Methods for Enabling Users for Risk-Based Authentication

Document created by RSA Information Design and Development on Jun 13, 2017Last modified by RSA Information Design and Development on Jun 13, 2017
Version 2Show Document
  • View in full screen mode

A user must be enabled for risk-based authentication (RBA) to access an RBA-protected resource. Use one of the following methods:

Automatic. When a user accesses an RBA-protected resource, the user becomes enabled for RBA automatically after the first successful authentication. For instructions, see Enable Users Automatically for Risk-Based Authentication.

Manual. Only specified users can access RBA-protected resources. An administrator must manually enable these users for RBA. For instructions, see Enable Users Manually for Risk-Based Authentication.

Note:  Users you enable for RBA are counted against the RBA limit in your license.

Related Concepts

Risk-Based Authentication

 

 


Attachments

    Outcomes