To enable risk evaluation, the required risk evaluation rules must be configured. Some rules are configured with default values when the Advanced Authentication service is installed and set up. The remaining ones are configured by the CA CloudMinder administrator based on the information received from the tenant.
A tenant must provide the following details to configure risk evaluation:
Example: HTTP-based cookie
Example: 1 day
These could be IP addresses that have been the origin of known anonymizer proxies or fraudulent and malicious transactions in the past.
Transactions that originate from or are routed through these IP addresses are considered low risk. As a result, the Advanced Authentication service bypasses these transactions from risk evaluations and assigns them a low score and the ALLOW advice.
Transactions that originate from or are routed through aggregators “trusted” to the organization are considered low-risk. As a result, the Advanced Authentication service bypasses these transactions from risk evaluations and assigns them a low score and the ALLOW advice.
Example: 5 end user transactions evaluated in 60 minutes
Example: 10 transactions evaluated per device in 60 minutes
If the speed at which a user appears to have moved (in the time frame between two successive transactions) exceeds this pre-configured threshold speed (S), then the Advanced Authentication service considers it a case of zone hopping.
Example: 500 miles
This setting enables multiple users (for example, husband and wife) to use the same user name though they might be located in different zones without the fear of being considered risk.
Example: 1
This value is required as there may be a variation in the location of the IP address provided by ISPs. A user's physical location (geographic latitude and longitude) cannot be determined to a high level of precision by using their public IP address.
Example: 50 miles
The Advanced Authentication service checks whether the match percentage between the input device signature and the corresponding stored device signature is greater than or equal to this threshold value.
Example: 50
|
Copyright © 2013 CA.
All rights reserved.
|
|