Implementing Risk-Based Authentication

Document created by RSA Information Design and Development on Jun 13, 2017Last modified by RSA Information Design and Development on Apr 30, 2019
Version 10Show Document
  • View in full screen mode

Complete the following tasks to implement risk-based authentication (RBA).

Before you begin 

Choose a backup authentication method so that users can continue to access network resources if Authentication Manager is unavailable or user authentication is unsuccessful. See Backup Authentication Method for Risk-Based Authentication.

Procedure 

  1. Update the Domain Name System (DNS) with entries for Authentication Manager. For instructions, see Planning for Domain Name System Updates.

  2. Specify the RBA policy for your deployment integration. For instructions, see Add a Risk-Based Authentication Policy.

  3. Ensure high availability for RBA. See Backup Authentication Method for Risk-Based Authentication.

  4. Obtain the RSA Authentication Agent software or third party product. See RSA Authentication Agents.

  5. Deploy the RSA Authentication Agent software or third party product. See Deploying an Authentication Agent that Uses the UDP Protocol.

  6. Install the RBA Integration Script Template.

  7. Generate an Integration Script for a Web-Based Application.

  8. Use the implementation guide that you downloaded when you obtained the agent to configure your agent to pass authentication requests to and from Authentication Manager.

  9. Test the RBA integration. See Testing Your Risk-Based Authentication Integration.

 

 


Attachments

    Outcomes