Implementing Risk-Based Authentication

Document created by RSA Information Design and Development on Jun 13, 2017Last modified by RSA Information Design and Development on Jun 13, 2017
Version 2Show Document
  • View in full screen mode

Complete the following tasks to implement risk-based authentication (RBA).

Before you begin 

Choose a backup authentication method so that users can continue to access network resources if Authentication Manager is unavailable or user authentication is unsuccessful. See Backup Authentication Method for Risk-Based Authentication.

Procedure 

  1. Update the Domain Name System (DNS) with entries for Authentication Manager. For instructions, see Planning for Domain Name System Updates.

  2. Specify the RBA policy for your deployment integration. For instructions, see Add a Risk-Based Authentication Policy.

  3. Ensure high availability for RBA. See Backup Authentication Method for Risk-Based Authentication.

  4. Obtain the RSA Authentication Agent software or third party product. See Obtaining RSA Authentication Agents.

  5. Deploy the RSA Authentication Agent software or third party product. See Deploying an Authentication Agent.

  6. Install the RBA Integration Script Template.

  7. Configure the Authentication Agent for Risk-Based Authentication.

  8. Use the implementation guide that you downloaded when you obtained the agent to configure your agent to pass authentication requests to and from Authentication Manager.

  9. Test the RBA integration. See Testing Your Risk-Based Authentication Integration.

 

 


Attachments

    Outcomes