View Risk-Based Authentication Settings for a User
You can view the risk-based authentication (RBA) settings for a user to do any of the following:
View whether the user is currently enabled for RBA.
View the number of devices in the user's device history.
Delete the user's device history.
View the identity confirmation methods that are allowed by the RBA policy, and determine whether the user has configured each method.
View silent collection details for the user, including whether silent collection is allowed by the RBA policy, whether the silent period has started, and how many days are remaining in the silent collection period.
Procedure
In the Security Console, click Identity > Users > Manage Existing.
Use the search field to find the user. Some fields are case sensitive.
Click the user that you want to view, and select Risk-Based Authentication.
Related Articles
Device Settings for Risk-Based Authentication 8Number of Views Search Users Based on Risk-Based Authentication Settings 2Number of Views Methods for Enabling Users for Risk-Based Authentication 6Number of Views Configure Device History Settings for a Risk-Based Authentication Policy 5Number of Views Risk-Based Authentication 24Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x