This website uses cookies. By clicking OK, you consent to the use of cookies. Click Here to learn more about how we use cookies.
OK
  • RSA.com
  • Products
    • Archer®
      • Archer®
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Archer® Exchange
      • Training
      • Upcoming Events
      • Videos
    • RSA® Fraud & Risk Intelligence Suite
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Web Threat Detection
      • Upcoming Events
      • Videos
    • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Cloud
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Patch Content
      • Videos
    • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication Mobile SDK
      • Advisories
      • Events
      • Ideas
      • Knowledge Base
      • Request Access
      • Training
    • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication for eCommerce
      • RSA® Adaptive Authentication for eCommerce
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® FraudAction Services
      • RSA® FraudAction Services
      • Advisories
      • Discussions
      • Documentation
      • Ideas
      • Videos
    • RSA® Web Threat Detection
      • RSA® Web Threat Detection
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Videos
    • RSA NetWitness® Platform
      • RSA NetWitness® Platform
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA NetWitness® Detect AI
      • RSA NetWitness® Detect AI
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Investigator
      • RSA NetWitness® Investigator
      • Documentation
      • Download the Client
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Orchestrator
      • RSA NetWitness® Orchestrator
      • Overview
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA SecurID® Suite
      • RSA SecurID® Suite
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Knowledge Base
      • Ideas
      • Integrations
      • Training
      • Videos
    • RSA® Identity Governance & Lifecycle
      • RSA® Identity Governance & Lifecycle
      • Advisories
      • Blog
      • Community Exchange
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA SecurID® Access
      • RSA SecurID® Access
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • Other RSA® Products
      • Other RSA® Products
      • RSA® Access Manager
      • RSA® Data Loss Prevention
      • RSA® Digital Certificate Solutions
      • RSA enVision®
      • RSA® Federated Identity Manager
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
  • Resources
    • Advisories
      • Product Advisories on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Hosted
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Product Advisories
    • Blogs
      • Blogs on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Blogs on RSA Link
    • Discussion Forums
      • Discussion Forums
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Discussion Forums on RSA Link
    • Documentation
      • Product Documentation
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Downloads
      • Product Downloads
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Downloads on RSA Link
    • Ideas
      • Idea Exchange
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Knowledge Base
      • Knowledge Base
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Knowledge Base Pages on RSA Link
    • Upcoming Events on RSA Link
      • Upcoming Events
    • Videos
      • Videos on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Videos on RSA Link
  • Support
    • RSA Link Support
      • RSA Link Support
      • News & Announcements
      • Getting Started
      • Support Forum
      • Support Knowledge Base
      • Ideas & Suggestions
    • RSA Product Support
      • RSA Product Support
      • General Security Advisories and Statements
      • Product Life Cycle
      • Support Information
      •  
      •  
      •  
      •  
      •  
  • RSA Ready
  • RSA University
    • Certification Program
      • Certification Program
    • Course Catalogs
      • Course Catalogs
    • On-Demand Subscriptions
      • On-Demand Subscriptions
      • Archer®
      • RSA NetWitness® Platform
      • RSA SecurID® Suite
    • Product Training
      • Product Training
      • Archer®
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Identity Governance & Lifecycle
      • RSA NeWitness® Platform
      • RSA SecurID® Access
    • Student Resources
      • Student Resources
      • Access On-Demand Learning
      • Access Virtual Labs
      • Contact RSA University
      • Enrollments & Transcripts
      • Frequently Asked Questions
      • Getting Started
      • Learning Modalities
      • Payments & Cancellations
      • Private Training
      • Training Center Locations
      • Training Credits
      • YouTube Channel
    • Upcoming Events
      • Upcoming Events
      • Full Calendar
      • Conferences
      • Live Classroom Training
      • Live Virtual Classroom Training
      • Webinars
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

RSA Link website migration to new platform is in progress

View Status

RSA SecurID® Access Cloud Authentication Service Documentation

Browse the official RSA SecurID Access Cloud Authentication Service documentation for helpful tutorials, step-by-step instructions, and other valuable resources.
  • RSA Link
  • :
  • Products
  • :
  • RSA SecurID Suite
  • :
  • RSA SecurID Access
  • :
  • Cloud Authentication Service
  • :
  • Documentation
  • :
  • Identity Confidence
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content
Versions
Collections
All Downloads

Table of Contents

  •   RSA SecurID Access Product Overview
    •   RSA SecurID Access Overview
  •   Administrators
    •   Administrative Roles for the Cloud Administration Console
  •   Company Settings
    •   Configure Company Information and Certificates
  •   Identity Routers
    •   Planning Your Identity Router Deployment
      •   Identity Routers
  •   Identity Sources
    •   Identity Sources for the Cloud Authentication Service
  •   Assurance Levels
    •   Assurance Levels
  •   Access Policies
    •   Planning Resource Protection with Multifactor Authentication
  •   Clusters
    •   Clusters
  •   High Availability
    •   Relying Parties
  •   and Backups
    •   RADIUS for the Cloud Authentication Service Overview
  •   Relying Parties
    •   Cloud Authentication Service Certificates
  •   RADIUS
    •   Integrated Windows Authentication
  •   Certificates
    •   Adding Identity Providers
  •   Integrated Windows Authentication
    •   Manage the Application Catalog
  •   Identity Providers
    •   User Application Portal
  •   Web Applications
    •   Authentication Methods for Cloud Authentication Service Users
  •   User Application Portal
    •   Cloud Authentication Service User System Requirements
  •   Authentication Methods and Emergency Access
    •   Cloud Authentication Service Rollout to Users
  •   Users and Authenticators
  •   End User Rollout
    •   Using the Cloud Administration APIs
  •   RSA Authentication Manager Integration
    •   Manage the RSA SecurID Authentication API Keys
  •   Cloud Administration APIs
    •   Logging for the Cloud Authentication Service
  •   RSA SecurID Authentication API
    •   Troubleshooting Cloud Authentication Service User Issues
  •   Logging
    •   Product Documentation
  •   Troubleshooting
    •   Copyright

Product Resources

  •   Advisories
    •   Product Advisories
    •   Security Advisories
    •   Service Notifications
    •   Technical Advisories
  •   Blog
  •   Discussions
  •   Documentation
    •   Authentication Agents
      •   API / SDK
      •   Apache Web Server
      •   Citrix StoreFront
      •   IIS Web Server
      •   Microsoft AD FS
      •   Microsoft Windows
      •   PAM
    •   Authentication Client
    •   Authentication Engine
    •   Authentication Manager
    •   Cloud Authentication Service
    •   Hardware Tokens
    •   MFA Agents
      •   macOS
      •   Microsoft Windows
    •   Software Tokens
      •   Android
      •   Blackberry
      •   Blackberry 10
      •   iOS
      •   macOS
      •   Token Converter
      •   Windows
      •   Windows Phone
  •   Downloads
    •   Authentication Agents
      •   API / SDK
      •   Apache Web Server
      •   Citrix StoreFront
      •   IIS Web Server
      •   Microsoft AD FS
      •   Microsoft Windows
      •   PAM
    •   Authentication Client
    •   Authentication Engine
    •   Authentication Manager
    •   Cloud Authentication Service
    •   MFA Agents
      •   macOS
      •   Microsoft Windows
    •   Software Tokens
      •   Android
      •   Blackberry
      •   Blackberry 10
      •   iOS
      •   macOS
      •   Token Converter
      •   Windows
      •   Windows Phone
  •   Events
  •   Ideas
  •   Integrations
  •   Knowledge Base
  •   RSA SecurID Access Prime
  •   Training
  •   Videos

The Cloud Authentication Service can establish high or low confidence in a user's identity based on data it collects when users attempt to authenticate over a period of time. You can configure authentication requirements for an application, or allow or deny access, based on identity confidence by using the Identity Confidence attribute in an access policy.

The Cloud Authentication Service can establish high or low confidence in a user's identity based on data it collects when users attempt to authenticate over a period of time. The service leverages machine-learning algorithms to profile the user’s normal activity in order to understand deviation from that activity in the current authentication request. The Cloud Authentication Service evaluates the individual user, total population, and known risky authentication patterns to determine the identity confidence score. Older historical events are weighted less than more recent events, so past behavior ages out of the system and new behavior is more impactful.

The Identity Confidence attribute is available with the Premium Edition of RSA SecurID Access.

To learn more, see:

  • Learning User Behavior Through Data Collection

  • Confidence Threshold

  • Identity Confidence Dashboard

You can perform these tasks:

  • Configure Identity Confidence in Access Policies

  • View Risk Analytics and Track Behavior for a User

  • View a User's Identity Confidence Score in the User Event Monitor

  • Disable Data Collection for Identity Confidence

​Learning User Behavior Through Data Collection

The Cloud Authentication Service collects data about users over a period of time to learn the following attributes about users.

AttributeDescription
TimeTime at which an application is accessed.
WeekendWhether or not the user authenticated during the weekend.
Uncommon ApplicationsUser authenticates to an application that he normally does not access.
High Authentication VelocityUser unsuccessfully authenticates quickly numerous times.
New DeviceUser accesses a device he has never used before.
LocationPhysical location of a user (estimated from IP address and HTML5 Geolocation).
High Device Access RateA user account is being used simultaneously on at least two devices.
Users on Device VelocityMultiple users authenticating from the same device.
Users on IP VelocityMultiple users authenticating from the same IP address.

The collected data is specific to your company. Data from a large user population collected over a long period of time ensures more reliable results than data from a small user population collected over a short period of time. Identity confidence results can vary from company to company depending on these factors.

​Confidence Threshold

The user's identity confidence score is categorized as high or low confidence in relation to the Confidence Threshold. The Confidence Threshold is calculated based on information collected from all users within your company.

The Cloud Authentication Service requires an initial learning period of at least 1,000 authentications (authentication minimum) to collect sufficient user history to optimize identity confidence scoring. Prior to reaching the authentication minimum, the system uses a default threshold (0.37) for determining identity confidence. It is likely that more users will receive low confidence scores in this scenario. After this minimum has been reached, the Cloud Authentication Service adjusts the threshold up or down every seven days as it learns each user's behavior to optimize the low confidence scores.

RSA recommends that you require multifactor authentication for all users until the system has reached the minimum number of authentications.

The following table summarizes what high and low scores represent in relation to the Confidence Threshold.

User's Overall Confidence ScoreMeaning
Low score (low confidence)A score that is lower than the Confidence Threshold indicates low confidence (high risk). This means the Cloud Authentication Service cannot identify the user with a reasonable degree of certainty. You can choose to deny the user access to protected resources or require the user to authenticate at a higher assurance level.
High score (high confidence)A score that exceeds the Confidence Threshold indicates high confidence (low risk). This means the Cloud Authentication Service has high confidence that the user is indeed who he says he is.

​Identity Confidence Dashboard

Use the Identity Confidence Dashboard to view information that can help you identify anomalous authentication activity in your company. In most cases, anomalous behavior does not indicate a cyberattack or require you to take action. The dashboard provides your company with the necessary tools to analyze user behavior and make decisions that keep your company safe. The dashboard reports the following information.

Analytics ReportedDescription

Multifactor Authentication Attempts

Counts the number of user attempts to access resources protected by access policies that do and do not include the identity confidence attribute.

The total count includes attempts when users satisfy policy conditions that allow them to skip multifactor authentication.

At least one attempt must be found to display results.

Attempts Based on Identity Confidence

Counts the number of authentication attempts that resulted in a low or high confidence score.

The confidence threshold determines if an evaluation results in high or low confidence.

Reasons for Low Identity Confidence

A low confidence score occurs when the Cloud Authentication Service does not recognize the user's behavior, device, or location in an authentication attempt because the user has changed behavior, device, or location since the previous attempt. Or the score may be low if the user is new and has not authenticated enough times to earn a high confidence score. Low confidence can be due to one or more of these factors:

  • Behavior

  • Device

  • Location

  • Behavior and location

  • Location and device

  • Behavior, device, and location

  • Undetermined

Undetermined cause is reported when the Cloud Authentication Service cannot identify a single factor as the predominant cause of the low score. Multiple factors always play a role in confidence scores, and sometimes one particular factor does not stand out.

Top Anomalous Users

Lists users who exhibit anomalous behavior. “Severity” is the difference between the user’s Confidence score and the Confidence Threshold at the time of authentication. The larger the difference, the higher the degree of anomalous behavior. Up to four factors that contributed to lowering the score are provided. Use this information to decide whether these users require further action in accordance with your company’s security policies. In most cases, anomalous behavior does not indicate a cyberattack or require you to take action.

User Behavior Over Time

The dashboard displays a graph that shows the following information for a single user over a period of time. Click points on the graph to see:

  • Date and time of authentication

  • Confidence score at date and time of authentication

  • Confidence Threshold at date and time of authentication

  • Contributing factors in order of impact (provided when the Confidence score is below the threshold)

​Configure Identity Confidence in Access Policies

Configure identity confidence by using the Identity Confidence attribute in an access policy. In the following sample policy, users with high identity confidence can access the resource without performing additional (step-up) authentication. Users with low identity confidence are denied access. For configuration instructions, see Add, Clone, or Delete an Access Policy

ngx_g_id_confidence_policy_example.png

​View Risk Analytics and Track Behavior for a User

Use the Identity Confidence Dashboard to view authentication information for all users in your company or for individual users within a specified timeframe.

Procedure 

  1. Open the Cloud Administration Console and click Users > Identity Confidence Dashboard.

    By default, the initial pie charts that display reflect authentication activity collected over the past 30 days for all users in your company who have authenticated through the Cloud Authentication Service.

  2. You can view data for a specific user in either of two ways:

    • In the Filter by field, enter the user's email address and the timeframe (1-30 days). Click Go.

      Note:  The search criteria must be able to return at least one authentication attempt in which identity confidence was evaluated. Otherwise, no attempts are displayed.

    • Select a user's email address from the Top Anomalous Users table on the right.

      The page is updated to show authentication activity for the selected user. Click Reset if you want to return to the display for all users in your company.

In the following example, the graphs on the left show information that is filtered for one user.

ngx_g_risk_analytics_top_dashboard.png

In the following graph, the blue line represents the user's authentication activity and the red line represents the Confidence Threshold over the same period of time. Each blue authentication point has a corresponding point on the Confidence Threshold line indicating the threshold on the day and time of authentication. Click a point on the blue line to see the user's Confidence score and Confidence Threshold on a specific day and time. If the user's score dips below the Confidence Threshold, indicating low confidence, a list of Contributing Factors appears.

ngx_g_risk_analytics_bottomgraph.png

We want your feedback on this feature. Tell us what you think.

​View a User's Identity Confidence Score in the User Event Monitor

The User Event Monitor reports the following information in the Authentication Details column for event 25001. All of the attributes described in Learning User Behavior Through Data Collection contribute to these scores.

Confidence Details Reported in User Event Monitor Description

Confidence

The user's overall identity confidence score, which is influenced by the user's separate scores for Device Confidence, Behavior Confidence, and Location Confidence.

Confidence Threshold

Confidence scores higher than this threshold indicate high confidence, while lower scores indicate low confidence. The threshold calculation is based on information collected from all users within your company and adjusts over time as the Cloud Authentication Service learns about your users and as more users authenticate. The initial default threshold is 0.37. After at least 1,000 authentications have been reached, the threshold is updated daily.

Device Confidence

Level of confidence based on attributes associated with the user's device. These attributes describe device characteristics and user behavior. The Device Confidence score starts at 0.0 if the user has not previously used the device and increases each time the user successfully authenticates from the same device.

Behavior Confidence

Level of confidence based on attributes associated with the user's behavior. For example, this score is adjusted when the user successfully authenticates to access the same application within the same timeframe.

Location Confidence

Level of confidence based on attributes associated with the user's location. For example, this score is increased if the user successfully authenticates from the same location every day and decreased if the user successfully authenticates from different locations every day.
Contributing Factors

If a user's overall Confidence score indicates low confidence, the User Event Monitor reports up to four factors that most contributed to lowering the score. These factors are listed as Contributing Factors, in order from most impactful to less impactful. Factors that contribute to raising a user's overall score are not listed. For example:

Contributing Factors=1. New cookie or multiple cookies; 2. Location changed; 3. New application; 4. Location has multiple previous failed authentications

In this example, the factors numbered 1, 2, 3, and 4 most contributed to lowering the user's overall Confidence score.

​Disable Data Collection for Identity Confidence

RSA recommends that you leave data collection for identity confidence and location enabled. If your company requires you to disable data collection for identity confidence, do not use the identity confidence attribute in access policies. To obtain maximum benefit from identity confidence scores, RSA recommends that you also leave location data collection enabled. If you must disable data collection, see Configure Company Information and Certificates for instructions.

 

 

 

 

Previous Topic:Condition Attributes for Access Policies
Next Topic:Assurance Levels
You are here
Table of Contents > Access Policies > Planning Access Policies > Identity Confidence
Labels (1)
Labels:
  • Configuration

Tags (21)
  • CAS
  • Cloud
  • Cloud Auth Service
  • Cloud Authentication
  • Cloud Authentication Service
  • condition attributes
  • confidence dashboard
  • confidence threshold
  • Config
  • Configuration
  • Docs
  • Documentation
  • identity confidence
  • policy attributes
  • Product Docs
  • Product Documentation
  • risk dashboard
  • Risk Engine
  • RSA SecurID
  • RSA SecurID Access
  • SecurID
0 Likes
Was this article helpful? Yes No
Share
No ratings

On this page

Powered by Khoros
  • Products
  • Resources
  • Solutions
  • RSA University
  • Support
  • RSA Labs
  • RSA Ready
  • About RSA Link
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
© 2020 RSA Security LLC or its affiliates.
All rights reserved.