Complete the following tasks to implement risk-based authentication (RBA).
Complete the following tasks to implement risk-based authentication (RBA).
Before you begin
Choose a backup authentication method so that users can continue to access network resources if Authentication Manager is unavailable or user authentication is unsuccessful. See Backup Authentication Method for Risk-Based Authentication.
Procedure
-
Update the Domain Name System (DNS) with entries for Authentication Manager. For instructions, see Planning for Domain Name System Updates.
-
Specify the RBA policy for your deployment integration. For instructions, see Add a Risk-Based Authentication Policy.
-
Ensure high availability for RBA. See Backup Authentication Method for Risk-Based Authentication.
-
Obtain the RSA Authentication Agent software or third party product. See RSA Authentication Agents.
-
Deploy the RSA Authentication Agent software or third party product. See Deploying an Authentication Agent that Uses the UDP Protocol.
-
Install the RBA Integration Script Template.
-
Generate an Integration Script for a Web-Based Application.
-
Use the implementation guide that you downloaded when you obtained the agent to configure your agent to pass authentication requests to and from Authentication Manager.
-
Test the RBA integration. See Testing Your Risk-Based Authentication Integration.
You are here
Table of Contents > Risk-Based Authentication > Implementing Risk-Based Authentication