Configure Device History Settings for a Risk-Based Authentication Policy
For risk-based authentication (RBA), the system maintains a device history for each user. The device history is a list of user authentication devices from previous successful logons. Once added to the list, the device is considered to be registered. When the user tries to access an RBA-protected resource using a registered device, the authentication attempt is likely to have a higher assurance level.
You can set the maximum number of registered devices preserved in each user’s device history. If the number of registered devices exceeds the limit, the nightly cleanup job deletes the least recently used devices.
Also, you can specify when inactive devices are removed from a user’s device history. For example, you can specify that devices are removed from a user’s device history after 30 days of inactivity.
Procedure
In the Security Console, click Authentication > Policies > Risk-Based Authentication Policies > Manage Existing.
Click the policy that you want to configure, and select Edit.
Under Device Administration Settings, enter numbers for the following fields:
In the Total Registered Devices field, enter the maximum number of registered devices preserved in each user’s device history.
In the Unregister Devices field, enter the number of consecutive days that a device can remain inactive before the system removes it from the user device history.
Click Save.
Related Concepts
Risk-Based Authentication Policies
Methods for Enabling Users for Risk-Based Authentication
Related References
Related Articles
Issue Opening Event Explorer - Device with an invalid character 20Number of Views Apache will not start - Error logged : Init: Pass phrase incorrect 39Number of Views How do you merge FSM audit logs? 1Number of Views Device Settings for Risk-Based Authentication 8Number of Views What is procedure to add or reconnect Cisco ESA partner to RSA DLP? 50Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle