Business scenarios - Context-based
Business transactions that have an increased security risk factor can benefit by implementing context-based access. The following examples are some scenarios where we can use context-based access to provide a higher level of confidence for the transaction:
- A user tries to access sensitive information where a simple user ID and password authentication is not sufficient. However, the data is not sensitive enough to use a more complex authentication mechanism, such as token IDs.
- Users require access from remote locations that are not trusted and they use devices such as mobile devices and notebooks. To ensure that mobile users are authenticated sufficiently, the business requires a second factor authentication.
- Users need to access an application that provides sensitive business information. They might access the information outside of their regular work patterns.
- A user accesses a resource from a device the user previously used and maintains typical usage patterns. Context-based access improves the user experience by limiting secondary authentication mechanisms.
Parent topic: Overview of context-based access