Previous Topic: Secondary Authentication WorkflowNext Topic: Managing Web Services Security


Workflow Summary

The following table provides a brief summary of the workflows provided by RiskMinder.

Note: All these workflows, except for the secondary authentication workflow, are implemented "behind the scenes" and do not change the user experience.

Workflow

Sub-Type of the Workflow

Description

Dependant Workflows

 

Enrollment

Explicit

 

Scenario 1: Creates a user in the RiskMinder database, when you call the createUserRequest message before evaluateRisk.

In this case, the end user never gets an ALERT advice.

  • Post-Login Risk Evaluation

Scenario 2: Creates a user in the RiskMinder database, when you call the createUserRequest message after evaluateRisk.

  • Post-Login Risk Evaluation

 

Implicit

RiskMinder automatically creates a user in the RiskMinder database, without you having to call the createUserRequest message.

  • Post-Login Risk Evaluation

 

 

 

 

Risk Evaluation

Pre-Login

Analyzes the risk of a transaction before the user logs in to your online application system.

None

Post-Login

Analyzes the risk of a transaction after the user logs in to your online application system.

Also updates user information and device association information.

  • Enrollment
  • Secondary Authentication

In case of Secondary Authentication

Provides the final advice if your application performed secondary authentication after RiskMinder recommended INCREASEAUTH.

Also updates user information and device association information.

  • Post-Login Risk Evaluation