As a first step, the tenant must decide on the types of credentials and flows to be enabled to protect different applications and resources.
A hosting administrator would require the following information from the tenant:
The available flows are as follows:
The available secondary authentication mechanisms are as follows:
In addition to selecting the mechanisms, the tenant can also specify whether two-step authentication must be enforced for a particular scenario.
As secondary authentication is typically invoked when performing sensitive tasks, it is recommended that a combination of these authentication mechanisms be chained together for enhanced security.
Note: For information about the Security Question mechanism (question and answer pairs), see CA IdentityMinder documentation.
|
Copyright © 2013 CA.
All rights reserved.
|
|