User self-administration tasks
Administrators can configure context-based access to enable users to perform certain self-management tasks.
A common user task is to manage registered devices. For example, users can view the attributes for a device. Also, a user can rename a device.
Users can also view, specify and configure secret keys for use with one-time password.
- Manage your registered devices
We can modify the registered device fingerprints the risk engine compares with incoming request device fingerprints in risk score calculation scenarios.- Manage OTP secret keys
To help manage mobile data, such as HOTP secret keys and TOTP secret keys, we can use the REST services capability.- Configure knowledge questions
Use the Knowledge Questions management page to manage the knowledge questions the Knowledge Questions authentication mechanism will present as a step-up authentication measure.- SCIM account management
ISAM provides support for selected parts of the Cross-domain Identity Management (SCIM) protocol. The SCIM interface can be used as a consolidated API for accessing user data from various data sources.
Parent topic: Advanced Access Control administration