How a User Configures an Identity Confirmation Method

Document created by RSA Information Design and Development Employee on Jun 13, 2017Last modified by RSA Information Design and Development Employee on Jul 27, 2020
Version 14Show Document
  • View in full screen mode

To configure an identity confirmation method, a user must do one of the following:

  • Complete the configuration process inline during silent collection.

    During silent collection, if the user’s assurance level meets the required assurance level, the user is prompted to configure an identity confirmation method.

  • Complete the configuration process by invitation using the Self-Service Console.

    After an administrator sends users the link to the Self-Service Console with instructions on how to configure a method, users log on to the Self-Service Console and configure an identity confirmation method.

 

 

 

 

 

You are here
Table of Contents > Policies > How a User Configures an Identity Confirmation Method

Attachments

    Outcomes