactions.
The risk evaluation workflow in the case of secondary authentication is as follows:
Your system validates if the user exists in the system. If the user is not valid, then your application must take appropriate action.
Your application collects the following information from the user\xE2\x80\x99s system that will be used by RiskMinder for analyzing the risk:
Your application must call the evaluateRisk operation in RiskFortEvaluateRiskSvc. In this call, you must pass all the user and device information that you collected in Step 2 to RiskMinder.
If RiskMinder flags the transaction as suspicious, it generates the INCREASEAUTH advice. This implies that extra credentials are required to further authenticate the user.
Based on the secondary authentication mechanism that you are using, your application displays the appropriate pages to the user. For example, you can prompt the user to:
After receiving the user input, your application determines the outcome of the additional authentication.
Irrespective of whether the user failed or cleared the secondary authentication, your application must pass the result back to RiskMinder. This information helps RiskMinder build an up-to-date and accurate user history.
To do so, your application must call the postEvaluate operation in RiskFortEvaluateRiskSvc. In this call, you must pass the risk score and advice from the evaluateRisk call, the result of secondary authentication, and any association name, if the user specified one.
By using your application’s feedback regarding the secondary authentication, RiskMinder generates the final advice.
Based on the result of the postEvaluate call, RiskMinder also updates the device attributes and creates the association information in the RiskMinder database.
Based on the result of the postEvaluate call, your application either allows the user to continue with the transaction or denies them access to the protected resource.
The following figure illustrates the secondary authentication risk evaluation workflow.
Secondary Authentication Risk Evaluation Workflow

|
Copyright © 2013 CA.
All rights reserved.
|
|