SlideShare a Scribd company logo
1 of 4
Download to read offline
Adaptive/Risk-Based Authentication
Adaptive authentication is a mechanism for sending alerts or prompt
customers to complete a further step(s) to validate their identity when an
authentication request is considered malicious in compliance with the
security policy of your company. It allows users to log in with a username
and password while offering a security layer when a malicious attempt is
made to access the system without any additional authentication barrier.
Malicious Attempt Factors
Adaptive Authentication analyzes the user interaction with your application
and intelligently builds a risk profile based on the consumer behavior or your
organization's security policy. The system creates a user. You can define the
risk factors in one of the following ways:
Pre-defined Factors
You can define one or more risk factors based on your business requirements:
User Role: Employees with higher user positions can carry out sensitive
measures in the system; thus you can ask them to take more steps to
authenticate them. Employees with lower user positions pose a lower security
risk and can log into frictionless user experience with usernames and
passwords. Susceptible resource access: Often, when attempting to access a
confidential resources like financial statements, employees may be asked to
perform more authentication measures
Perform sensitive actions: If workers attempt to conduct confidential acts
such as editing or deleting actions for sensitive information, further measures
may be taken to verify their identity.
Location: The employees are trying to login into a system using a public
network instead of the office network.
Device: If employees use their personal laptop instead of using a
company-issued laptop.
Dynamic Factors
Most systems build a risk profile based on a consumer's recent interaction
with your applications. The system generally leverages machine learning to
create this profile on the fly. Here are the common risk factors:
Country: The system can trigger actions and notifications if the consumer is
logged in from a different country. e.g., If the consumers travel outside of
their country of residence and try to access the system, some financial
instructions like credit card companies block the access for the consumers to
the system. These companies require you to inform the companies before
leaving the country to whitelist the country for your account in the system.
City: If the consumer has logged in from a different city than he usually logs
in from, it will trigger Adaptive Authentication. Once the consumer
completes the Adaptive Authentication for the new city, the city can be added
to the system for future Logins without the Adaptive Authentication.
Device: The request is flagged as malicious under the Adaptive
Authentication if the user is trying to login from a new computer. When the
user has completed the adaptive authentication for the new device, without
Adaptive Authentication it is possible to add a city to the system for future
login.
Browser: The authentication try is considered malicious if the user logged in
from the browser of Chrome and attempts at unexpectedly logging in from
the browser of FIREFOX. When the user completes the Adaptive
Authentication phase, the browser will be listed whitelisting potential
consumer authentication attempts.
Combination of Factors
You can also combine the Pre-defined factors (as mentioned above) and
Dynamic factors to trigger the Adaptive Authentication.
Learn in detail about ​how adaptive authentication works​ in this article.

More Related Content

Similar to Adaptive risk based authentication

Similar to Adaptive risk based authentication (20)

ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
 
How an Identity Verification Platform Can Safeguard Your Business.pdf
How an Identity Verification Platform Can Safeguard Your Business.pdfHow an Identity Verification Platform Can Safeguard Your Business.pdf
How an Identity Verification Platform Can Safeguard Your Business.pdf
 
Proactive moderation
Proactive moderation Proactive moderation
Proactive moderation
 
Risk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldRisk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure World
 
All You Need to Know About Mobile Payment Gateways in 2023.pdf
All You Need to Know About Mobile Payment Gateways in 2023.pdfAll You Need to Know About Mobile Payment Gateways in 2023.pdf
All You Need to Know About Mobile Payment Gateways in 2023.pdf
 
Broken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptxBroken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptx
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!
 
Building Access Control Systems And Its Phases.pdf
Building Access Control Systems And Its Phases.pdfBuilding Access Control Systems And Its Phases.pdf
Building Access Control Systems And Its Phases.pdf
 
Building Access Control Systems And Its Phases
Building Access Control Systems And Its PhasesBuilding Access Control Systems And Its Phases
Building Access Control Systems And Its Phases
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPSUSING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
 
Get Ahead of your Next Security Breach
Get Ahead of your Next Security BreachGet Ahead of your Next Security Breach
Get Ahead of your Next Security Breach
 
Get your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPRGet your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPR
 
main project doument
main project doumentmain project doument
main project doument
 
Step up authentication
Step up authenticationStep up authentication
Step up authentication
 
Risk-based Authentication In Cloud | Sysfore
Risk-based Authentication In Cloud | SysforeRisk-based Authentication In Cloud | Sysfore
Risk-based Authentication In Cloud | Sysfore
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industry
 
Security Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSecurity Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money Safe
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Building Access Control System And Its Phases (1).pptx
Building Access Control System And Its Phases (1).pptxBuilding Access Control System And Its Phases (1).pptx
Building Access Control System And Its Phases (1).pptx
 

More from Jack Forbes

More from Jack Forbes (20)

Authentication and Authorization Defined_ What's the Difference_.pdf
Authentication and Authorization Defined_ What's the Difference_.pdfAuthentication and Authorization Defined_ What's the Difference_.pdf
Authentication and Authorization Defined_ What's the Difference_.pdf
 
Digital identity management for the cmo, ciso, and cio
Digital identity management for the cmo, ciso, and cioDigital identity management for the cmo, ciso, and cio
Digital identity management for the cmo, ciso, and cio
 
Why do consumers prefer social login
Why do consumers prefer social loginWhy do consumers prefer social login
Why do consumers prefer social login
 
How secure is two factor authentication (2 fa)
How secure is two factor authentication (2 fa)How secure is two factor authentication (2 fa)
How secure is two factor authentication (2 fa)
 
Future of bring your own identity
Future of bring your own identityFuture of bring your own identity
Future of bring your own identity
 
Cms api integrations list-LoginRadius
Cms api integrations list-LoginRadiusCms api integrations list-LoginRadius
Cms api integrations list-LoginRadius
 
Buyer’s guide to multi factor authentication
Buyer’s guide to multi factor authenticationBuyer’s guide to multi factor authentication
Buyer’s guide to multi factor authentication
 
React with Ref
React with RefReact with Ref
React with Ref
 
8 effective communication strategies for internal alignment and growth in 2021
8 effective communication strategies for internal alignment and growth in 20218 effective communication strategies for internal alignment and growth in 2021
8 effective communication strategies for internal alignment and growth in 2021
 
Social login-infographic
Social login-infographicSocial login-infographic
Social login-infographic
 
Login radius identity brokering infographic
Login radius identity brokering infographicLogin radius identity brokering infographic
Login radius identity brokering infographic
 
Web and Mobile SSO
Web and Mobile SSOWeb and Mobile SSO
Web and Mobile SSO
 
Loginradius phone authentication
Loginradius phone authenticationLoginradius phone authentication
Loginradius phone authentication
 
Social Login Explained
Social Login ExplainedSocial Login Explained
Social Login Explained
 
A Guide to Multi Factor Authentication
A Guide to Multi Factor AuthenticationA Guide to Multi Factor Authentication
A Guide to Multi Factor Authentication
 
Guide to MFA
Guide to MFAGuide to MFA
Guide to MFA
 
Ciam for devops
Ciam for devops Ciam for devops
Ciam for devops
 
Defining the omnichannel customer experience
Defining the omnichannel customer experienceDefining the omnichannel customer experience
Defining the omnichannel customer experience
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Login radius releases its annual consumer digital identity trend report 2020
Login radius releases its annual consumer digital identity trend report 2020 Login radius releases its annual consumer digital identity trend report 2020
Login radius releases its annual consumer digital identity trend report 2020
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Adaptive risk based authentication

  • 1. Adaptive/Risk-Based Authentication Adaptive authentication is a mechanism for sending alerts or prompt customers to complete a further step(s) to validate their identity when an authentication request is considered malicious in compliance with the security policy of your company. It allows users to log in with a username and password while offering a security layer when a malicious attempt is made to access the system without any additional authentication barrier.
  • 2. Malicious Attempt Factors Adaptive Authentication analyzes the user interaction with your application and intelligently builds a risk profile based on the consumer behavior or your organization's security policy. The system creates a user. You can define the risk factors in one of the following ways: Pre-defined Factors You can define one or more risk factors based on your business requirements: User Role: Employees with higher user positions can carry out sensitive measures in the system; thus you can ask them to take more steps to authenticate them. Employees with lower user positions pose a lower security risk and can log into frictionless user experience with usernames and passwords. Susceptible resource access: Often, when attempting to access a confidential resources like financial statements, employees may be asked to perform more authentication measures Perform sensitive actions: If workers attempt to conduct confidential acts such as editing or deleting actions for sensitive information, further measures may be taken to verify their identity. Location: The employees are trying to login into a system using a public network instead of the office network.
  • 3. Device: If employees use their personal laptop instead of using a company-issued laptop. Dynamic Factors Most systems build a risk profile based on a consumer's recent interaction with your applications. The system generally leverages machine learning to create this profile on the fly. Here are the common risk factors: Country: The system can trigger actions and notifications if the consumer is logged in from a different country. e.g., If the consumers travel outside of their country of residence and try to access the system, some financial instructions like credit card companies block the access for the consumers to the system. These companies require you to inform the companies before leaving the country to whitelist the country for your account in the system. City: If the consumer has logged in from a different city than he usually logs in from, it will trigger Adaptive Authentication. Once the consumer completes the Adaptive Authentication for the new city, the city can be added to the system for future Logins without the Adaptive Authentication. Device: The request is flagged as malicious under the Adaptive Authentication if the user is trying to login from a new computer. When the user has completed the adaptive authentication for the new device, without
  • 4. Adaptive Authentication it is possible to add a city to the system for future login. Browser: The authentication try is considered malicious if the user logged in from the browser of Chrome and attempts at unexpectedly logging in from the browser of FIREFOX. When the user completes the Adaptive Authentication phase, the browser will be listed whitelisting potential consumer authentication attempts. Combination of Factors You can also combine the Pre-defined factors (as mentioned above) and Dynamic factors to trigger the Adaptive Authentication. Learn in detail about ​how adaptive authentication works​ in this article.