The advanced authentication flows that you can enable and configure are based on the credential types that you have enabled. You configure the advanced authentication flows that are requested by the tenant administrator.
Follow these steps:
The Select Flow Types screen opens.
The Enabled Flow Types screen opens.
The Flow Configuration screen displays a list of the different scenarios in which the end user is prompted for secondary authentication.
Note: An end user forgetting the password is an example of a use case in which the end user is prompted for secondary authentication. For information about all such use cases, see the Getting Started Guide for Advanced Authentication.
Depending on the advanced authentication flow type that you are configuring, you can select any one or a combination of the following secondary authentication methods:
Note: Consider the following when selecting these mechanisms:
As secondary authentication is invoked when performing sensitive tasks, such as resetting passwords or authenticating roaming users, it is recommended that a combination of authentication mechanisms be chained together. Chaining of secondary authentication mechanisms provides a higher level of security.
Note: Consider the following when selecting this option:
The current date and time is displayed in the Last Configured Date column.
The configured advanced authentication flows are now available for use in authentication schemes that can be configured for the tenant’s resources.
|
Copyright © 2013 CA.
All rights reserved.
|
|