View Risk-Based Authentication Settings for a UserView Risk-Based Authentication Settings for a User
You can view the risk-based authentication (RBA) settings for a user to do any of the following:
-
View whether the user is currently enabled for RBA.
-
View the number of devices in the user's device history.
-
Delete the user's device history.
-
View the identity confirmation methods that are allowed by the RBA policy, and determine whether the user has configured each method.
-
View silent collection details for the user, including whether silent collection is allowed by the RBA policy, whether the silent period has started, and how many days are remaining in the silent collection period.
Procedure
-
In the Security Console, click Identity > Users > Manage Existing.
-
Use the search field to find the user. Some fields are case sensitive.
-
Click the user that you want to view, and select Risk-Based Authentication.