Determining Access Requirements for High-Risk Users in the Cloud Authentication ServiceDetermining Access Requirements for High-Risk Users in the Cloud Authentication Service
You can determine authentication and access requirements for users who are identified as high risk. These might be users whose accounts have been compromised, or for whom a third-party security information and event management (SIEM) solution, such as RSA NetWitness, has found suspicious activity. You can configure access policies that require additional authentication for users on the high-risk list or deny them access to protected resources.
Note: This feature is available only for Premium Edition.
To use this feature, do the following:
Ensure that high-risk users coming from third-party applications are identified as high risk in the Cloud Authentication Service. Use one of the following methods:
Have your web client developers implement the Cloud Administration Add/Remove High-Risk User API. To generate the required API keys, see Manage the Cloud Administration API Keys. Use the Cloud Administration Retrieve High-Risk User List API Version 1 to retrieve a list of high-risk users.
If your company deploys RSA NetWitness Respond Version 11.3 or later, use that product instead of the APIs to obtain the same benefits. For instructions, see NetWitness Respond Configuration Guide for Version 11.3.
Configure access policies to use the High-Risk User List attribute. For instructions, see Add, Clone, or Delete an Access Policy