Features
Context-based access provides several capabilities to identify potential risk and limit the ability for an attacker to use stolen credentials.
- Silent device registration where the system does not require any user interaction.
- Ready-to-use, predefined policy attributes specific to context-based access.
- Scenario-based, predefined risk profiles.
- A risk-scoring engine that calculates a risk score for the current transaction based on the active risk profile. The risk score is based on configurable weights assigned to context attributes and behavior attributes. If the risk score is high, further challenges are presented to the user or access is denied. If the risk score is low, the user is permitted access.
Parent topic: Overview of context-based access