1. RSA RISK-BASED AUTHENTICATION
Nowadays every organization is moving all their products to cloud, the main challenge in this process is authenticating its wide variety of Users/Employees to access its resources.
Earlier On-Demand Authentication (two-factor authentication) was used as a solution for this challenge, in which each user after successful authentication with password will be sent an On-Demand tokencode via sms/email and prompted for the same by system as second level of authentication.
At present, A new most cost-effective solution for this authentication challenge is what RSA Risk-Based Authentication (RBA).
RSA Risk-Based Authentication helps in authenticating users based on analysis of client device and user’s behaviour.
Analysis of client device is done by verifying if a particular device is user’s usual device or a new one by comparing it with devices in authentication history. Similarly user’s behaviour is also verified if it is as usual like in previous authentications or different from authentication history.
In RSA RBA, there’s a Risk Engine which gives Risk score for user’s authentication request based on authentication history. For example, if a user’s authentication request is from a different device from authentication history Risk score will be incremented by one similarly if that user’s behaviour is different from previous authentications again Risk score will be incremented by one.
Based on Risk score, User will be authenticated or taken to second level of authentication like On-Demand Authentication or Security Questions.
After successfully authenticated, User will be allowed to access secured resources and same time Risk score for that particular user will be reset.
Since the second level of authentication is performed depending on Risk score only when Risk score is high, Risk-Based Authentication is considered as the most cost-effective solution.
Go on and explore Risk Based Authentication!
Reference: http://www.emc.com/collateral/data-sheet/h11506-rsa-rba-ds.pdf