View Risk-Based Authentication Settings for a User

Document created by RSA Information Design and Development on Jun 13, 2017Last modified by RSA Information Design and Development on Jun 13, 2017
Version 2Show Document
  • View in full screen mode

You can view the risk-based authentication (RBA) settings for a user to do any of the following:

  • View whether the user is currently enabled for RBA.

  • View the number of devices in the user's device history.

  • Delete the user's device history.

  • View the identity confirmation methods that are allowed by the RBA policy, and determine whether the user has configured each method.

  • View silent collection details for the user, including whether silent collection is allowed by the RBA policy, whether the silent period has started, and how many days are remaining in the silent collection period.

Procedure 

  1. In the Security Console, click Identity > Users > Manage Existing.

  2. Use the search field to find the user. Some fields are case sensitive.

  3. Click the user that you want to view, and select Risk-Based Authentication.

 

 

 


Attachments

    Outcomes